Skip to main content

13258-Office 365 consultant

Experience: 8-14
Posted: 24 Mar, 2023
Location: Dubai , United Arab Emirates

Job Description

Key Responsibilities & Accountabilities:

  • Security expertise: A solid understanding of cybersecurity principles, security frameworks, and best practices is essential for designing and implementing a zero trust security model. Experience with security assessments, threat modeling, and risk management is also important.
  • Identity and access management (IAM): Experience with IAM technologies and processes, such as multi-factor authentication (MFA), identity federation, and privilege management, is critical for implementing a zero trust security model. Familiarity with directory services, such as Active Directory or Azure Active Directory, is also important.
  • Cloud technologies: Knowledge of cloud computing platforms, such as Microsoft Azure or Amazon Web Services (AWS), is essential for implementing Office 365 and other cloud-based services securely. Experience with cloud security solutions, such as Cloud Access Security Brokers (CASBs), is also beneficial.
  • Network security: Understanding of network security principles, such as network segmentation, firewalls, and intrusion prevention systems (IPS), is necessary for designing a zero trust security model that protects against network-based attacks.
  • Project management: The ability to plan, execute, and monitor a security project is important for ensuring a successful implementation of a zero trust security model. Experience with project management methodologies, such as Agile or Waterfall, can be useful.


Key requirements:

In addition to technical expertise and project management skills, individuals or teams implementing a zero-trust security model should be familiar with best practices for identity and Office 365 security.

  • Enabling multi-factor authentication (MFA) for all user accounts and service accounts.
  • Implementing least privilege access for all users and service accounts.
  • Monitoring and auditing user and administrator activity for Office 365 and other cloud-based services.
  • Regularly reviewing and updating security policies and procedures to ensure they align with industry best practices.

Required Skills

Skill Years Months
MS Office 365 10 0
Identity & Access Management (IAM) 10 0
Cyber Security 10 0
Azure MFA 10 0
Privilege Access Management (PAM) 10 0
Azure AD Identity Management 10 0
AWS 10 0
(CASBs), & Server virtualisation technologies 8 0
Network Security 10 0
Firewall 10 0
IPS 10 0
Agile and Waterfall methodologies 10 0
zero trust security model 10 0