Sr O365 Administrator job opportunity

Apply Now

Company: Edward Jones

Location: Austin, TX 78745

Description:

Job Title: Sr O365 Administrator

Location: Austin, TX

POSITION REQUIREMENTS:
Enhance O365 security implementing Azure AD and security features available with O365 G5 licensing.

Microsoft O365 G5 Security Requirements

Access and Identity Management:


Azure AD and AAD Connect - this includes a full setup of all hardware and software required for the migration of TDI's existing ADFS environment to a functional Azure AD environment in the Microsoft Azure Cloud. Additionally, hardware specifications, including number of servers, hardware configuration and firewall ports required to be opened is to be provided to TDI.

MFA & SSO Authentication - this is in addition to the MFA already implemented in TDI's environment.

Conditional Access

Privileged Access Management (PAM) & Just-in-Time (JIT)

3rd Party Applications & Connections

RBAC & User Lifecycle

B2B & B2C

Access Reviews

Identity Protection

In addition, the following data protection needs to be setup, configured, and fully implemented.

Data Protection:
  • Data Protection Policy & Controls
  • Data Loss Prevention (DLP)
  • Data Discovery
  • Granular Data Access Management
  • Data Classification
  • Cloud Application Security Broker (CASB)
  • Email Security
  • Microsoft Threat Protection
  • Azure Advanced Threat Protection
  • Cloud App Security

The implementation includes:

Contracted staff must develop a migration plan, setup, configure and fully implement the items above for TDI in its entirety. Plan must include:

an implementation priority order and timeline.

Any dependencies which exist in our environment.

Any currently implemented products that will need to be updated.

Any new products we will need to implement.

Current Environment:
  • We implemented Office 365 Advanced Threat Protection including:
  • Active Directory Identity Protection
  • User Risk Detection
  • Using conditional access for MFA for AD, Citrix, and VPN
  • Security Compliance Threat Management Policies:
  • Anti-phishing
  • Anti-spam
  • Anti-malware
  • Safelinks
  • Safe attachments

Similar Jobs