<p>Our Utah-based client is looking for a skilled Cyber Security Engineer to join our team in. As part of this long-term contract position, you will play a crucial role in safeguarding our systems and networks against potential threats. This role requires a proactive approach to implementing security measures and ensuring compliance with industry standards.</p><p><br></p><p>Responsibilities:</p><ol><li><strong>Microsoft Security Stack Mastery</strong> — Deep expertise in Microsoft Azure Security and M365 subscriptions tenants, Defender (Endpoint, Identity, Cloud Apps,M365), Microsoft WAF. This is the core of the role.</li><li><strong>Azure, <u>Azure Security</u> & Cloud Security Architecture</strong> — Securing Azure workloads using Defender for Cloud, Security Center policies, RBAC, landing zone design, and cloud-native security controls across <strong>IaaC</strong>, PaaS/SaaS.</li><li><strong>Identity & Access Management (IAM)</strong> — Advanced knowledge of Entra ID, Conditional Access, Privileged Identity Management (PIM), Zero Trust architecture, and hybrid identity with multitenant AAD/EntraID.</li><li><strong>Experience or Knowledge on protecting copilot</strong> and other AI tools.</li><li>Compliance, Audit & Governance — Hands-on experience with audit frameworks (ISO 27001, CIS Benchmarks), Microsoft Purview for compliance management, and conducting technical security audits and risk assessments.</li><li>Evaluate Network Security Engineering — Expertise in firewalls (Azure Firewall, NSGs, ASGs), DDoS protection, private endpoints, VPN/ExpressRoute security, micro-segmentation, and Tenant network traffic analysis.</li><li>Security Governance & Risk Communication — Ability to translate technical findings into executive-level risk reports, manage security posture over time using Secure Score metrics, and communicate audit results to both technical and non-technical stakeholders.</li><li>Endpoint Security & Hardening — Deep knowledge of Microsoft Defender for Endpoint (MDE), Intune-based device compliance, attack surface reduction (ASR) rules, application control (WDAC/AppLocker), and secure baseline configurations.</li></ol><p><br></p>