Microsoft Cloud Transformation / Azure is an advantage



  • Communicates clearly and concisely, both orally and in writing
  • Ability to establish cross-functional, collaborative relationships with business and technology partners
  • Enables team members to understand “why” security controls are important to mitigate enterprise risks
  • Ensures application and infrastructure architectural solutions are stable, secure, and compliant with required standards and practices
  • Implements security monitoring across all platforms to ensure continuous availability and operational continuity of critical systems
  • Demonstrated experience implementing and managing high capacity, redundant, and mission critical environments
  • Upholds company policies, and legal/regulatory requirements,
  • Implements and maintains system configurations and baselines to support secure application development software control best practices and standards
  • Provides support to team members in order to achieve partners, business, and customer results
  • Demonstrated ability to work successfully in a fast-paced and cross-functional team environment
  • Strong technical background and understanding in the areas of enterprise infrastructure and information security.


  • BS degree in Information Technology, Computer Science, or a related field
  • experience with cloud services – AWS and Azure is preferred
  • 2+ years of experience in system administration, network administration, and systems engineering
  • 2+ years supporting Linux operating systems, both server and client
  • 2+ years supporting Microsoft Windows operating systems, both server and client
  • 2+ years of experience with network administration and database administration
  • 2+ years utilizing logging, monitoring, and alerting solutions, and/or similar solutions as a system administrator
  • 2+ years utilizing configuration management solutions as a system administrator
  • Experience with highly virtualized environments and cloud technologies
  • Strong understanding of the business impact of security tools, technologies and policies. Ability to develop and articulate a compelling business case for recommended actions.