top of page
asset 4.jpg

Shruti

M365 Solution Architect

13

+

Years of Exp.

Technical Skills

1. Microsoft Information Protection (MIP)
2. Advanced Threat Protection (ATP)
3. Data Loss Prevention (DLP)
4. Microsoft Intune
5. Microsoft Endpoint Security
6. Azure Active Directory (Azure AD)
7. Privileged Identity Management (PIM)
8. Microsoft Cloud App Security (MCAS)
9. Microsoft Defender for Endpoint
10. Conditional Access Policies
11. Identity Protection
12. Azure Security Center
13. Threat Intelligence

14. Security Incident and Event Management (SIEM)
15. Security Compliance Monitoring
16. Compliance Monitoring Systems
17. Cross-functional Collaboration
18. Training and Education on Compliance Issues
19. Crisis Management and Incident Response
20. IT Compliance and Security Protocols
21. Compliance Program Evaluation and Improvement
22. Due Diligence Processes
23. Microsoft Security Baselines
24. Endpoint Detection and Response (EDR)
25. Conditional Access Policies
26. Identity Protection in Azure AD

Professional Summary

omkar.jpg

Responsibility

    1. Define and enforce conditional access policies to secure access to critical resources.
    2. Implement Identity Protection measures to mitigate identity-related security risks.
    3. Coordinate internal audits and compliance reviews.
    4. Manage data privacy and protection initiatives.
    5. Oversee third-party risk assessments and due diligence.
    6. Monitor and report on compliance activities to senior management.
    7. Ensure the security and compliance of resources using Azure Security Center.
    8. Utilize threat intelligence sources to stay informed about emerging security threats.
    9. Implement and manage SIEM solutions to monitor security events across the environment.
    10. Conduct regular security compliance assessments and audits.
    11. Configure and manage Azure Sentinel for advanced threat hunting and response.
    12. Implement security baselines following Microsoft guidelines.
    13. Utilize EDR tools for proactive threat detection and response.
    14. Develop and implement Insider Risk Management strategies to prevent internal threats.
    15. Establish and automate security workflows using security automation and orchestration tools
    16. Implement and manage Microsoft Defender for Endpoint for comprehensive endpoint protection.
    17. Utilize Azure Bastion for secure and seamless RDP and SSH connectivity to Azure VMs.
    18. Administer Microsoft Cloud IAM for effective identity and access management.
    19. Manage Azure Key Vault to safeguard and manage sensitive information such as secrets and certificates.
    20. Implement and monitor Azure AD Identity Protection for risk-based conditional access policies.
    21. Conduct ongoing threat and vulnerability management to identify and remediate security weaknesses.
    22. Oversee Microsoft Endpoint Configuration Manager for unified endpoint management.
    23. Implement Azure Security Policies and Blueprints to ensure a secure cloud environment.
    24. Utilize Information Rights Management (IRM) for document-level control and protection.
    25. Configure and manage Azure Firewall and Network Security Groups for network security.

Projects

Intune for education

Defender for Office & Endpoint solution

1. Architect and customize Intune configurations to address complex educational and security needs.
2. Lead cross-functional teams in designing and implementing scalable Intune solutions.
3. Provide expert guidance and mentorship to junior team members on Intune deployment and management.
4. Conduct regular assessments and audits of the Intune environment for optimization and risk mitigation.
5. Drive innovation by leveraging advanced Intune functionalities to enhance educational technology capabilities.
6. Establish and maintain vendor relationships, overseeing contracts and ensuring optimal service delivery.
7. Develop and execute change management strategies for Intune updates and improvements.
8. Represent the organization in forums, conferences, or industry groups related to Intune and educational technology.
9. Collaborate with legal and compliance teams to ensure Intune's adherence to data privacy and security standards.
10. Monitor and manage budgetary considerations related to Intune deployment and operations.
11. Continuously evaluate emerging technologies and trends, advising on potential integrations with Intune.
12. Oversee the creation of comprehensive documentation and training materials for Intune users.
13. Resolve escalated issues and provide strategic guidance for complex problem-solving related to Intune.
14. Evaluate the performance and impact of Intune on educational outcomes, providing insights for improvement.
15. Develop a roadmap for scaling Intune operations and capabilities aligned with organizational growth.
16. Drive continuous improvement initiatives, optimizing Intune workflows and processes to enhance efficiency and effectiveness.

1. Develop and execute change management strategies to seamlessly integrate Defender updates and improvements.
2. Represent the organization in security forums, conferences, or industry groups related to Defender and Cybersecurity.
3. Collaborate with legal and compliance teams to ensure Defender adherence to data privacy and security standards
4. Monitor and manage budgets allocated for Defender implementation and ongoing operations.
5. Evaluate emerging security technologies and trends, advising on potential integrations with Defender.
6. Oversee the creation of comprehensive documentation and training materials for Defender users and IT staff.
7. Resolve escalated security incidents and provide strategic guidance for complex problem-solving using Defender.
8. Evaluate the impact of the Defender on security posture and incident response, providing insights for continual improvement.
9. Develop a roadmap for scaling Defender capabilities in alignment with organizational growth and evolving threat landscapes.
10. Drive continuous improvement initiatives, optimizing Defender workflows and processes to enhance security resilience.

Cloud-Native Security Architecture

1. Design and implement security controls for cloud-native applications.
2. Implement secure APIs and microservices architecture.
3. Configure and manage Azure Kubernetes Service (AKS) security features.
4. Conduct regular security assessments for serverless architectures.
5. Implement and manage Azure Functions security controls.
6. Collaborate with development teams to implement zero-trust security models.
7. Implement network security controls for cloud-native environments.
8. Configure and monitor Azure Security Center for cloud-native security.
9. Conduct training sessions on secure coding practices for cloud-native development.
10. Integrate automated security testing into the CI/CD pipeline for cloud-native applications

Education

Untitled-1.png

M Tech Data Mining (Software systems)– from Birla Institute of Technology

Certificate

Microsoft Certified: Defender for Endpoint Administrator Associate
Microsoft 365 Certified: Security Administrator Associate
Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Microsoft Certified: Security, Compliance, and Identity Fundamentals
Certified Cloud Security Professional (CCSP)
Microsoft Certified: Information Protection Administrator Associate
Certified Ethical Hacker (CEH)

bottom of page