0% found this document useful (0 votes)
39 views2 pages

MuhammadShafiq Azure

Uploaded by

syedmurtuza556
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views2 pages

MuhammadShafiq Azure

Uploaded by

syedmurtuza556
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Muhammad Shafiq Phone

Personal Info

Microsoft Security Engineer & Information Protection Administrator


+971555464573
E-mail
khurramwzd@gmail.com
Objective
Microsoft Office 365/Azure Security Expert with strong customer service,
Skills
security and professional orientation. A dedicated Microsoft 365/Azure
Security Professional with diverse work experiences in areas of Azure & Office 365 Administration
cloud-based identity and access implementation and securing O365 hybrid Identity & Access Management
environment. Highly skilled in articulating technical information to IT VNet, VNet Peering, CDN
members, users or system clients and ability to work with others in a
Azure Firewall, NSG, WAF
collaborative environment. Superior understanding of business goals and
AIR, ZAP, Conditional Access
an appetite in applying technology in solving business problems.
Privildge Identity Management

2014-02- Experience Intune / Endpoint Manager

present E3CORP FZ LLC - Dubai, U.A.E


MICROSOFT PURVIEW
Data Loss Prevention
Azure and Office 365 Administration Data Classification

Performing a discovery of environment and designing a technical Compliance Management

onboarding process for their Azure/O365 tenants.I.e. endpoint manager, Data Governance
Identity protection, Conditional access, O365 ATP, Azure ATP, RBAC. Inside Risk Management

Leveraging passwordless authentication to mitigate the risk password


attacks from privileged accounts and enabling MFA on accounts which MICROSOFT SENTINEL
are not capable of having passwordless authentication. Data Ingestion
SOAR/Automation
Configured and Monitor sign-ins, audit logs; enforce MFA and Privilege Threat Intelligence
Identity Management (PIM) principle. Analytics Rules
UEBA Rules
Deployed and managed Azure Virtual Machines, Virtual Networks, and
Threat Hunting
Azure Active Directory to support critical business applications, ensuring
Incident Response
high availability and scalability.
MICROSOFT DEFENDER SUITE
Implemented security measures in Azure, including Network Security
Defender for Office 365
Groups (NSGs), Azure Firewall, and Azure Security Center, to protect
resources from threats. Application Security (CASB)
Defender of Endpoint EDR
Protecting virtual machines data by using Azure Disk Encryption
Defemder for Identity
(ADE) that is using BitLocker for windows VMs and DM-Crypt for
Defender for Cloud
Linux VMs.
Vulnurability Management
Manage Microsoft Intune / Endpoint Manager , MDM & MAM.
I.e. Device enrollment, Device Configuration, Device Security,
Conditional Access policy and Device compliance. Certifications

Microsoft Certified Information


Protection Administrator Associate
Data Governance (Data Security)
Microsoft Certified Security
Defines and implements data protection strategies and procedures using Engineer Associate
Microsoft Purview and other relevant tools.
Microsoft Certified Security
Implementation and management of data governance policies, including
Operation Analyst Associate
data classification, document fingerprinting labeling, and access controls
using Microsoft Purview and other Azure services. CISM
Developed and maintained data classification, document fingerprinting
and data protection policies for sensitive inofrmation.

Assisted in the implementation and configuration of data cataloging, Education


data life cycle and data Retention period.
MS (Information & Communication
Generates reports and insights on data usage, access patterns, and data Systems Security)
lineage. The Royal Institute of Technology,
Stockholm (Sweden)
Collaborated with IT teams to ensure compliance with regulatory requirements
and standards.
Microsoft Sentinel and Defender for Endpoint (EDR)

Onboarding Azure Sentinel to receive logs from data sources, detected


previously undetected threats, investigated threats with artificial
intelligence and responded to incidents rapidly using playbooks and
KQL queries.

Configure and manage Microsoft Sentinel rules, playbooks, and custom


queries to enhance threat detection and response capabilities.

Monitor and analyze security events in Microsoft Sentinel to detect and


respond to potential threats and breaches.

Analyzed security logs and events from multiple sources, creating


custom dashboards and reports for real-time monitoring

Implemented and managed Microsoft Defender for Endpoint to protect


Endpoints against advanced threats.

Collaborated with the incident response team to investigate and


respond to security incidents, ensuring minimal impact on
business operations.

Set up and configured Microsoft Defender for endpoint, and Exchange


Online Protection, implement Microsoft defender for identity.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy