We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Cloud Engineer - Public Sector, Operations

BDO USA, LLP
United States, Florida, Orlando
450 South Orange Avenue (Show on map)
Sep 22, 2024

Job Summary:

The Cloud Engineer is responsible for configuring, troubleshooting, and managing Microsoft Government Community Cloud High (GCC High) services and Office 365 applications, ensuring alignment with security guidelines and best practices. This role involves configuring and maintaining Azure access, conditional access policies, information sensitivity labels, and Microsoft Endpoint Manager/Intune for seamless endpoint management and user support.

Job Duties:



  • Designs, implements, monitors, and maintains Microsoft GCC High services to support internal projects
  • Configures, deploys, and manages Microsoft Office 365 applications and features to meet business requirements, industry best practices, and security guidelines
  • Manages Microsoft Azure access and authentication
  • Designs, implements, monitors, and maintains conditional access policies and configure MFA in Microsoft Azure
  • Configures and monitors data sensitivity labels with Azure Information Protection
  • Designs, implements, monitors, and maintains Microsoft Endpoint Manager/Intune application, services, and features for Windows 10 & 11 endpoints
  • Enrolls iPhones using Apple Business Manager and Microsoft Endpoint Manager/Intune
  • Identifies, troubleshoots, documents, and resolves Microsoft Endpoint Manager/Intune errors and conflicts
  • Creates and maintains detailed technical documentation, including system configurations, technical specifications, designs, processes, operational procedures, knowledge articles, test plans, and test results
  • Develops and delivers training programs to educate stakeholders, users, and IT support staff on best practices and policies
  • Assists in the automation of manual tasks and processes
  • Performs in-depth system analysis to determine root-cause of application and system performance related issues
  • Assists the Support Center to resolve cases on an as-needed basis
  • Configures and optimizes 3rd-party software
  • Configures and utilizes software-based computer protection tools (i.e., software firewalls, antivirus software, anti-spyware)
  • Interfaces with customers
  • Anticipates, identifies, and corrects system performance, availability, capacity, or configuration problems
  • Manages individual work schedule with minimal oversight and proactively communicate status, progress, and risks to management and project leadership
  • Attends 40 hours of continuous learning (may include professional memberships, forums, lunch and learns, roundtables, online training courses, and maintaining certifications)
  • Other duties as assigned


Supervisory Responsibilities:



  • N/A


Qualifications, Knowledge, Skills, and Abilities:

Education:



  • High School Diploma or GED, required
  • Bachelor's in Computer Science, Cybersecurity, Information Technology, Software Engineering, Information Systems, or Computer Engineering, preferred


Experience:



  • Five (5) or more years of relevant experience, required


License/Certifications:



  • Certifications addressing cloud security, mobile device management, mobile application management, operating systems, technical support, managing, maintaining, troubleshooting, installing, configuring cloud infrastructure, authentication, and desktop hardware, software, and configurations, preferred


Software:



  • Client operating systems - Windows 10 and Windows Server 2016 and newer
  • Familiarity with disaster/recovery policy (i.e. Veeam or other backup suites, tape media, and disaster recovery sites)
  • Operating system command-line tools - Primarily Windows batch scripting and PowerShell


Other Knowledge, Skills, and Abilities:



  • FedRAMP, NIST SP 800-53, NIST SP 800-171, NIST CSF, Cybersecurity Maturity Model Certification (CMMC), ISO 27000
  • Laws, regulations, policies, and ethics as they relate to cybersecurity
  • Technology security principles and methods (i.e., firewalls, demilitarized zones, encryption)
  • Organizational technology user security policies (i.e., account creation, password rules, access control)

Applied = 0

(web-c5777866b-x6xvf)