At Quisitive, we bring together a team of world-class Microsoft consultants dedicated to helping organizations achieve their goals through innovative solutions. Quisitive is a trusted global Microsoft services and solutions partner with a proven track record of delivering impactful results for our customers.
Our success is built on the expertise and commitment of our people. When you join Quisitive, you become part of a collaborative team focused on solving complex challenges and delivering exceptional value to customers. We provide the tools, resources, and support you need to excel—because when our customers succeed, we succeed. We also invest in your professional growth through continuous learning opportunities, certifications, and career development programs designed to keep you at the forefront of Microsoft technologies.
Overview
The Senior Security Consultant is a client‑facing, hands‑on senior practitioner within Quisitive’s Managed Security & Compliance (Spyglass) service. You’ll partner with Security Coaches, Customer Success Managers (CSMs), and MDR/SecOps to assess, harden, and continuously improve customer security postures across Microsoft 365 and Azure. You will own delivery for complex initiatives (Zero Trust, threat detection/response, compliance programs), participate in technical workshops and solution alignment sessions.
This role emphasizes measurable outcomes, clear roadmaps, and repeatable implementation patterns (cases/backlog), with frequent use of Microsoft Defender, Microsoft Sentinel, Entra ID, Intune, and Microsoft Purview (Information Protection, Data Loss Prevention, Insider Risk, eDiscovery).
Key Responsibilities
Security Posture & Roadmap Delivery
- Participate in end‑to‑end delivery of roadmap items produced in Security Coaching and Advisement sessions (identity, endpoint, data, app, network control planes).
- Translate Zero Trust principles into tangible controls and guardrails across Entra ID (CA, MFA, PIM), Intune (hardening, ASR), Defender (Endpoint/Identity/Cloud Apps/M365), Sentinel (analytics, automation), and Microsoft Purview (labels, policies, DLP, Insider Risk, eDiscovery).
- Define success criteria and validation steps; capture outcomes in status reports and executive summaries for SAW/QBR meetings.
Detection, Response, and Automation
- Design and tune Sentinel analytics rules, UEBA, data connectors, and KQL queries; implement playbooks (Logic Apps) for triage and automated response.
- Integrate Defender signals and Purview events into incident workflows; reduce mean time to detect/respond via targeted automation.
- Collaborate with MDR/SecOps to align call‑trees/escalations with ticketing processes; rationalize alert sources to minimize noise and maximize fidelity.
Data Protection & Microsoft Purview (Explicit)
- Lead Information Protection implementations: sensitivity labels, automatic/manual labeling, label‑scoped encryption, and policy scoping for prioritized data sets.
- Deploy Purview DLP for Exchange/SharePoint/OneDrive/Endpoints; build rules, exclusions, incident routing, and user education workflows.
- Stand up Insider Risk indicators, policies, and triage processes; ensure appropriate privacy/configuration baselines and stakeholder governance.
- Guide eDiscovery (Standard/Premium): case design, hold/collection strategies, review workflows, legal/compliance stakeholder alignment.
- Establish data lifecycle and retention policies that balance security, compliance, and usability.
Identity, Endpoint, and Cloud Controls
- Harden identity: Conditional Access, phishing‑resistant MFA, access reviews, privileged access management (PIM), break‑glass patterns.
- Harden endpoints: Intune baselines, configuration profiles, ASR rules, endpoint DLP, device compliance gates; integrate with Defender for Endpoint.
- Harden cloud services: Defender for Cloud Apps (discovery, session policies), secure collaboration and guest access, email security in Defender for Office 365.
Compliance Frameworks & Audits
- Assist with mapping controls to NIST CSF, CIS, HIPAA, SOC 2, and customer‑specific requirements; produce evidence, control narratives, and remediation plans.
- Partner with Security Coaches to convert framework gaps into a sequenced, budget‑aware case backlog and measurable milestones.
Client Communication & Leadership
- Assist and/or lead technical workshops, discovery sessions, and monthly stand‑ups; present findings and recommendations to both technical and executive audiences.
- Create clear artifacts (runbooks, standard operating procedures, reference architectures) and mentor associate consultants on delivery quality.
- Proactively identify account growth opportunities and collaborate with CSMs to shape scope.
Required Qualifications
- 5–8+ years in cloud/security consulting or operations, with 3+ years focused on Microsoft security across M365 & Azure.
- Demonstrable depth in at least three of the following:
- Microsoft Purview: Information Protection (labels/auto‑labeling), DLP (service & endpoint), Insider Risk, eDiscovery (Std/Premium), Records/Retention.
- Microsoft Sentinel: data connectors, KQL analytics, UEBA, playbooks/Logic Apps, SOAR patterns.
- Microsoft Defender: Endpoint, Identity, Office 365, Cloud Apps; configuration and tuning at scale.
- Entra ID (Azure AD): Conditional Access, MFA, PIM, Access Reviews, identity governance.
- Intune/Endpoint Management: baselines, device compliance, ASR, policy hardening.
- Experience mapping controls to HIPAA, NIST CSF, CIS, SOC 2 and producing audit‑ready artifacts.
- Scripting/automation fundamentals: ability to operationalize repeatable patterns.
- Strong consulting competencies: customer discovery, backlog creation, estimation, and status/reporting; executive communication skills.
Preferred Qualifications
- Certifications: SC‑200, SC‑400, SC‑900, MS‑500, AZ‑500; CISSP/CISM a plus.
- Experience integrating MDR providers (into Sentinel/Defender/Purview workflows.
- Exposure to data classification programs and cross‑functional governance (Legal, Compliance, HR, Security).
- Familiarity with cost/licensing considerations and pragmatic adoption planning.
Ways of Working
- Client‑facing with periodic workshops and recurring cadence (stand‑ups, advisement, SAW/QBR).
- Collaborates closely with Security Coach, CSM, and the Delivery Manager; manages technical scopes under time‑boxed cases/backlogs.
- Able to work across EST/CST time zones; occasional after‑hours support for critical changes or incidents (coordinated through CSM/Coach).