Skip to content
mimi

Cybersecurity Consultant DLP - Remote 8

DivIHN Integration

Remote · US Full-time Today

About the role

About DivIHN

DivIHN (pronounced divine) is a CMMI ML3-certified Technology and Talent solutions firm. Driven by a unique Purpose, Culture, and Value Delivery Model, we enable meaningful connections between talented professionals and forward-thinking organizations. Since our formation in 2002, organizations across commercial and public sectors have been trusting us to help build their teams with exceptional temporary and permanent talent.

Visit us at to learn more and view our open positions.

DivIHN, the IT Asset Performance Services organization, provides Professional Consulting, Custom Projects, and Professional Resource Augmentation services to clients in the Mid-West and beyond. The strategic characteristics of the organization are Standardization, Specialization, and Collaboration.

DivIHN is an equal opportunity employer. DivIHN does not and shall not discriminate against any employee or qualified applicant on the basis of race, color, religion (creed), gender, gender expression, age, national origin (ancestry), disability, marital status, sexual orientation, or military status.

About the Role

  • Title: Cybersecurity Consultant (DLP)
  • Duration: 6 Months
  • Location: Remote Only
  • Clearance: U.S. Citizens only (DoD requirements)
  • Employment Type: W2 candidates only. Third-party or C2C candidates will not be considered.

Background

The Secure Horizons Program is tasked with identifying the Clients Field Programs currently hosted in a remote commercial environment and assisting those Field Programs in migration to a government-certified high-security environment. This initiative ensures compliance with federal security requirements while maintaining accessibility and uptime for critical applications and data. The DLP 1B project aims to roll out data protection controls using Varonis and Purview and includes the creation of documentation and training for all affected users. To support the execution of this effort, the Secure Horizons program requires cybersecurity professional services to augment integral capabilities during ongoing enterprise initiatives. These services will provide operational support, technical validation, and security sustainment activities, enabling internal teams to focus on architecture, governance, and strategic execution while maintaining a secure and compliant environment.

Goals and Objectives

  • Maintain secure posture during migration
  • Ensure security tooling is configured and validated
  • Reduce internal workload via augmentation
  • Enable focus on architecture and governance
  • Maintain alignment with NIST SP 800-171 / CMMC

Scope of Work

Included Services

The Contractor shall provide full-time Cyber Professional Services to support both the Secure Horizons Program and the Data Loss Prevention (DLP) project.

Tasks and Responsibilities

  1. Security Configuration and Hardening

    • Assist with the implementation and validation of:
      • CIS baseline configurations (L1 minimum)
      • Secure configuration of endpoints, identities, and cloud services
    • Validate security configurations across:
      • Entra ID (Azure AD)
      • Intune-managed devices
      • Microsoft 365 services
    • Identify and remediate configuration drift
  2. Vulnerability Management

    • Validate agent deployment and reporting coverage
    • Perform vulnerability triage and prioritization
    • Track remediation progress and validate closure
    • Identify gaps in scanning coverage (devices, subnets, cloud resources)
  3. Microsoft Defender Support

    • Assist with configuration, tuning, and validation of:
      • Microsoft Defender for Endpoint
      • Defender for Cloud Apps
      • Defender for Identity
    • Ensure:
      • Devices are properly onboarded
      • Telemetry is being received
      • Alerts are actionable and tuned
    • Support Advanced Hunting queries and validation
    • Assist configuration and install of ARC on servers
  4. Logging and Monitoring

    • Validate log ingestion into Microsoft Sentinel and/or SIEM
    • Ensure telemetry coverage across:
      • Endpoints
      • Identities
      • Cloud applications
    • Identify gaps in logging or integration
    • Assist in alert tuning and reduction of false positives
    • Validate integrations (e.g., Okta, Defender, M365, network tools)
  5. Identity

    • Okta MFA support
    • Access Reviews
  6. Migration Security Validation

    • Validate security posture before, during, and after migration waves:
      • Devices properly onboarded to security tools
      • Policies applied correctly
      • No loss of visibility or control
    • Identify and escalate security gaps introduced by migration activities
    • Mobile Device MAM/MDM support
  7. Data Loss Prevention

    • Design and Concept Review, in particular to cover AI workloads and telemetry received via Defender CSPM/AI modules
    • Definition and implementation of related:
      • Purview Rules
      • Intune Policies
      • Varonis Configuration
    • CSPM/AI Monitoring and the related Sentinel Alerting BAU process (playbooks, support, changes)
    • Creation of Documentation and Training Material in SCORM 2.0 format in collaboration with our internal training department

Out of Scope

The Contractor System Administrator will not be responsible for:

  • Application Development
  • System Administration
  • Network Design, Maintenance and Engineering
  • Data Science and Machine Learning
  • Cloud or Infrastructure Architecture
  • Project Management
  • Enterprise IT Governance

Key Requirements

  • Security clearance is not required.
  • Experience with Defender, Sentinel, Intune, Entra ID, Okta, Tenable, Purview, Varonis, AI solutions and related security monitoring, SCORM 2.0
  • Knowledge of NIST 800-171 / CMMC
  • SOC / security operations experience

Preferred Certifications

  • SC-200
  • CISSP

Past Performance

  • Support during IT transformations
  • Defender/SIEM operations
  • Vulnerability management experience
  • DLP rollout based on Varonis and Purview

Contact Information

For further inquiries regarding the following opportunity, please contact our Talent Specialist, Lavanya at (224) #-#.

Requirements

  • Experience with Defender, Sentinel, Intune, Entra ID, Okta, Tenable, Purview, Varonis, AI solutions and related security monitoring, SCORM 2.0
  • Knowledge of NIST 800-171 / CMMC
  • SOC / security operations experience

Responsibilities

  • Assist with the implementation and validation of CIS baseline configurations (L1 minimum)
  • Secure configuration of endpoints, identities, and cloud services
  • Validate security configurations across Entra ID (Azure AD), Intune-managed devices, and Microsoft 365 services
  • Identify and remediate configuration drift
  • Validate agent deployment and reporting coverage
  • Perform vulnerability triage and prioritization
  • Track remediation progress and validate closure
  • Identify gaps in scanning coverage (devices, subnets, cloud resources)
  • Assist with configuration, tuning, and validation of Microsoft Defender for Endpoint, Defender for Cloud Apps, and Defender for Identity
  • Ensure devices are properly onboarded and telemetry is being received
  • Ensure alerts are actionable and tuned
  • Support Advanced Hunting queries and validation
  • Assist configuration and install of ARC on servers
  • Validate log ingestion into Microsoft Sentinel and/or SIEM
  • Ensure telemetry coverage across endpoints, identities, and cloud applications
  • Identify gaps in logging or integration
  • Assist in alert tuning and reduction of false positives
  • Validate integrations (e.g., Okta, Defender, M365, network tools)
  • Okta MFA support
  • Access Reviews
  • Validate security posture before, during, and after migration waves
  • Ensure devices are properly onboarded to security tools
  • Ensure policies are applied correctly
  • Ensure no loss of visibility or control
  • Identify and escalate security gaps introduced by migration activities
  • Mobile Device MAM/MDM support
  • Data Loss Prevention Design and Concept Review, in particular to cover AI workloads and telemetry received via
  • Defender CSPM/AI modules Definition and implementation of related Purview Rules, Intune Policies, Varonis Configuration
  • CSPM/AI Monitoring and the related Sentinel Alerting BAU process (playbooks, support, changes)
  • Creation of Documentation and Training Material in SCORM 2.0 format in collaboration with our internal training department

Skills

AI solutionsCMMCCSPM/AIDefenderEntra IDIntuneMAM/MDMMicrosoft 365Microsoft Defender for Cloud AppsMicrosoft Defender for EndpointMicrosoft Defender for IdentityNIST 800-171OktaPurviewSC-200SCORM 2.0SentinelSOCTenableVaronis

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free