At a Glance
- Tasks: Implement hands-on security controls for M365, focusing on device management and identity protection.
- Company: Dynamic tech firm offering remote work and a collaborative environment.
- Benefits: Competitive day rate, flexible remote work, and potential contract extension.
- Why this job: Join a fast-paced team and make a real impact on security improvements.
- Qualifications: Proven experience with Intune, Azure AD, and security frameworks like CIS and NIST.
- Other info: Opportunity to work in a dynamic environment with significant career growth potential.
We are seeking a highly capable, delivery-focused M365 Security Consultant to execute a series of time-boxed security improvement phases across device management, identity, access, and multiple site security. This role is not advisory or architectural only—the contractor must deliver hands-on implementation of security controls aligned to:
- CIS Critical Security Controls v8 - IG2
- CIS Benchmarks
- NIST Cybersecurity Framework - Tier 3 (Repeatable)
Key Responsibilities
- Mobile Device Management (MDM)
- Design MDM setup for corporate and BYOD devices.
- Define required MDM/MAM/Conditional Access configuration aligned to CIS IG2.
- Implement and enforce:
- Corporate and BYOD MDM policies
- Separate compliance & Conditional Access policies
- MAM controls and approved application enforcement
- Deploy applications via Company Portal.
- Document configuration, exceptions, and operational guidance.
- Ensure security and compliance visibility/reporting is operational.
- Assess current identity and authentication controls.
- Define scope and implementation plan for SSO and MFA.
- Implement SSO/MFA policies and Conditional Access configurations.
- Enforce authentication policies with evidence of operation.
- Deliver operational documentation and testing evidence.
- Define device hardening baselines aligned to CIS Benchmarks.
- Implement and enforce the hardening baseline using technical controls.
- Conduct multiple site location security and architecture review.
- Deliver and implement actionable security remediation.
- Evidence compliance and enforcement.
Required Experience
- Technical Expertise
- Proven hands-on experience implementing Intune/Endpoint Manager for Corporate + BYOD environments.
- Strong capability implementing MAM, Conditional Access, App Protection Policies, and Zero Trust aligned controls.
- Solid experience with Azure AD / Entra ID, MFA, SSO, and identity governance.
- Practical delivery of security hardening aligned to CIS Benchmarks.
- Experience working with retail or distributed site/store environments (desirable).
- Security Framework Knowledge
- Deep understanding of:
- CIS Controls v8 (IG2)
- CIS Benchmarks
- NIST CSF (Tier 3 maturity)
Delivery Profile
- Must be a hands-on implementer (not advisory or consultancy only).
- Able to work in fast-paced, time-boxed delivery cycles.
- Comfortable with weekly milestone reporting and governance.
- Capable of documenting exceptions, justifications, and compensating controls.
Key Deliverables
- MDM current-state assessment and CIS-aligned configuration design.
- Implemented MDM, MAM, and Conditional Access policies in production.
- Fully implemented and enforced MFA and SSO.
- Auth, device, and application compliance reporting.
- Enforced CIS-aligned device hardening baseline.
- Implemented store security improvements.
- Complete technical documentation, evidence of implementation, and handover materials.
- Documented control exceptions with technical justification.
M365 Security Consultant employer: Amtis Professional Ltd
Contact Detail:
Amtis Professional Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land M365 Security Consultant
✨Tip Number 1
Network, network, network! Reach out to your connections in the industry and let them know you're on the lookout for M365 Security Consultant roles. You never know who might have a lead or can put in a good word for you.
✨Tip Number 2
Prepare for interviews by brushing up on hands-on implementation scenarios. Be ready to discuss your experience with Intune, MDM, and security frameworks like CIS and NIST. Show us you can deliver results, not just talk about them!
✨Tip Number 3
When you get an interview, don’t just answer questions—ask them too! Inquire about the team’s current challenges with M365 security. This shows your genuine interest and helps you gauge if it’s the right fit for you.
✨Tip Number 4
Apply through our website! We want to see your application directly, and it gives you a better chance to stand out. Plus, we love seeing candidates who are proactive about their job search!
We think you need these skills to ace M365 Security Consultant
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the M365 Security Consultant role. Highlight your hands-on experience with Intune, Azure AD, and security frameworks like CIS and NIST. We want to see how your skills match what we're looking for!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're the perfect fit for this role. Share specific examples of your past work that align with the responsibilities listed in the job description. We love a good story!
Showcase Your Technical Skills: Don’t hold back on showcasing your technical expertise! Be specific about your experience with MDM, MFA, and device hardening. We’re looking for someone who can hit the ground running, so let us know what you’ve done!
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep everything organised and ensures your application gets the attention it deserves. We can't wait to hear from you!
How to prepare for a job interview at Amtis Professional Ltd
✨Know Your Stuff
Make sure you’re well-versed in M365 security concepts, especially around Intune, Endpoint Manager, and the CIS Controls. Brush up on your hands-on experience with MDM, MFA, and SSO, as you'll need to demonstrate your practical skills during the interview.
✨Showcase Your Delivery Skills
This role is all about implementation, not just advice. Be ready to discuss specific projects where you've successfully delivered security improvements. Use the STAR method (Situation, Task, Action, Result) to structure your answers and highlight your hands-on experience.
✨Prepare for Technical Questions
Expect technical questions that dive deep into your knowledge of security frameworks like NIST and CIS Benchmarks. Practise explaining how you’ve applied these frameworks in real-world scenarios, and be prepared to discuss any challenges you faced and how you overcame them.
✨Document Everything
Since documentation is key in this role, be prepared to talk about how you document your processes and decisions. Bring examples of your documentation style, and explain how it helps ensure compliance and operational efficiency in your previous roles.