Microsoft AD and AAD Infrastructure, Managed Services, Infrastructure Support, Security Operations
Active Directory Administration
Manage operation, health, and security of a multi-site domain.
Manage on-prem active directory environment and associated services like DNS, certificate services, etc.
Administer and support NCAOC Identity Management platform.
Public Key Infrastructure (Management and Deployment)
Active Directory Security
Manage Group Policy Objects (GPOs).
Support on-prem, hybrid, and cloud identity and access management.
Support identity and asset lifecycle management.
Assist with potential compromised account investigations.
Create and tune DLP and AIP policies.
Azure AD Administration
Administer and maintain the hybrid and cloud-only identities across multiple Azure AD tenants.
Create and maintain Conditional Access Policies.
Support SAML and OAuth application configurations.
Active Directory Federation Service (ADFS configuration and Migration)
Multifactor Authentication Server (Migration from On-Prem to Cloud)
Modern Authentication
Windows Hello for Business Configuration
Hybrid Azure AD join
Smart Card configuration
Azure Infrastructure Management
Virtual Machine Management
Backup and Recovery
Azure Monitoring
Alert Configuration
Azure Policy deployment
Office 365 Administration
Office 365 Client Deployment (org wide)
Office 365 Exchange Migration and Setup
SharePoint Migration and Setup
Microsoft Teams setup and configuration
General Administration
Perform troubleshooting, root cause analysis, and performance benchmarking.
Provide support for issues ranging from single-user issues to system-wide problems.
Penetration Testing
Understand complex computer systems and technical cyber security.
Plan and create penetration methods, scripts and tests
Remote testing of a client's network or onsite testing of their infrastructure to expose weaknesses in security
Simulate security breaches to test a system's relative security
Create reports and recommendations from findings, including the security issues uncovered and level of risk
Advise on methods to fix or lower security risks to systems
Present findings, risks and conclusions to management and other relevant parties
Consider the impact your 'attack' will have on the business and its users
Understand how the flaws could affect a business, or business function, if they're not fixed.
Founded: 2023