Cloud Security Consultant/Azure
Randstad

Toronto, Ontario
•1 hour ago
•No application
About
Are you a ”Cloud Security Consultant/Azure” looking for a new opportunity?
Are you looking for a new contract opportunity?
We are pleased to offer you a new contract opportunity for you to consider: Cloud Security Consultant/Azure
-Start: ASAP
-Estimated length: 12 months
-Location: Toronto
-Hybrid role
Advantages
You will have an opportunity to work with a leading employer in the local market.
Responsibilities
Work Management – Cloud-Based IAM (Azure Focus)
• Configure, maintain, and support cloud-native IAM platforms, with a focus on Microsoft Entra ID (formerly Azure AD).
• Deploy IAM solutions and integrations across Azure services, including Conditional Access, Identity Protection, and Privileged Identity Management (PIM).
• Stay current with IAM trends, tools, and methodologies, especially those related to cloud identity governance, zero trust architecture, and hybrid identity models.
• Collaborate with cloud architects, application owners, and stakeholders to design and implement secure identity solutions in a multi-cloud and hybrid environment. ...
Are you looking for a new contract opportunity?
We are pleased to offer you a new contract opportunity for you to consider: Cloud Security Consultant/Azure
-Start: ASAP
-Estimated length: 12 months
-Location: Toronto
-Hybrid role
Advantages
You will have an opportunity to work with a leading employer in the local market.
Responsibilities
Work Management – Cloud-Based IAM (Azure Focus)
• Configure, maintain, and support cloud-native IAM platforms, with a focus on Microsoft Entra ID (formerly Azure AD).
• Deploy IAM solutions and integrations across Azure services, including Conditional Access, Identity Protection, and Privileged Identity Management (PIM).
• Stay current with IAM trends, tools, and methodologies, especially those related to cloud identity governance, zero trust architecture, and hybrid identity models.
• Collaborate with cloud architects, application owners, and stakeholders to design and implement secure identity solutions in a multi-cloud and hybrid environment. ...
• Propose and implement monitoring solutions for IAM system performance, capacity, and security posture, leveraging tools like Microsoft Defender for Identity and Log Analytics.
• Analyze and design Role-Based Access Control (RBAC) models aligned with Azure resource hierarchies (management groups, subscriptions, resource groups) to meet business and compliance needs.
• Understand IAM products and their implementation at both technical and functional levels, including OAuth 2.0, OpenID Connect, and SAML protocols.
• Build and maintain strong relationships with internal clients and stakeholders, aiming to exceed expectations through secure and scalable identity solutions.
• Create and maintain clear, accurate documentation for IAM processes, including access reviews, entitlement management, and identity lifecycle workflows.
• Engage with technology partners to evaluate and integrate their IAM offerings into the Azure ecosystem.
• Provide support for security incident response involving identity-related threats, including account compromise and unauthorized access.
• Assist with root cause analysis for identity-related incidents, leveraging audit logs, sign-in reports, and risk detections.
• Ensure compliance with security standards and regulatory requirements (e.g., ISO 27001, NIST, CIS Benchmarks) for identity and access management.
• Review and optimize operational processes for provisioning/de-provisioning, privileged access, authentication, and authorization across cloud and hybrid environments.
• Maintain accurate and up-to-date documentation for IAM workflows, policies, and procedures.
Asset Management – Cloud-Based IAM (Azure Focus)
• Act as a support resource for cloud-based IAM platforms, providing advanced assistance to end users including Security Operations, IT Helpdesk, and other stakeholders; liaise with Microsoft support and third-party vendors as needed for issue resolution.
• Investigate and remediate issues related to identity-linked cloud assets, including misconfigurations in Azure RBAC, Conditional Access policies, and Privileged Identity Management (PIM) roles.
• Take ownership of incident and problem tickets related to IAM and asset access, driving resolution through collaboration with internal teams and external vendors.
• Manage acquisition and onboarding of future cloud security solutions, including associated infrastructure, configuration, and operational support for identity-aware asset management.
• Ensure all assets—whether on-prem, hybrid, or cloud-native—are governed by appropriate IAM controls, including automated provisioning/de-provisioning, access reviews, and policy enforcement.
• Support integration of asset management tools with IAM platforms to maintain visibility and control over Azure resources, service principals, managed identities, and non-human accounts.
• Maintain accurate documentation of asset configurations, IAM policies, and access entitlements to support audits, compliance, and operational excellence.
Service Management – Cloud-Based IAM (Azure Focus)
• Provide advanced support for service tickets related to cloud IAM and network security technologies, including issues with Microsoft Entra ID, Conditional Access, Azure Firewall, and Defender for Identity.
• Collaborate with the Security Operations Center (SOC) and IT Helpdesk to resolve identity-related incidents, ensuring timely and secure resolution across hybrid and cloud environments.
• Follow TH’s ITIL-aligned processes for Problem, Request, Incident, and Change Management, ensuring traceability and compliance in cloud IAM operations.
• Liaise with Microsoft and third-party vendors to escalate and resolve complex IAM and cloud security issues, including service outages, misconfigurations, and policy enforcement gaps.
Continuous Improvements – Cloud-Based IAM (Azure Focus)
• Identify opportunities to enhance and mature existing cloud IAM solutions, including access governance, privileged access management, and identity lifecycle automation, to maximize risk reduction and business alignment.
• Continuously evaluate and improve Azure IAM configurations, such as RBAC models, Conditional Access policies, and PIM roles, to align with evolving threat landscapes and compliance requirements.
• Create, update, and manage technical documentation including knowledge base articles, standard operating procedures, and departmental processes related to cloud IAM and security operations.
• Contribute to the development of automated workflows for identity provisioning, access reviews, and incident response using tools like Microsoft Graph API, Azure Logic Apps, and Power Automate.
• Perform any other activities within the scope of the role that support the secure and efficient operation of IAM platforms and cloud security services.
Tools & Technologies – Cloud-Based IAM & Security Operations
Identity & Access Management
• Microsoft Entra ID (formerly Azure AD) – Core identity platform for authentication, authorization, and directory services.
• Azure AD Conditional Access – Policy-based access control for securing user and device access.
• Privileged Identity Management (PIM) – Just-in-time access and role elevation for privileged accounts.
• Azure AD Identity Protection – Risk-based identity threat detection and remediation.
• Microsoft Graph API – Automation and integration of IAM workflows and reporting.
Security Operations & Monitoring
• Microsoft Sentinel – Cloud-native SIEM for threat detection, investigation, and response.
• Microsoft Defender for Identity – Identity threat detection and behavioral analytics.
• Azure Monitor & Log Analytics – Performance and security telemetry for IAM and cloud assets.
• Azure Security Center / Defender for Cloud – Unified security management and threat protection across Azure resources.
Governance & Compliance
• Azure Policy – Enforce organizational standards and assess compliance at scale.
• Access Reviews & Entitlement Management – Identity governance tools for periodic access validation.
• ServiceNow / ITSM Platforms – Ticketing and workflow integration for IAM-related incidents and requests.
• ITIL Framework – Operational alignment for Incident, Problem, Request, and Change Management.
Asset & Configuration Management
• Azure Resource Manager (ARM) – Resource provisioning and access control via templates and policies.
• Microsoft Intune / Endpoint Manager – Device identity and compliance enforcement.
• CMDB Integration – Asset tracking and identity linkage across hybrid environments.
Collaboration & Documentation
• SharePoint / OneDrive – Centralized documentation and knowledge base management.
• Confluence / Wiki Platforms – Technical documentation and process repositories.
• Power Automate / Logic Apps – Workflow automation for IAM and provisioning tasks.
Qualifications
Education & Experience
• Post-secondary degree or diploma in Computer Science, Information Technology, Cybersecurity, or a related field (University or College).
• Minimum of 5 years of professional experience in Information Technology, with a focus on IAM, network security, or security operations.
• Experience working in or supporting electrical utility environments, including Operational Technology (OT) and SCADA systems.
• Familiarity with high availability architectures and critical infrastructure systems, ensuring secure and resilient operations.
Certifications (considered assets)
• CISSP – Certified Information Systems Security Professional
• CCNP Security or CCIE Security – Cisco Certified Network Professional/Expert
• Microsoft Certified: Identity and Access Administrator Associate
• Azure Security Engineer Associate
• Other relevant certifications in IAM, cloud security, or network infrastructure
Technical Skills
• Demonstrated knowledge and experience in:
o Privileged Identity Management (PIM) and Security Information and Event Management (SIEM)
o Operational Technology (OT) and SCADA systems
o Networking and firewall technologies
o Security frameworks such as:
o NIST Cybersecurity Framework
o OCSF (Open Cybersecurity Schema Framework)
Soft Skills & Competencies
• Ability to work effectively in a team-oriented environment
• Excellent written and verbal communication skills, with the ability to convey technical concepts to diverse audiences
• Strong analytical and troubleshooting skills with a proactive approach to problem-solving
• Demonstrated innovation and creative thinking in designing and improving security solutions
• Effective approach to risk management, balancing security needs with business objectives
• Ensures measurable outcomes are tracked and reported to demonstrate achievement and progress
• Strong safety awareness, especially in environments involving critical infrastructure
• Experience in electrical utility operations is considered a strong asset
Summary
Do you have this experience? If you answer YES, then please apply IMMEDIATELY to so we can then discuss your experience and interest in this opportunity!
Randstad Technologies Group
Canada's largest provider of IT Staffing Solutions, offering hundreds of permanent and contract opportunities across all roles, levels and platforms. Our Web-based tools help you see and apply for jobs matched automatically to your skills and preferences. When you're ready to interview we meet with you in person to help you build the technology career path you've always wanted. Visit www.randstad.ca to get started!
Randstad Canada is committed to fostering a workforce reflective of all peoples of Canada. As a result, we are committed to developing and implementing strategies to increase the equity, diversity and inclusion within the workplace by examining our internal policies, practices, and systems throughout the entire lifecycle of our workforce, including its recruitment, retention and advancement for all employees. In addition to our deep commitment to respecting human rights, we are dedicated to positive actions to affect change to ensure everyone has full participation in the workforce free from any barriers, systemic or otherwise, especially equity-seeking groups who are usually underrepresented in Canada's workforce, including those who identify as women or non-binary/gender non-conforming; Indigenous or Aboriginal Peoples; persons with disabilities (visible or invisible) and; members of visible minorities, racialized groups and the LGBTQ2+ community.
Randstad Canada is committed to creating and maintaining an inclusive and accessible workplace for all its candidates and employees by supporting their accessibility and accommodation needs throughout the employment lifecycle. We ask that all job applications please identify any accommodation requirements by sending an email to accessibility@randstad.ca to ensure their ability to fully participate in the interview process.
show more
• Analyze and design Role-Based Access Control (RBAC) models aligned with Azure resource hierarchies (management groups, subscriptions, resource groups) to meet business and compliance needs.
• Understand IAM products and their implementation at both technical and functional levels, including OAuth 2.0, OpenID Connect, and SAML protocols.
• Build and maintain strong relationships with internal clients and stakeholders, aiming to exceed expectations through secure and scalable identity solutions.
• Create and maintain clear, accurate documentation for IAM processes, including access reviews, entitlement management, and identity lifecycle workflows.
• Engage with technology partners to evaluate and integrate their IAM offerings into the Azure ecosystem.
• Provide support for security incident response involving identity-related threats, including account compromise and unauthorized access.
• Assist with root cause analysis for identity-related incidents, leveraging audit logs, sign-in reports, and risk detections.
• Ensure compliance with security standards and regulatory requirements (e.g., ISO 27001, NIST, CIS Benchmarks) for identity and access management.
• Review and optimize operational processes for provisioning/de-provisioning, privileged access, authentication, and authorization across cloud and hybrid environments.
• Maintain accurate and up-to-date documentation for IAM workflows, policies, and procedures.
Asset Management – Cloud-Based IAM (Azure Focus)
• Act as a support resource for cloud-based IAM platforms, providing advanced assistance to end users including Security Operations, IT Helpdesk, and other stakeholders; liaise with Microsoft support and third-party vendors as needed for issue resolution.
• Investigate and remediate issues related to identity-linked cloud assets, including misconfigurations in Azure RBAC, Conditional Access policies, and Privileged Identity Management (PIM) roles.
• Take ownership of incident and problem tickets related to IAM and asset access, driving resolution through collaboration with internal teams and external vendors.
• Manage acquisition and onboarding of future cloud security solutions, including associated infrastructure, configuration, and operational support for identity-aware asset management.
• Ensure all assets—whether on-prem, hybrid, or cloud-native—are governed by appropriate IAM controls, including automated provisioning/de-provisioning, access reviews, and policy enforcement.
• Support integration of asset management tools with IAM platforms to maintain visibility and control over Azure resources, service principals, managed identities, and non-human accounts.
• Maintain accurate documentation of asset configurations, IAM policies, and access entitlements to support audits, compliance, and operational excellence.
Service Management – Cloud-Based IAM (Azure Focus)
• Provide advanced support for service tickets related to cloud IAM and network security technologies, including issues with Microsoft Entra ID, Conditional Access, Azure Firewall, and Defender for Identity.
• Collaborate with the Security Operations Center (SOC) and IT Helpdesk to resolve identity-related incidents, ensuring timely and secure resolution across hybrid and cloud environments.
• Follow TH’s ITIL-aligned processes for Problem, Request, Incident, and Change Management, ensuring traceability and compliance in cloud IAM operations.
• Liaise with Microsoft and third-party vendors to escalate and resolve complex IAM and cloud security issues, including service outages, misconfigurations, and policy enforcement gaps.
Continuous Improvements – Cloud-Based IAM (Azure Focus)
• Identify opportunities to enhance and mature existing cloud IAM solutions, including access governance, privileged access management, and identity lifecycle automation, to maximize risk reduction and business alignment.
• Continuously evaluate and improve Azure IAM configurations, such as RBAC models, Conditional Access policies, and PIM roles, to align with evolving threat landscapes and compliance requirements.
• Create, update, and manage technical documentation including knowledge base articles, standard operating procedures, and departmental processes related to cloud IAM and security operations.
• Contribute to the development of automated workflows for identity provisioning, access reviews, and incident response using tools like Microsoft Graph API, Azure Logic Apps, and Power Automate.
• Perform any other activities within the scope of the role that support the secure and efficient operation of IAM platforms and cloud security services.
Tools & Technologies – Cloud-Based IAM & Security Operations
Identity & Access Management
• Microsoft Entra ID (formerly Azure AD) – Core identity platform for authentication, authorization, and directory services.
• Azure AD Conditional Access – Policy-based access control for securing user and device access.
• Privileged Identity Management (PIM) – Just-in-time access and role elevation for privileged accounts.
• Azure AD Identity Protection – Risk-based identity threat detection and remediation.
• Microsoft Graph API – Automation and integration of IAM workflows and reporting.
Security Operations & Monitoring
• Microsoft Sentinel – Cloud-native SIEM for threat detection, investigation, and response.
• Microsoft Defender for Identity – Identity threat detection and behavioral analytics.
• Azure Monitor & Log Analytics – Performance and security telemetry for IAM and cloud assets.
• Azure Security Center / Defender for Cloud – Unified security management and threat protection across Azure resources.
Governance & Compliance
• Azure Policy – Enforce organizational standards and assess compliance at scale.
• Access Reviews & Entitlement Management – Identity governance tools for periodic access validation.
• ServiceNow / ITSM Platforms – Ticketing and workflow integration for IAM-related incidents and requests.
• ITIL Framework – Operational alignment for Incident, Problem, Request, and Change Management.
Asset & Configuration Management
• Azure Resource Manager (ARM) – Resource provisioning and access control via templates and policies.
• Microsoft Intune / Endpoint Manager – Device identity and compliance enforcement.
• CMDB Integration – Asset tracking and identity linkage across hybrid environments.
Collaboration & Documentation
• SharePoint / OneDrive – Centralized documentation and knowledge base management.
• Confluence / Wiki Platforms – Technical documentation and process repositories.
• Power Automate / Logic Apps – Workflow automation for IAM and provisioning tasks.
Qualifications
Education & Experience
• Post-secondary degree or diploma in Computer Science, Information Technology, Cybersecurity, or a related field (University or College).
• Minimum of 5 years of professional experience in Information Technology, with a focus on IAM, network security, or security operations.
• Experience working in or supporting electrical utility environments, including Operational Technology (OT) and SCADA systems.
• Familiarity with high availability architectures and critical infrastructure systems, ensuring secure and resilient operations.
Certifications (considered assets)
• CISSP – Certified Information Systems Security Professional
• CCNP Security or CCIE Security – Cisco Certified Network Professional/Expert
• Microsoft Certified: Identity and Access Administrator Associate
• Azure Security Engineer Associate
• Other relevant certifications in IAM, cloud security, or network infrastructure
Technical Skills
• Demonstrated knowledge and experience in:
o Privileged Identity Management (PIM) and Security Information and Event Management (SIEM)
o Operational Technology (OT) and SCADA systems
o Networking and firewall technologies
o Security frameworks such as:
o NIST Cybersecurity Framework
o OCSF (Open Cybersecurity Schema Framework)
Soft Skills & Competencies
• Ability to work effectively in a team-oriented environment
• Excellent written and verbal communication skills, with the ability to convey technical concepts to diverse audiences
• Strong analytical and troubleshooting skills with a proactive approach to problem-solving
• Demonstrated innovation and creative thinking in designing and improving security solutions
• Effective approach to risk management, balancing security needs with business objectives
• Ensures measurable outcomes are tracked and reported to demonstrate achievement and progress
• Strong safety awareness, especially in environments involving critical infrastructure
• Experience in electrical utility operations is considered a strong asset
Summary
Do you have this experience? If you answer YES, then please apply IMMEDIATELY to so we can then discuss your experience and interest in this opportunity!
Randstad Technologies Group
Canada's largest provider of IT Staffing Solutions, offering hundreds of permanent and contract opportunities across all roles, levels and platforms. Our Web-based tools help you see and apply for jobs matched automatically to your skills and preferences. When you're ready to interview we meet with you in person to help you build the technology career path you've always wanted. Visit www.randstad.ca to get started!
Randstad Canada is committed to fostering a workforce reflective of all peoples of Canada. As a result, we are committed to developing and implementing strategies to increase the equity, diversity and inclusion within the workplace by examining our internal policies, practices, and systems throughout the entire lifecycle of our workforce, including its recruitment, retention and advancement for all employees. In addition to our deep commitment to respecting human rights, we are dedicated to positive actions to affect change to ensure everyone has full participation in the workforce free from any barriers, systemic or otherwise, especially equity-seeking groups who are usually underrepresented in Canada's workforce, including those who identify as women or non-binary/gender non-conforming; Indigenous or Aboriginal Peoples; persons with disabilities (visible or invisible) and; members of visible minorities, racialized groups and the LGBTQ2+ community.
Randstad Canada is committed to creating and maintaining an inclusive and accessible workplace for all its candidates and employees by supporting their accessibility and accommodation needs throughout the employment lifecycle. We ask that all job applications please identify any accommodation requirements by sending an email to accessibility@randstad.ca to ensure their ability to fully participate in the interview process.
Application
Fill in your information and participate in the selection process for the Cloud Security Consultant/Azure position.
✓
Profile Test
✓
Resume
✓
Upload
✓
Application




