Job Summary
Hands on
Windows Administration: Expertise in Windows AD, Domains, DNS, DHCP, Forest creation, modification, and integration.
Security & Authentication: Knowledge of External DNS, NTLM, Kerberos, Certificate Authority, and SAML SSO.
Intune Administration
Azure AD & Tenant Configuration
O365 Administration: Not an expert-level requirement but should understand and be able to create connectors.
Networking Basics: VLAN, VLAN segmentation, Firewalls, Privileged Access Management.
Knowledge in SQL Administration – Not an expert level
Azure Administration: Experience in deploying Azure resources, managing Resource Groups (RGs), NSGs, tagging, ARM templates, and VPN gateways.
Must-Have Experience in at Least One of the Following Scenarios:
Active Directory Forest Trust with Entra Connect Sync
Establishing a bidirectional forest trust between two AD forests.
Synchronizing both forests to a single Entra tenant using Microsoft Entra Connect Sync.
Enabling cross-forest authentication for Entra-integrated and AD-integrated apps.
Requires TCP/IP network connectivity between domains and domain controllers.
Ideal for legacy AD-integrated apps that require cross-forest access.
Synchronizing Both Forests via a Single Entra Connect
Using a single Entra Connect server to sync objects from both forests to one tenant, without a forest trust.
Enabling authentication for Entra-integrated apps but restricting AD-integrated app access between forests.
Requires network access between the Entra Connect server and both domain controllers.
Suitable when cross-forest AD app access is not needed.
Entra Connect Cloud Sync for a Secondary Forest
Utilizing Cloud Sync (lightweight agent) for the secondary forest while keeping the primary Entra Connect setup.
Synchronization without full AD connectivity, ideal for geographically distributed networks.
Supports hybrid environments, where one forest operates in a cloud-centric model.
(Points 1 & 2 are critical), along with a growth-oriented attitude to learn and adapt