Building a centralized security monitoring pipeline using Azure Activity Logs, Log Analytics Workspace, and KQL queries to detect administrative events and security anomalies.
Configuring Azure Monitor Alert Rules and Action Groups to automatically detect administrative events and send real-time email notifications for incident response.
Implementing enterprise-grade access control using custom RBAC roles and enforcing subscription-wide governance using Azure Policy to ensure least-privilege access and mandatory resource tagging.
Assessing and improving Azure cloud security posture using Microsoft Defender for Cloud — reviewing Secure Score, investigating security recommendations, and mapping controls against the Azure Security Benchmark compliance framework.