Building a centralized security monitoring pipeline using Azure Activity Logs, Log Analytics Workspace, and KQL queries to detect administrative events and security anomalies.
Implementing enterprise-grade access control using custom RBAC roles and enforcing subscription-wide governance using Azure Policy to ensure least-privilege access and mandatory resource tagging.
Assessing and improving Azure cloud security posture using Microsoft Defender for Cloud — reviewing Secure Score, investigating security recommendations, and mapping controls against the Azure Security Benchmark compliance framework.