for routine security testing activities. Develop and deploy tools and automation to streamline common IT Security Operations tasks. Identify areas of cyber security improvement to ensure cyber security and data security by design controls. Collaborate closely with IT and Development teams to embed security-by-design principles into development processes . Conduct reviews of existing tools and processes, identifying … vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support DataLossPrevention (DLP) solutions that protect corporate data across platforms, devices, and environments globally. Monitoring and managing responses to the Security Incidents and Security DLP. Standard, third party and privilege Identity Access … application Firewalls, anti-malware, cloud proxies and CASB. Forcepoint, Palo Alto Firewall, and Cisco NAC experience Good knowledge of MS Defender for Cloud, Storage (SQL) and CSPM. Proficient with Datalossprevention tools experience, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tooling such as Exabeam, QRadar, Splunk and Sentinel. Experience with Azure (security More ❯
in a fast–paced environment Key Responsibilities: Implement new and existing security tooling to enhance the firm's security controls Support security operations, including incident response , vulnerability management , and DLP Embed security–by–design principles in collaboration with IT and Dev teams Operate and enhance security infrastructure, including HSM , EDR , SIEM , and IAM Monitor and respond to security alerts; manage … EDR tools : SentinelOne, CrowdStrike, Defender Cloud platforms : Azure, M365, Defender for Cloud SIEM : Exabeam, Splunk, QRadar IAM : ENTRA ID, CyberArk, DUO MFA Firewall & Network Security : Cisco, Palo Alto, NAC DLP tools: Microsoft Purview, Tessian Strong scripting abilities (PowerShell, Python, Perl) Familiarity with vulnerability management , penetration testing, and security frameworks (NIST, ISO 27001, OWASP, GDPR) Proficient in managing compliance and infrastructure More ❯
London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity … analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is essential. Responsibilities: • Collaborate with IT teams for input … as NIST, etc., implementing and auditing security measures, security response, and incident management. • Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. • Experience with identity access management solutions, such as SAMLOATH • Experience with HIDS and NIDS • The More ❯
information security policies, procedures, and best practices. Work with the MSP to implement security-first IT practices. Monitor and respond to security threats, incidents, and vulnerabilities. Improve endpoint protection, data encryption, and backup systems to safeguard sensitive company and customer information. Conduct regular security audits and risk assessments to ensure compliance with regulatory standards. Lead employee training and awareness … Strong understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) and security tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO 27001, GDPR, or NIST. Experience More ❯
Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring DataLossPrevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across … and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and security audits. Define data protection, backup, and retention policies aligned with Microsoft 365 compliance tools. 5. Network Security & Infrastructure Protection (Plus Skills) Experience with Layer 7 firewalls (Cisco, Fortinet, Palo Alto, Sophos), VPNs More ❯
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, datalossprevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, datalossprevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
HanseVision GmbH
as Active Directory, Entra ID, SSO, and MFA integrations. Design Zero Trust architectures solutions to align with and implement least-privilege access models. Integration of security technologies, including SIEM, DLP (DataLossPrevention), MFA, and identity and access management systems (IAM). Design & Implement backup solutions including, disaster recovery, and business continuity strategies for both on-premises More ❯
their work. About the Role This position involves deploying, maintaining, supporting, and enhancing our Information Security tools and processes. Key responsibilities include: Implementing and maintaining network, intrusion detection, and prevention systems in hybrid environments (on-premises and cloud). Staying updated on cybersecurity threats to advise on system protections. Monitoring threat intelligence feeds and translating them into detection and … response efforts as a technical resource for the security team. Tracking and resolving security issues from identification to resolution. Supporting IAM technologies by monitoring and enhancing identity, access, and data protection activities. Managing user roles, permissions, and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth). Designing and enforcing policies on least privilege access, identity governance, and access reviews. Overseeing … for incident response. Identifying and remediating vulnerabilities in cloud environments. Collaborating with cross-functional teams to ensure secure cloud architecture and practices. Implementing data security policies such as DLP, privileged access management, and insider risk management. Designing and managing automation to improve security workflows. Supporting audits, penetration tests, and vulnerability assessments. Developing and analyzing KPIs, KRIs, and other metrics More ❯
baselines in line with industry standards (e.g., NIST, CIS, ISO 27001). Configure and manage Microsoft Defender for Office 365/Cloud/Endpoint/Servers, Purview (Information Protection, DataLossPrevention), and Microsoft Entra (Azure AD) security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience More ❯
systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works … closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to … required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze More ❯
supporting the engineering lead in configuring, implementing, and maintaining the tools that support all SOC functions. You will assess, implement, configure, and optimise our technical security controls, tools, and data feeds to maintain and continuously improve the visibility across our environments. You will also lead initiatives to improve the security posture and respond to incidents, problems and change requests … a cyber security focused role - Ideally 1- 2 years working as an engineer. Knowledge of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. More ❯
for M365, aligned with Zero Trust principles and business requirements. Architect and implement security controls and frameworks using Microsoft security technologies such as Microsoft Defender XDR, Microsoft Purview (Compliance, DLP, Insider Risk), Entra ID, and Intune. Provide architectural security assurance for other technologies which fall into the delivery portfolio. Guide governance around identity, access management, data protection, device management More ❯
or related field. Solid understanding of network security, application security, and operating system security. Experience with security tools such as SIEM (e.g., Splunk, QRadar), IDS/IPS, firewalls, antivirus, DLP . Knowledge of common threats and vulnerabilities (e.g., OWASP Top 10, MITRE ATT&CK). Strong analytical, problem-solving, and communication skills. Familiarity with scripting or automation tools (e.g., Python More ❯
focused role working within the IT Department. The role has responsibility for maintaining our core suite of security tools (including vulnerability scanning, patch management, anti-virus, intrusion detection/prevention) as well as advising on security aspects of all existing and incoming IT systems. The IT Department's mission is to meet and exceed customer expectations and deliver outstanding … server and desktop OS hardening techniques to reduce exposure. Contribute to the definition, development and reporting of IT Security policy and process. Maintain and refine end point security and datalossprevention methods. Work with the IT Projects team to ensure IT security requirements are considered and implemented for any incoming systems or IT services. Support the … Microsoft Azure, Office 365/Exchange Online and cloud-based authentication services (AAD). Good understanding of vulnerability scanning and patch management principles. Good understanding of Anti-virus and DLP in an enterprise environment. Logical thinker and creative problem solver. Excellent written and verbal communication skills. Self-motivated, proactive, and able to demonstrate ownership. Desirable: Experience in one or more More ❯
teams, making the most of a SecOps approach. Mentoring: You'll provide guidance and support to less experienced team members, helping them grow. DataLossPrevention (DLP): You'll monitor, maintain, and enhance our DLP controls across email, endpoints, and cloud services. Data-Centric Security: You'll champion a data-centric security approach, making sure … data classification, handling, and protection are embedded from design to deployment. Zero Trust: You'll promote and support Zero Trust Architecture principles, continuously verifying identities, devices, and access requests. Security Awareness: You'll develop and maintain internal security awareness materials to educate our staff on evolving threats. Attack Simulation: You'll contribute to planning and delivering attack simulation training More ❯
teams, making the most of a SecOps approach. Mentoring: You'll provide guidance and support to less experienced team members, helping them grow. DataLossPrevention (DLP): You'll monitor, maintain, and enhance our DLP controls across email, endpoints, and cloud services. Data-Centric Security: You'll champion a data-centric security approach, making sure … data classification, handling, and protection are embedded from design to deployment. Zero Trust: You'll promote and support Zero Trust Architecture principles, continuously verifying identities, devices, and access requests. Security Awareness: You'll develop and maintain internal security awareness materials to educate our staff on evolving threats. Attack Simulation: You'll contribute to planning and delivering attack simulation training More ❯
London, England, United Kingdom Hybrid / WFH Options
JN Bank UK
Manager. to manage our organization’s information security operations. This role is responsible for implementing, maintaining, and improving our information security posture to protect the Bank’s systems and data (Personally Identifiable Information (PII) and sensitive financial data). This role will be responsible for the implementation and maintenance of security protocols and controls, ensuring compliance with industry … detection, investigation, and response. · Manage security tools, including endpoint protection software, patch and update management systems, vulnerability management systems, cloud security posture management (CSPM) systems, firewalls, intrusion detection/prevention systems, SIEM platforms, and encryption technologies. · Coordinate with IT Operations, IT Development … compliance and other departments to ensure secure systems design and regulatory compliance. · Oversee third-party vendor security assessments and due diligence processes. · Support datalossprevention (DLP), endpoint protection, and secure access controls. · Educate and train employees on security awareness. · Prepare and present regular reports and metrics on security posture, incidents, and risks to management. · Participate in More ❯
that our consultants may occupy security roles within the client environment in the short, medium or long term. Our core consulting and implementation services include: On-demand virtual roles Data discovery and mapping Risk advisory and assurance Continuity/Resilience Data privacy and GDPR ISO 27001 & NIST CSF PCI, PA & P2PE Cyber security review SOC advisory & implementation XDR … optimisation Experienced in XDR apps, log source onboarding and cost analysis Can demonstrate strong experience and track record in MS Purview information protection & DataLossPrevention (DLP) Experienced in Azure Resource Manager template, Git, KQL, PowerShell Can work with control frameworks such as NIST 800-53, SANS Top 20 CSC, ISO 27001, Risk Assessment (ISO27005), Privacy and … an eye on our career opportunities as there may be other suitable roles. If you do not want us to retain your details, please email global.ta@nccgroup.com. All personal data is held in accordance with the NCC Group Privacy Policy (candidate-privacy-notice-261023.pdf (nccgroupplc.com)). We are committed to diversity and flexibility in the workplace. If you require More ❯
Develop and implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, datalossprevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS Control Tower, Azure, and Microsoft O365. More ❯
for working with code libraries such as docker, pypi and others, ensuring that libraries are only obtained from trusted sources, e.g. Jfrog Artifactory.· Assist the Information Assurance team with data leak prevention techniques aimed at preventing the exfiltration of code from the Acadian network.· Work with the Identity and Config team to ensure least privilege in Acadian’s … security projects.· Document incident findings to help build our knowledgebase; Maintain a strong security posture over enterprise-wide platforms and systems; administer multi-layered technologies to monitor and protect data and equipment from attacks.We’re Looking for Teammates With:· Bachelor’s degree in computer science or a related field is required. CISSP, CISA, SANS GIAC, or relevant security certification … such as CCNA/CCNP, AWS Security etc. desired.· 10+ years of IT experience, ideally with some project management.· Familiarity with AWS, infrastructure-as-code, firewalls, vulnerability assessment tools, DLP, TCP/IP, web content filtering, VPN, endpoint protection, password management/Vaults, log management and correlation, and device/application hardening.· Understanding of API programming.· Knowledge of scripting languages More ❯
evaluate the effectiveness of existing security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. … commercial agreements. Develop, implement, and maintain security policies, processes, procedures and guidelines. Assist with internal and external audits, and provide advice to colleagues and technical teams. Ensure compliance with data privacy regulations (e.g., GDPR, CCPA). Produce security reports for internal and external stakeholders. Recommend and implement new security tools and technologies. Stay current with infosec trends and tailor More ❯
What We're Looking For 10+ years in a cybersecurity engineering role, ideally in a complex, enterprise-scale environment Deep experience with security tools: Firewalls, SIEM, EDR/XDR, DLP, WAF, PAM, etc. Strong understanding of server/network/system security - Windows (), Linux, Azure, Active Directory, M365 Knowledge of secure architecture, Zero Trust, and cloud security frameworks Professional certifications More ❯
governance policies and procedures to ensure compliance with regulatory requirements and organizational standards. Monitor and report on compliance metrics, data classification, and datalossprevention (DLP) policies. Work closely with IT, security, and compliance teams to integrate Microsoft Purview and Defender for Cloud Apps with existing systems and workflows. Communicate effectively with stakeholders to report on … required. Proven experience in managing and supporting Microsoft Purview and Microsoft Defender for Cloud Apps. Experience with M365 Services (SPO, Teams, Exchange, Entra ID, etc), Microsoft Sentinel, Zscaler, Symantec DLP a plus Strong understanding of data governance, compliance frameworks, and information security best practices. Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Scripting experience … Security, Compliance, and Identity Fundamentals, Microsoft Certified: Information Protection Administrator, CISSP, CISM, CISA, Cisco, SANS, etc) are a plus. Preferred Skills Experience with datalossprevention (DLP) technologies and strategies. Familiarity with compliance regulations (e.g., GDPR, HIPAA) and data protection laws. Knowledge of cloud security concepts and technologies. Working with Us: As a Northern Trust partner More ❯
London, England, United Kingdom Hybrid / WFH Options
Bridewell
are looking for: A passionate technology focused individual, with an honest and empathic approach to customer conversations. You will have hands on experience with a variety of technologies in datalossprevention and a keen interest in emerging security technologies. You will be excited to join a growing team of consultants focused on helping our customers achieve … a range of industries, whilst also collaborating closely with internal teams across Bridewell. Your core focus will be leading the delivery of Microsoft Purview solutions - helping clients navigate complex data governance, compliance, and risk management requirements. From auditing and optimising existing deployments to designing and implementing scalable compliance architectures, you will provide strategic and technical oversight across projects, acting … need to have all the following: A people-first approach to team management. Demonstrable experience with Microsoft Purview across core compliance areas, including: DataLossPrevention (DLP) Information Protection (Sensitivity Labels, encryption, etc.) Insider Risk Management eDiscovery & Communication Compliance Data Lifecycle Management & Records Management Information Barriers Demonstrable experience with Azure and Microsoft cloud services. A passion More ❯