enabling secure growth. We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection … Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. As an FCA Senior Management Function holder, this leader is accountable for ensuring that cyber, IAM, and DLP controls are effective, proportionate, and resilient. They will be responsible for maintaining governance frameworks that align with FCA and PRA expectations, demonstrating reasonable steps in overseeing third-party and outsourced … be subject to the FCA's Conduct Rules and the Senior Manager Conduct Rules. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and dataMore ❯
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal … Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and data … cloud adoption, Zero Trust, and frictionless user experiences. Partner with business and technology leaders to enable secure digital transformation through robust identity services. DataLossPrevention (DLP) Advance a comprehensive DataLossPrevention program to safeguard sensitive information across endpoints, cloud, email, and collaboration platforms. Establish enterprise-wide policies and controls to prevent unauthorized More ❯
the subject line: “Application Support Request”. Role: Netskope Technical Architect Job Type: Permanent Location: Coventry, UK Are you passionate about driving innovation and best practices in Networking and DLP? We have an exciting role for you – Netskope Technical Architect! Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not just … a Netskope Technical Architect you will serve as the subject matter expert for Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), and DataLossPrevention (DLP) technologies. You will work cross-functionally to architect scalable security solutions, lead incident response efforts, and drive continuous improvement in our cloud security posture. Your responsibilities: Work with teams to … and traffic steering configurations using Secure Web Gateway (SWG) and Cloud Access Security Broker (CASB). Analyse data exfiltration risks and design DataLossPrevention (DLP) policies to mitigate threats. Collaborate with Security Operations to enhance security requirements, apply ad-hoc site restrictions, and manage exception requests. Apply advanced knowledge of SSL inspection to define secure More ❯
Liverpool, England, United Kingdom Hybrid/Remote Options
Love2shop
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: 25 days’ holiday per year, plus bank holidays Company sick pay from More ❯
Welwyn Garden City, England, United Kingdom Hybrid/Remote Options
PayPoint plc
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: Holiday purchase scheme, with 25 days holiday plus bank holidays as standard. More ❯
model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do The Global Delivery Director - Secure Data is a critical leadership role that enables the secure foundation of BCG's digital operations globally. By driving scalable, automated, and user-focused security engineering-and by embedding security … practices to embed security early into development and delivery workflows. Data Security Engineering: Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Collaborate with the IAM team to align authentication, authorization, and privileged access policies with data security controls. Deliver security capabilities that support modern work … ability to present complex security topics to executive leadership. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Symantec DLP, Zscaler CASB, MS Purview, Palo Alto Prisma, Hashi Vault and other modern security platforms. Familiarity with DevSecOps principles, Infrastructure as Code, and secure software development practices. Who You'll Work More ❯
delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology. Your role and responsibilities As a Security Consultant specializing in Data and Application Security, you will help clients secure their applications and sensitive information across the full development and data lifecycle. You will guide organizations through application security challenges … embedding controls into design, build, and deployment phases, while leveraging practices such as Threat Modelling, Secure SDLC, and DevSecOps. With expertise in vulnerability management, data protection, and regulatory compliance, you will design security guardrails that support application modernization programs in multicloud environments, ensuring risks are minimized and business objectives are achieved securely. Responsibilities Provide advisory and technical expertise on … SDLC, DevSecOps, and security testing. Knowledge of data protection methods: encryption (at rest/in transit), masking, anonymization. Hands-on experience with DataLossPrevention (DLP) tools and strategies. Proficiency in database security controls, including access, auditing, and patch management. Familiarity with SIEM platforms for monitoring and analysis of data/application security events. Understanding More ❯
The Global Platform Team Lead and Senior Director - IT Security is responsible for leading the design, delivery, and continuous evolution of BCG's security platforms across identity, device, and data protection domains. This role ensures end-to-end security engineering across all technology environments, including cloud, on-prem, and hybrid systems. The leader will drive strategic planning, execution, and … security requirements, automation opportunities, user experience needs, and broader business outcomes. Key Responsibilities Strategic Leadership & Transformation: Define and execute a unified security engineering strategy that addresses identity, endpoint, and data protection across all environments. Lead the design and implementation of scalable, automated security solutions that integrate seamlessly into enterprise platforms and user experiences. Establish a global security architecture and … and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that More ❯
The Global Platform Team Lead and Senior Director - IT Security is responsible for leading the design, delivery, and continuous evolution of BCG's security platforms across identity, device, and data protection domains. This role ensures end-to-end security engineering across all technology environments, including cloud, on-prem, and hybrid systems. The leader will drive strategic planning, execution, and … security requirements, automation opportunities, user experience needs, and broader business outcomes. Key Responsibilities: Strategic Leadership & Transformation: Define and execute a unified security engineering strategy that addresses identity, endpoint, and data protection across all environments. Lead the design and implementation of scalable, automated security solutions that integrate seamlessly into enterprise platforms and user experiences. Establish a global security architecture and … and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that More ❯
Design Collaboration: Partner with engineering teams to embed security-by-design and privacy-by-design principles into AI agents, copilots, and automation workflows. Define and implement technical controls for: Data access and protection Model transparency and explainability Human oversight and fallback mechanisms Audit logging and traceability AI Risk & Compliance Architecture: Design and enforce compliance frameworks for high-risk AI … risk registers, and post-market monitoring plans. Microsoft Purview Integration: Use Microsoft Purview to implement and manage: Data classification and sensitivity labels Datalossprevention (DLP) policies Information protection and access controls Compliance reporting and audit trails for AI-related data flows AI System Onboarding & Governance Support: Work with the AI Governance Lead to assess … . Azure AI services, Microsoft Copilot Studio, and Power Platform Secure deployment tools (e.g., Azure Key Vault, RBAC, CI/CD pipelines) Data protection and privacy controls (e.g., DLP, masking, classification) Knowledge of regulatory frameworks including the EU AI Act, GDPR, and FCA guidance. Experience working in cross-functional teams across engineering, legal, and risk domains. More ❯
City of London, London, United Kingdom Hybrid/Remote Options
LHH
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Picture More
practice across all regions. Key Responsibilities Lead the design and implementation of secure authentication, authorisation, and data protection frameworks. Manage and enhance DataLossPrevention (DLP) systems, incident response, and risk management processes. Oversee cloud security architecture across Azure, O365, and iManage Cloud environments. Collaborate with global IT, compliance, and risk teams to deliver a consistent … improvement initiatives. About You Minimum 5 years’ experience in information security within a global enterprise environment . Strong knowledge of cloud and network security (Azure, O365). Experienced in DLP, SIEM, and incident response processes. Familiar with ISO 27001/27002 and governance frameworks. CISSP or CEH certification preferred. Excellent communication, stakeholder management, and documentation skills. Why Join? You’ll More ❯
and next move, and quickly and effectively respond to an attack. · Develop and optimize automation rules and playbooks in the SIEM (Microsoft Sentinel) · Carry out cost optimisation, considering what data tiering and appropriate filtering to ensure a cost effective solution for clients. · Assist in the onboarding and continued development of SOC clients and various aspects of their security stack … into the SIEM. · Work closely with management to develop service improvement plans · Integrate various data sources into Sentinel for use in platform such as NGFW, IAM solutions and network telemetary. · Act as an escalation point during peaks in demand and as and when required · Work closely with Information security management and senior security consultants to develop internal security posture … sophisticated security attacks · Analytical rule automation and playbook development · Design, implementation, and integration of a SIEM solutions into a customer environment · Security management tooling such as intrusion detection and prevention, datalossprevention, firewall, VPN, filtering and traffic inspection, and security reporting · Strong understanding of Microsoft 365 and Office 365 security products e.g. Microsoft Defender for More ❯
on site.Im looking for someone that has recent Sentinel and Defender experience and is a SME in this area Background skills required. • Policy Enforcement: Implement Conditional Access, MFA, and DLP policies. Maintain security posture using Secure Score and Compliance Manager • Zero Trust Network: Contribute to AD and security-related configurations supporting Zero Trust principles and related BAU work. • ServiceNow Ticketing … configurations across O365 services • Policy Development: Support creation and enforcement of Council-wide O365 usage policies • Configure and maintain Sentinel workspaces aligned with Council tenancy and compliance requirements. • Integrate data sources including Defender for Endpoint, Defender for Identity, Office 365 audit logs, Azure AD, and third-party connectors. • Develop and implement playbooks and alert rules for automated incident response. … for Cloud Apps, Defender for Office 365, and Defender for Identity. • Implement Conditional Access, Multi-Factor Authentication (MFA), and Identity Protection policies. • Configure DataLossPrevention (DLP), Information Protection, and Insider Risk Management policies using Microsoft Purview. • Proven expertise in Microsoft Sentinel and Office 365 E5 security products. • Strong understanding of Azure services, including Azure AD, Defender More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor's degree in computer science, Cybersecurity, Information Systems, or related field (master's preferred). Experience in cybersecurity with 3+ years in a security More ❯
AV), Sandbox, etc. and third-party integrations. We protect our customers from sensitive corporate data being exfiltrated to websites through both traditional DataLossPrevention (DLP) matching, static analysis and machine learning to identify, block and alert on sensitive content. This is an exciting, fast-paced team with many growth opportunities and responsibilities in which your … S3, and VPC on AWS and GCP equivalent) and software development tools such as Git, Terraform, GitLab, Jira, etc. Solid experience with developing in Linux environment Experience with complex data structures and database and analytics technologies such as Redis, Postgres, MySQL, DynamoDB and Apache Druid Ideally have experience of: C/C++, systemd, monit, cgroups/runc/libcontainer More ❯
Defender tools, including: Defender for Endpoint, Defender for Identity, Defender for Cloud, Defender for Office 365 etc. Leading engagements around Microsoft Purview, covering: DataLossPrevention (DLP), Information Protection and Sensitivity Labelling, Insider Risk Management, Data Lifecycle Management, Compliance and eDiscovery Acting as a trusted technical voice for customers, helping them turn security goals into tangible More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
secure architectures, managing risk, and driving security strategy across cloud and on-premise environments. Key Responsibilities Design and maintain secure authentication and authorization frameworks. Manage security risks, incidents, and DLP (DataLossPrevention) processes. Implement and enhance cloud security (Azure, Microsoft 365, iManage). Lead incident response, risk assessments, and compliance reviews. Collaborate globally to embed security … policy development, security awareness, and business continuity. Skills & Experience 5+ years' experience in Information Security. Strong technical knowledge of networking, authentication, and cloud (Azure/O365). Experience with DLP, incident response, and ISO 27002 standards. Familiarity with tools such as Microsoft Defender, CrowdStrike, CyberArk, Rapid7, or Palo Alto. CISSP or CEH certification preferred. Excellent communication, problem-solving, and stakeholder More ❯
Exposure to cloud platforms such as AWS or Azure (desirable but not essential). Experience with cyber security tools, including endpoint protection and datalossprevention (DLP) solutions. Excellent communication and documentation skills, with the ability to engage stakeholders at all levels. If youre looking to grow your career in infrastructure and security within a collaborative and More ❯
lead the secure device strategy, ensuring strong protection across all device types and operating systems. Engineer and operate scalable solutions for endpoint protection, datalossprevention (DLP), and compliance checking. Build automated controls for device posture, encryption, threat detection, and remediation. Own and optimize integrations with tools such as Microsoft Defender, Purview, Symantec, CrowdStrike, or equivalent. Platform More ❯