Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring DataLossPrevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across … and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and security audits. Define data protection, backup, and retention policies aligned with Microsoft 365 compliance tools. 5. Network Security & Infrastructure Protection (Plus Skills) Experience with Layer 7 firewalls (Cisco, Fortinet, Palo Alto, Sophos), VPNs More ❯
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, datalossprevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, datalossprevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
HanseVision GmbH
as Active Directory, Entra ID, SSO, and MFA integrations. Design Zero Trust architectures solutions to align with and implement least-privilege access models. Integration of security technologies, including SIEM, DLP (DataLossPrevention), MFA, and identity and access management systems (IAM). Design & Implement backup solutions including, disaster recovery, and business continuity strategies for both on-premises More ❯
of cyber assurance reviews, projects, and initiatives as well as achieving the cyber assurance and compliance related objectives. You will also help shape the City cyber security strategy for data security, monitoring and reporting, risk and threat assessment, incident response, business continuity and disaster recovery. PRINCIPAL TASKS AND RESPONSIBILITIES Monitor & Review Contribute and maintain the current information security risk … information security and compliance initiatives. Perform security risk assessments and adversarial testing to establish proportionate risk advising of any relevant enhancements to the information security delivery framework. Accountable for data security measures being in place to meet our policies. Respond & Remediate Responding to information security incidents in line with the appropriate standards and processes, meeting or exceeding agreed KPIs. … Following a regular timetable of security and data protection compliance audits and tests, taking appropriate steps to mitigate any risks discovered. Assist with the development of City’s disaster recovery and business continuity plan. Liaise with internal departments and external suppliers to identify and address Information Security related risks. Initiate, facilitate and promote activities to foster information security and More ❯
their work. About the Role This position involves deploying, maintaining, supporting, and enhancing our Information Security tools and processes. Key responsibilities include: Implementing and maintaining network, intrusion detection, and prevention systems in hybrid environments (on-premises and cloud). Staying updated on cybersecurity threats to advise on system protections. Monitoring threat intelligence feeds and translating them into detection and … response efforts as a technical resource for the security team. Tracking and resolving security issues from identification to resolution. Supporting IAM technologies by monitoring and enhancing identity, access, and data protection activities. Managing user roles, permissions, and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth). Designing and enforcing policies on least privilege access, identity governance, and access reviews. Overseeing … for incident response. Identifying and remediating vulnerabilities in cloud environments. Collaborating with cross-functional teams to ensure secure cloud architecture and practices. Implementing data security policies such as DLP, privileged access management, and insider risk management. Designing and managing automation to improve security workflows. Supporting audits, penetration tests, and vulnerability assessments. Developing and analyzing KPIs, KRIs, and other metrics More ❯
baselines in line with industry standards (e.g., NIST, CIS, ISO 27001). Configure and manage Microsoft Defender for Office 365/Cloud/Endpoint/Servers, Purview (Information Protection, DataLossPrevention), and Microsoft Entra (Azure AD) security features. Experience of integrating with MS Sentinel and working with existing SOC teams to adopt Sentinel technology capability. Experience More ❯
supporting the engineering lead in configuring, implementing, and maintaining the tools that support all SOC functions. You will assess, implement, configure, and optimise our technical security controls, tools, and data feeds to maintain and continuously improve the visibility across our environments. You will also lead initiatives to improve the security posture and respond to incidents, problems and change requests … a cyber security focused role - Ideally 1- 2 years working as an engineer. Knowledge of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. More ❯
for M365, aligned with Zero Trust principles and business requirements. Architect and implement security controls and frameworks using Microsoft security technologies such as Microsoft Defender XDR, Microsoft Purview (Compliance, DLP, Insider Risk), Entra ID, and Intune. Provide architectural security assurance for other technologies which fall into the delivery portfolio. Guide governance around identity, access management, data protection, device management More ❯
teams, making the most of a SecOps approach. Mentoring: You'll provide guidance and support to less experienced team members, helping them grow. DataLossPrevention (DLP): You'll monitor, maintain, and enhance our DLP controls across email, endpoints, and cloud services. Data-Centric Security: You'll champion a data-centric security approach, making sure … data classification, handling, and protection are embedded from design to deployment. Zero Trust: You'll promote and support Zero Trust Architecture principles, continuously verifying identities, devices, and access requests. Security Awareness: You'll develop and maintain internal security awareness materials to educate our staff on evolving threats. Attack Simulation: You'll contribute to planning and delivering attack simulation training More ❯
teams, making the most of a SecOps approach. Mentoring: You'll provide guidance and support to less experienced team members, helping them grow. DataLossPrevention (DLP): You'll monitor, maintain, and enhance our DLP controls across email, endpoints, and cloud services. Data-Centric Security: You'll champion a data-centric security approach, making sure … data classification, handling, and protection are embedded from design to deployment. Zero Trust: You'll promote and support Zero Trust Architecture principles, continuously verifying identities, devices, and access requests. Security Awareness: You'll develop and maintain internal security awareness materials to educate our staff on evolving threats. Attack Simulation: You'll contribute to planning and delivering attack simulation training More ❯
that our consultants may occupy security roles within the client environment in the short, medium or long term. Our core consulting and implementation services include: On-demand virtual roles Data discovery and mapping Risk advisory and assurance Continuity/Resilience Data privacy and GDPR ISO 27001 & NIST CSF PCI, PA & P2PE Cyber security review SOC advisory & implementation XDR … optimisation Experienced in XDR apps, log source onboarding and cost analysis Can demonstrate strong experience and track record in MS Purview information protection & DataLossPrevention (DLP) Experienced in Azure Resource Manager template, Git, KQL, PowerShell Can work with control frameworks such as NIST 800-53, SANS Top 20 CSC, ISO 27001, Risk Assessment (ISO27005), Privacy and … an eye on our career opportunities as there may be other suitable roles. If you do not want us to retain your details, please email global.ta@nccgroup.com. All personal data is held in accordance with the NCC Group Privacy Policy (candidate-privacy-notice-261023.pdf (nccgroupplc.com)). We are committed to diversity and flexibility in the workplace. If you require More ❯
evaluate the effectiveness of existing security controls. Design and implement security solutions to mitigate identified risks. Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. … commercial agreements. Develop, implement, and maintain security policies, processes, procedures and guidelines. Assist with internal and external audits, and provide advice to colleagues and technical teams. Ensure compliance with data privacy regulations (e.g., GDPR, CCPA). Produce security reports for internal and external stakeholders. Recommend and implement new security tools and technologies. Stay current with infosec trends and tailor More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
KX
we build time-series, vector-native database solutions our customers use to unlock knowledge and predictive power they can act on with confidence. By simultaneously supporting unstructured and structured data, KX powers accurate, highly contextual results for AI and automation applications with transformative speed, unlimited scalability, and extremely low computing costs. Customers across financial services, manufacturing, telecommunications, life sciences … understanding of network protocols and technologies (e.g. VPN, TLS, DMZ). Practical knowledge of cloud security across AWS, Azure, or GCP (e.g. CloudTrail, Sentinel). Experience with endpoint protection, DLP, IDS/IPS, MFA, and content filtering. Familiarity with SIEM platforms and vulnerability management tools. Exposure to SOAR platforms and scripting or development skills (e.g. Python, Bash). Understanding of … COBIT. Excellent communication skills, both verbal and written. Location & Workplace Type: This role will be based in Newry, Belfast or Dublin with a Hybrid working model Why Choose KX? Data Driven: We lead with instinct and follow fact. Naturally Curious: We lean in, listen and learn fast. All In: We take ownership, take on challenges and give it our More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
Murnen Design
are crucial for the advancement of healthcare, food security, and biodiversity. Job description: As the Cyber Security Lead, you will play a pivotal role in safeguarding EMBL-EBI's data resources and ensuring the continued availability of our world-leading life sciences tools and services. You will be responsible for leading and evolving our cyber security strategy, operations, and … actors. You will maintain our cyber security best practice and develop and deliver a roadmap for improvement, establishing EMBL-EBI as a world leader in cyber security for open data resources, taking into account the unique requirements of our open data model and intergovernmental status. You will lead the newly formed IT Security team, collaborating with IT teams … prevention systems (IDPS) Security information and event management (SIEM) system Vulnerability scanning and penetration testing Cloud security Identity and access management (IAM) Datalossprevention (DLP) Endpoint protection Security operations and incident response Experience in developing and implementing security policies, procedures, and standards. Understanding of legal and regulatory frameworks (e.g., GDPR, ISO 27001, NIST SP More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
Company Description Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people … common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs), and common industry recommendations to prevent and respond to threats such as phishing, malware, network attacks, suspicious activity, data security incidents. Exposure to technical elements of common Operating Systems (Windows, Linux, Mac OS), Networking (Firewalls, Proxies, NetFlow), Cloud Infrastructure (AWS, Azure, GCP), and Security Technologies (Anti-Virus, Intrusion … knowledge of network and host security technologies and products (such as firewalls, network IDS, scanners) and improve these skills Security monitoring technologies, such as SIEM, IPS/IDS, UEBA, DLP, among others Scripting and automation Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great compensation package and discretionary bonus plan Core More ❯
Woking, England, United Kingdom Hybrid / WFH Options
McLaren Applied
strategic capabilities across our on-premise and cloud-hosted solutions, including: Secure configuration of endpoints, OS, applications, containers and PaaS services, aligning to best practice for certifications (i.e., ISO27001) Data classification and datalossprevention Log collection and SIEM/SOAR monitoring and automated response Security testing, including automated testing and assessing formal penetration tests Contribute More ❯
consultants may occupy security roles within the client environment in the short, medium or long term. Our core consulting and implementation services include: Strategy & transformation On-demand virtual roles Data discovery and mapping Risk advisory and assurance Continuity/Resilience Data privacy and GDPR ISO 27001 & NIST CSF Supplier assurance PCI, PA & P2PE Incident response planning Card production … optimisation Experienced in XDR apps, log source onboarding and cost analysis Can demonstrate strong experience and track record in MS Purview information protection & DataLossPrevention (DLP) Experienced in Azure Resource Manager template, Git, KQL, PowerShell Can work with control frameworks such as NIST 800-53, SANS Top 20 CSC, ISO 27001, Risk Assessment (ISO27005), Privacy and … an eye on our career opportunities as there may be other suitable roles. If you do not want us to retain your details, please email global.ta@nccgroup.com. All personal data is held in accordance with the NCC Group Privacy Policy (candidate-privacy-notice-261023.pdf (nccgroupplc.com)). We are committed to diversity and flexibility in the workplace. If you require More ❯
consultants may occupy security roles within the client environment in the short, medium or long term. Our core consulting and implementation services include: Strategy & transformation On-demand virtual roles Data discovery and mapping Risk advisory and assurance Continuity/Resilience Data privacy and GDPR ISO 27001 & NIST CSF Supplier assurance PCI, PA & P2PE Incident response planning Card production … optimisation Experienced in XDR apps, log source onboarding and cost analysis Can demonstrate strong experience and track record in MS Purview information protection & DataLossPrevention (DLP) Experienced in Azure Resource Manager template, Git, KQL, PowerShell Can work with control frameworks such as NIST 800-53, SANS Top 20 CSC, ISO 27001, Risk Assessment (ISO27005), Privacy and … eye on our career opportunities as there may be other suitable roles. If you do not want us to retain your details, please email global.ta@nccgroup.com . All personal data is held in accordance with the NCC Group Privacy Policy ( candidate-privacy-notice-261023.pdf ). We are committed to diversity and flexibility in the workplace. If you require any More ❯
within a national institution. This is a hands-on, strategic role with a focus on Microsoft Entra ID Governance and Microsoft Purview – including lifecycle management, RBAC, data classification, DLP and compliance tooling. You’ll play a key part in designing and maintaining secure practices across Microsoft 365, Azure, and broader security operations. Working within a small, agile security team … all levels. Experience of Interest: Practical experience implementing Microsoft Entra ID Governance (or similar Okta) Hands-on and demonstrable use of Microsoft Purview for compliance, data classification, and DLP Strong security operations knowledge across M365 and Azure environments Awareness of regulatory frameworks such as ISO 27001, GDPR, NIST, Cyber Essentials+ Comfortable working with senior IT, Compliance and Risk stakeholders More ❯
and implement security controls across Microsoft 365, Azure, Dynamics 365, Kubernetes (AKS), and AI/ML workloads. Lead the design and deployment of conditional access, Defender for Cloud, Purview DLP, Azure Firewall, and related services. Integrate security into DevOps pipelines, CI/CD, infrastructure-as-code, and container work flows. Automate threat detection and response using Microsoft Sentinel SOAR, custom … through Intune, ensuring device compliance and integration with Zero Trust. Harden AKS clusters and cloud-native apps through role-based access control (RBAC), secrets management, and runtime protection. Secure data pipelines and models in AI workloads, implementing guardrails for model integrity and prompt injection defence. Cloud & Network Security Engineer secure access and posture for Cisco Meraki infrastructure and Umbrella … security problems through systems thinking and automation. Strategic, yet pragmatic: balances best practice with business context. Proactive, communicative, and passionate about elevating security posture through innovation. MS Engineer & MS Data Scientist Associate Ability to exercise independent judgment and act on it. Benefits for our U.K. teams include: The choice to work flexibly from home and the office, in line More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
NearTech Search
Europe). With a passion for adopting modern tools and security frameworks, our client offers an innovative, cloud-first environment where your skills will directly impact infrastructure resilience and data protection. You’ll be part of a cross-functional team that collaborates internationally and thrives on secure, scalable delivery. The Security Analyst will play a pivotal role in ensuring … with risk management and compliance responsibilities. Role Highlights Monitor, detect, and respond to security incidents and vulnerabilities Own and manage key elements of the security stack, including SIEM and DLP tools Lead audits, penetration testing, and remediation actions to uphold ISO27001 & SOC2 compliance Collaborate with product teams to embed security into the development lifecycle Produce detailed KPI-driven security reports More ❯
Security DataLossPrevention (DLP) Engineer, Oxford district Client: Harrington Starr Location: Oxford district, United Kingdom Job Category: Other EU work permit required: Yes Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 Job Description: DataLossPrevention (DLP)/Insider Threat Analyst required by Harrington Starr’s global client to play a key role … in their Cyber Security Engineering team. The role will focus on protecting the organization from dataloss and theft. Key responsibilities include: Developing and administering DLP policies Analyzing and triaging DLP violations Participating in cyber incident response with a DLP focus Collaborating with Security Operations and Engineering teams on DLP strategy Reporting on DLP incidents Creating firm-wide … DLP strategies Using DLP tools such as Microsoft Purview regularly Requirements: Experience in a dedicated DLP or cybersecurity role with a focus on DLP Hands-on experience with DLP policies, incident management, data protection, and reporting Experience with Microsoft Purview, M365, and Proofpoint technologies Practical experience with End-User Behaviour Analytics (EUBA) and Insider Risk Management A solid understanding More ❯
Security DataLossPrevention (DLP) Engineer, York Client: Harrington Starr Location: York Job Category: Other EU work permit required: Yes Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 Job Description: We are seeking a DataLossPrevention (DLP)/Insider Threat Analyst to join Harrington Starr's global client in their Cyber Security Engineering … team. This role is crucial in safeguarding the organization against dataloss and theft. Key responsibilities include: Developing and administering DLP policies Analyzing and triaging DLP violations Participating in cyber incident response with a DLP focus Collaborating with Security Operations and Engineering teams on DLP strategy Reporting on DLP incidents Formulating firm-wide DLP strategies Utilizing DLP tools … such as Microsoft Purview regularly Qualifications and experience required: Experience in a dedicated DLP or cybersecurity role with a focus on DLP Hands-on experience with DLP policy management, incident response, data protection, and reporting Proficiency with Microsoft Purview, M365, and Proofpoint technologies Experience with End-User Behaviour Analytics (EUBA) and Insider Risk Management Strong understanding of cyber and More ❯
and services to reduce cyber risk and enhance performance. Develop and maintain a global data security strategy, including encryption, tokenization, anonymization, and DataLossPrevention (DLP). Ensure information security aspects of applications and services safeguard JD Sports' data, IP, customers, and brand reputation. Provide security guidance to business technology teams, ensuring security is integrated … data security controls in geographically dispersed and hybrid cloud environments. Hands-on experience with modern enterprise-level data protection tools, including DataLossPrevention (DLP), Digital Rights Management (RMS), data encryption/tokenization, and data discovery. Strong familiarity with Microsoft security solutions, such as AD RMS, Azure RMS, and Microsoft Purview for data … including certificate lifecycle management, encryption protocols, and secure key management practices. Ability to lead and execute large, complex projects related to data security (e.g. introduction of a global DLP solution, replacement of a PKI environment). Considerable technical writing proficiency, oral presentation skills, problem solving and decision-making skills. Experience in using architecture methodologies such as TOGAF and SABSA. More ❯