Role Overview Microsoft Data Security Cloud Solution Architects are trusted advisors for customers attempting to secure their entire data estates against internal and external data risk. Microsoft Purview's integrated Data Security services support customers holistically secure data: · Protect Sensitive Data using data … and encryption policies. · Manage Insider Risks using machine learning detection controls and indicators, adaptive protection to dynamically enforce controls and advanced privacy controls · Prevent DataLoss using built in exfiltration policies for Microsoft 365 apps, services and endpoints. Cloud Solution Architects support customers through the whole adoption lifecycle … pod" teams and have access to a significant library of training, certification and usage guide resources. Required/Minimum Qualifications · 3+ years' experience in Data Security/Information Security Management, Data Governance or related field AND 3+ years of working in cloud infrastructure, IT consulting/support, systems more »
Remote, Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
We are looking for a DataLossPrevention SME to join a global client on a 9 month basis providing part time consultancy. Expert knowledge of DataLossPrevention – Experience working on large DataLossPrevention projects – Strong abaility to deal … to CISO level – Strong knowledge of Purview – Previous experience installing Symantec – Experience on Security incident management process – Good working knowledge of Information Classification (meta data trigging) Outside of IR35 and paying up to £600 per day. Recruiter: Adam Titmus more »
highest levels of quality and safety. The individual in this position will be in charge of developing, implementing, and maintaining comprehensive quality management and lossprevention initiatives in order to safeguard pharmaceutical products, streamline operations, and minimise risks. KEY RESPONSIBILITIES Develop and oversee a robust quality management system … storage, and distribution of pharmaceutical products. Implement quality assurance programs, including audits and inspections, to identify and address quality issues proactively. Monitor and analyse lossdata to identify trends and root causes, and implement corrective actions to reduce losses. Collaborate with cross-functional teams to implement security measures … that the company’s operations comply with all applicable local, national, and international regulations. Lead training programs for employees involved in quality control and lossprevention, ensuring a well-trained workforce. Foster a culture of quality and safety awareness among all staff members. EXPERIENCE REQUIRED Bachelor’s degree more »
Greater London, United Kingdom Hybrid / WFH Options
Jumar Solutions
DataLossPrevention SME Inside IR35 Hybrid, occasional travel to Radbroke and London Working with vendors to implement and support DLP technology, including troubleshooting and upgrading. Maintaining DLP technology, configuring policies, and compiling reports for analytics. Monitoring and responding to alerts generated from DLP systems and other … technologies. Working with the Incident Response team to escalate and respond to potential or real threats. Serving as a DLP subject matter expert within the organization. Collaborating on the DLP rule development lifecycle including policy development, response rules, and maintenance. Create DLP policies in Purview that deliver the same outcome more »
DLP Security Consultant/SME - Microsoft Purview Freelance 6-9 months £600 per day Inside IR35 via umbrella Hybrid role (may need to travel to London or Manchester whichever is closest) Tier One Consultancy with a significant presence in the financial services sector are currently recruiting for DataLossPrevention (DLP) Cyber Security SME’s for one of their premier customers. This is to join their specialist team within their data and cloud security practice for an interim contract role with this specific customer, with scope for this piece of work to run for … months. The DLP Security SME will work with vendors to implement and support DLP technology helping the end customer to troubleshoot and upgrade their DLP policies and technology. You will work directly with the specialist security incident response team within the financial services practice for this business, and be recognised more »
Microsoft 365 Purview Specialist Location: Leeds, UK Job Type: Full-time We are seeking a Microsoft 365 Purview Specialist to enhance our data protection and compliance management capabilities. This role is ideal for professionals with a strong background in Microsoft Purview, looking to make a significant impact in a … expertise to cross-functional IT teams. Configure and maintain Microsoft Purview solutions, ensuring alignment with organisational goals and best practices. Develop and contribute to data governance policies, standards, and procedures to ensure compliance and data integrity. Collaborate with stakeholders to define data management requirements and establish effective … controls. Conduct training sessions to educate users on Microsoft Purview functionality and best practices. Identify opportunities for process improvements and provide recommendations to enhance data governance initiatives. Stay updated with industry trends and best practices in data governance and metadata management. Analyse information security risks and address issues more »
If so, we'd love to hear from you! At Livestock Information Ltd, our mission is to be an outstanding service provider of livestock data, empowering government, industry, and farmers to effectively manage disease and infection control, whilst enhancing productivity and innovation in agriculture. To achieve this, we need … settings. Facilitate secure and efficient email communication. Office 365 Compliance Features{{:}} Implement and manage compliance features such as datalossprevention (DLP), eDiscovery, and retention policies. Ensure compliance with legal and regulatory standards. SharePoint Online Administration{{:}} Administer SharePoint Online, including site creation, configuration, and management. Facilitate collaboration more »
Engineer will have: Experience of managing an Identify and Access Management capability, including Privileged Access Management (PAM) and DataLossPrevention (DLP) in an enterprise environment and experience. Extensive hands on experience using and managing IAM tools including Active Directory, Okta, and SailPoint. Experience of developing and … annual leave + Bank holidays + options to buy/sell holiday “By applying for this role, you provide us consent to process your data in line with our Privacy Policy, full details can be found on our website” IAM Engineer - Hybrid (Multiple Locations more »
JOB DESCRIPTION Combining decades of industry experience with talented people in every field from data, technology, customer care and auto repair, to HR, finance and procurement , we’re a customer-obsessed market powerhouse. And we all work together to be brilliant for customers, every single day. We’re evolving … to be a more digitally-focused data-driven insurance company of the future – and your unique talent, skills and ideas can drive our success. Like us, you thrive on collaboration, exploration and innovation. And like you, we take tech seriously. That’s why we’re embracing the move to … MIM teams (where required) and recording of all key security decisions. WHAT YOU'LL NEED: Knowledge and operational experience in firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, switches, routers, Voice over IP (VoIP), firewall zoning. Ability to read and understand system more »
classify and assess impact of negative events and bad actors. Support the business with analytical deep dives to identify vector, actor and methodology of Loss, Risks, Security Breaches and Major Incidents, working with partner teams and customers to design risk-based mitigation strategies. Train, advise, and partner with other … A Day in the Life The Senior Risk Manager works closely and on daily basis with partner Global Security Operations (GSO) teams, Regional Security & LossPrevention (S&LP) and senior Operations leaders to determine organization challenges and needs presented by Organized Bad Actors to the security and integrity … we secure the Amazon supply chain end-to-end and promote security in business decision-making conversations. We do this by identifying Security and LossPrevention-related risks and vulnerabilities as early as possible, reporting on existing and emerging risk landscapes in order enable the minimization of any more »
Senior Data Protection Analyst – London hybrid - £50,000 - £70,000 + Bonus + Benefits Locke & McCloud are looking for an experienced Data Protection Specialist to join our client as a Senior Analyst in their growing but established Data Protection team! You will be a huge contributor to … our clients Data Protection strategy and roadmap and will have the opportunity to take the lead on various projects across their global team. responsible for developing and implementing data protection strategies and policies on a global scale. Our client is looking for people with experience working on large … scale projects in a global environment, with a deep understanding of global data protection principles and technologies. Main responsibilities: Lead the design, development, and implementation of our clients data protection strategy and policies across the organisations. Conduct risk assessments and audits to identify vulnerabilities and areas for improvement more »
Southampton, England, United Kingdom Hybrid / WFH Options
Starling Bank
visit the office and work from home, that's to be agreed upon between you and your manager. About The Role And Opportunity The Data Security team at Starling Bank is growing! We are a newly formed team with a mandate to identify, manage, and remediate data security … risks across the organisation. This role will play a pivotal role in safeguarding our data and infrastructure from cyber attacks. This role offers a unique opportunity to be at the forefront of protecting the financial interests of our clients and the integrity of our systems. If you are passionate … develop to make Starling Secure. What You'll Get To Do Security Tooling - Deploy, manage, and optimise security tools including network monitoring, email security, datalossprevention, and user entity and behavioural analytic solutions. Risk Assessment - Conduct regular security assessments and reviews to identify potential risks. Identification more »
City of London, London, United Kingdom Hybrid / WFH Options
Networking People (UK) Limited
experienced Microsoft Information Protection specialist to join a team to help design and implement various Microsoft Information Protection solutions such as Sensitivity labelling, M365 DLP and Encryption and for a global Banking project. . You will need to stay on top of the technology development and understand the complexity and … Sensitivity labels and Classification Sensitivity labels and Cross tenant collaboration controls and features Encryption solutions using Sensitivity label and Office 365 Message Encryption Sensitive data identification using Sensitive info types and EDM Exchange Online, Teams, SharePoint Online and Power BI Integration with AIP/MIP M365 DataLoss … critical projects proceed smoothly and securely through security processes Strong working knowledge of foundational security principles and technologies including SIEM, CASB, Crypto, SSO, RBAC, DLP, PKI, etc Strong problem solving and analytical skills Networking People (UK) is acting as an Employment Business in relation to this vacancy. more »
Employment Type: Contract
Rate: £550 - £580 per day + Deemed Inside IR35 determination
monitoring systems Maintain a strong awareness of the current threat landscape Basic Qualifications Excellent teamwork skills Knowledge of and experience with intrusion detection/prevention systems and SIEM software Strong knowledge and understanding of network protocols and devices. Strong experience with Mac OS, Windows, and Unix systems. Ability to … following: SIEM Packet Analysis SSL Decryption Malware Detection HIDS/NIDS Network Monitoring Tools Case Management System Knowledge Base Web Security Gateway Email Security DataLossPrevention Anti-Virus Preferred Qualifications Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas … with proven experience in security/network operations will also be considered About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as a force more »
in the creation and issuance of departmental reports • Understand basic revenue models, P/L, and cost-to-completion projections, apply analysis to this data to make project decisions and provide reporting of this data Leadership • Coach and mentor junior members of staff • Display complete ownership for projects … required constraints of time, budget and quality. Experience/essential and desired for successful job performance • Extensive experience in delivery of Security projects like Datalossprevention, SIEM, Identity access management and Privileged Access management. • Significant practical experience of leading and managing Corporate/Infrastructure change programmes more »
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Planet Recruitment
obtain best value. Evaluate requests for exceptions to policies, ensuring sufficient mitigating controls are in place. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are following policies and audit requirements. Review, escalate and action any unusual event behaviour identified through the groups information … security systems. Create standards in system hardening, change management, documentation. Perform periodic firewall Ensure disaster recovery and data restoration processes work. Ensure appropriate Corrective and Preventative Actions are implemented in line with best practice guidance. Essential: A record of accomplishment in and experience of introducing Information Security Improvement through … successfully designing, implementing, and improving IT security architecture and controls. Working technical knowledge in broad domains of IT infrastructure such as data networks, server and desktop hardware and operating systems, storage and backups, and related monitoring and management systems. Demonstrable experience of applying security controls in one or more more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
requirements Enable appropriate forensic services in the UK to meet the requirements for all jurisdictions Provide a service to identify and extract any electronic data relevant to the need of AXA in a manner that is admissible in court and in line with relevant standards Act as a forensic … with network detection and response tooling Experience of relevant computer forensics, incident response and e-discovery tools, including password recovery, EDR, NDR, UEBA, honeypots, datalossprevention, SIEM, and log managers Understanding of regulatory processes in evidence-handling procedures Technical knowledge of anti-forensics, data hiding more »
South West London, London, United Kingdom Hybrid / WFH Options
NATIONAL AUDIT OFFICE
Experience of delivering Information Security or other complex technical delivery initiatives. A demonstrable understanding of information security concepts and the threat environment technology and data driven organisations operate within. Behavioural skills and personal qualities: A great team player who will confidently fit into a small, dedicated function of security … working within either the ISO 27001 ISMS or NIST CSF Experience delivering any information security tools/capabilities such as, but not limited to, DataLossPrevention, SIEM, Identity and Access Management, EDR/XDR The deadline for applications is 11.55pm Sunday 28th April. Please apply with more »