Privileged Identity Management Jobs in the Thames Valley

2 of 2 Privileged Identity Management Jobs in the Thames Valley

MS Purview and M365 Defender XDR SME

slough, south east england, united kingdom
Tata Consultancy Services
Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Ensure the proper configuration and integration of various authentication More ❯
Posted:

Microsoft purview and Entra ID SME

slough, south east england, united kingdom
Tata Consultancy Services
XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra ID. Your core responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response. All of these will be based on collaborating with other teams to maintain and improve the … like Microsoft Defender Experts for proactive hunting and expert guidance. Document incident response procedures, create reports on security posture, and provide regular briefings to leadership. Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed. Utilize DSPM capabilities to understand data risk … based risks. Work closely with the Defender for Identity team to monitor on-premises Active Directory signals for threats. Implement and maintain Privileged Identity Management (PIM) and Privileged Access Management (PAM) to provide just-in-time (JIT) access and enforce the principle of least privilege. Secure Bring Your Own Device (BYOD) and other device More ❯
Posted: