SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD, firewalls, servers, cloud infrastructure) Manage event collection and forwarding infrastructure Implement … data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incident response playbooks Provide expert guidance on securing applications and infrastructure Security … Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain) Experience with EDR, DLP, Proxy, and SEG tools Desirable Qualifications Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP Experience with SOAR playbooks, YARA rules, STIX, and YAML Participation More ❯
SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD, firewalls, servers, cloud infrastructure) Manage event collection and forwarding infrastructure Implement … data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incident response playbooks Provide expert guidance on securing applications and infrastructure Security … Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain) Experience with EDR, DLP, Proxy, and SEG tools Desirable Qualifications Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP Experience with SOAR playbooks, YARA rules, STIX, and YAML Participation More ❯
Intune device management, O365 Admin Management, Teams and Exchange online management) Sound knowledge in user authentication methods (2FA, AAA); Extensive knowledge in security technologies and concepts (PKI, least privilege, data at rest, data in transit protection); Knowledge and experience related to design, implementation, operation, maintenance, support, configuration and administration of Windows clients in large distributed environment; Experience in … Experience and Education: Advanced/Graduate degree in a field related to the function of the post and other professional certificates for the products/technologies described; Knowledge of Data Classification and information protection technologies and products; Knowledge in Trellix endpoint security, datalossprevention and host firewall technologies and products; Knowledge of Lansweeper Server; Experience More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom Hybrid / WFH Options
Lorien
telephony providers. Good knowledge of networking - Layer2/3, dynamic routing, MPLS and firewall management. Good knowledge of IT security practices and the implementation of tools that provide MFA, DLP, proxy services, encryption, event logging and alerting. Able to provide input to, and technical solutions to business requirements. Desirable Experience: Able to package, script and deploy applications via SCCM including More ❯
with cloud, server, desktop, network and telephony providers. - Layer2/3, dynamic routing, MPLS, SDWAN and Firewall management. - IT security practices and the implementation of tools that provide MFA, DLP, Proxy services, encryption, event logging and alerting. - Extensive experience of Azure cost management. - Experience of Azure Files and migrations from DFS/Standard Shares. More ❯
with cloud, server, desktop, network and telephony providers.- Layer2/3, dynamic routing, MPLS, SDWAN and Firewall management.- IT security practices and the implementation of tools that provide MFA, DLP, Proxy services, encryption, event logging and alerting.- Extensive experience of Azure cost management.- Experience of Azure Files and migrations from DFS/Standard Shares. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Morgan Law
basis to provide expert technical leadership in the design, build and continual improvement of Microsoft Power Platform "Service Packs." These will consolidate Finance, HR, Contracts, Risk and Service-performance data into intuitive Power Apps and analytical dashboards-enabling decision-makers across the Council to access timely insight, drive efficiency and evidence outcomes. They need to develop a management suite … end-to-end delivery of model-driven and canvas Power Apps, custom connectors, Dataverse schema and Azure integration components. Configure role-based security, datalossprevention (DLP) policies and automated tests; manage DevOps release pipelines. Organisational Control & Development Continually review procedures, automate manual processes and exploit new Power Platform capabilities (e.g. Co-Pilot, AI Builder) to maximise More ❯
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
, Development & Application Security Consultants to join their team on a six month initial contract, working fully remotely. The skills/experince required for this role are as follows: DLP and CASB Data Security Data access monitoring Cryptography Encryption Certificate Management Key Management HSMs LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally More ❯
Worcester, Worcestershire, West Midlands, United Kingdom
WRK DIGITAL LTD
WRK digital urgently requires a Technical DLP (DataLossPrevention) Subject Matter Expert to join our client based in Worcester. This is a 6 month contract opportunity. 1-2 days per week required in Worcester. The role presents a high opportunity to extend and we are looking for a candidate that has had previous experience of deployment … across divisions, understanding of DLP architecture, endpoint, network and cloud. We are looking to move quickly, do not delay your application. Please contact Katie to find out more info. More ❯