enabling secure growth. We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection … Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. As an FCA Senior Management Function holder, this leader is accountable for ensuring that cyber, IAM, and DLP controls are effective, proportionate, and resilient. They will be responsible for maintaining governance frameworks that align with FCA and PRA expectations, demonstrating reasonable steps in overseeing third-party and outsourced … be subject to the FCA's Conduct Rules and the Senior Manager Conduct Rules. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and dataMore ❯
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal … Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and data … cloud adoption, Zero Trust, and frictionless user experiences. Partner with business and technology leaders to enable secure digital transformation through robust identity services. DataLossPrevention (DLP) Advance a comprehensive DataLossPrevention program to safeguard sensitive information across endpoints, cloud, email, and collaboration platforms. Establish enterprise-wide policies and controls to prevent unauthorized More ❯
the subject line: “Application Support Request”. Role: Netskope Technical Architect Job Type: Permanent Location: Coventry, UK Are you passionate about driving innovation and best practices in Networking and DLP? We have an exciting role for you – Netskope Technical Architect! Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not just … a Netskope Technical Architect you will serve as the subject matter expert for Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), and DataLossPrevention (DLP) technologies. You will work cross-functionally to architect scalable security solutions, lead incident response efforts, and drive continuous improvement in our cloud security posture. Your responsibilities: Work with teams to … and traffic steering configurations using Secure Web Gateway (SWG) and Cloud Access Security Broker (CASB). Analyse data exfiltration risks and design DataLossPrevention (DLP) policies to mitigate threats. Collaborate with Security Operations to enhance security requirements, apply ad-hoc site restrictions, and manage exception requests. Apply advanced knowledge of SSL inspection to define secure More ❯
Liverpool, England, United Kingdom Hybrid/Remote Options
Love2shop
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: 25 days’ holiday per year, plus bank holidays Company sick pay from More ❯
Welwyn Garden City, England, United Kingdom Hybrid/Remote Options
PayPoint plc
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: Holiday purchase scheme, with 25 days holiday plus bank holidays as standard. More ❯
model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do The Global Delivery Director - Secure Data is a critical leadership role that enables the secure foundation of BCG's digital operations globally. By driving scalable, automated, and user-focused security engineering-and by embedding security … practices to embed security early into development and delivery workflows. Data Security Engineering: Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Collaborate with the IAM team to align authentication, authorization, and privileged access policies with data security controls. Deliver security capabilities that support modern work … ability to present complex security topics to executive leadership. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Symantec DLP, Zscaler CASB, MS Purview, Palo Alto Prisma, Hashi Vault and other modern security platforms. Familiarity with DevSecOps principles, Infrastructure as Code, and secure software development practices. Who You'll Work More ❯
The Global Platform Team Lead and Senior Director - IT Security is responsible for leading the design, delivery, and continuous evolution of BCG's security platforms across identity, device, and data protection domains. This role ensures end-to-end security engineering across all technology environments, including cloud, on-prem, and hybrid systems. The leader will drive strategic planning, execution, and … security requirements, automation opportunities, user experience needs, and broader business outcomes. Key Responsibilities Strategic Leadership & Transformation: Define and execute a unified security engineering strategy that addresses identity, endpoint, and data protection across all environments. Lead the design and implementation of scalable, automated security solutions that integrate seamlessly into enterprise platforms and user experiences. Establish a global security architecture and … and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that More ❯
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
City of London, London, United Kingdom Hybrid/Remote Options
LHH
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Picture More
practice across all regions. Key Responsibilities Lead the design and implementation of secure authentication, authorisation, and data protection frameworks. Manage and enhance DataLossPrevention (DLP) systems, incident response, and risk management processes. Oversee cloud security architecture across Azure, O365, and iManage Cloud environments. Collaborate with global IT, compliance, and risk teams to deliver a consistent … improvement initiatives. About You Minimum 5 years’ experience in information security within a global enterprise environment . Strong knowledge of cloud and network security (Azure, O365). Experienced in DLP, SIEM, and incident response processes. Familiar with ISO 27001/27002 and governance frameworks. CISSP or CEH certification preferred. Excellent communication, stakeholder management, and documentation skills. Why Join? You’ll More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor's degree in computer science, Cybersecurity, Information Systems, or related field (master's preferred). Experience in cybersecurity with 3+ years in a security More ❯
AV), Sandbox, etc. and third-party integrations. We protect our customers from sensitive corporate data being exfiltrated to websites through both traditional DataLossPrevention (DLP) matching, static analysis and machine learning to identify, block and alert on sensitive content. This is an exciting, fast-paced team with many growth opportunities and responsibilities in which your … S3, and VPC on AWS and GCP equivalent) and software development tools such as Git, Terraform, GitLab, Jira, etc. Solid experience with developing in Linux environment Experience with complex data structures and database and analytics technologies such as Redis, Postgres, MySQL, DynamoDB and Apache Druid Ideally have experience of: C/C++, systemd, monit, cgroups/runc/libcontainer More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
secure architectures, managing risk, and driving security strategy across cloud and on-premise environments. Key Responsibilities Design and maintain secure authentication and authorization frameworks. Manage security risks, incidents, and DLP (DataLossPrevention) processes. Implement and enhance cloud security (Azure, Microsoft 365, iManage). Lead incident response, risk assessments, and compliance reviews. Collaborate globally to embed security … policy development, security awareness, and business continuity. Skills & Experience 5+ years' experience in Information Security. Strong technical knowledge of networking, authentication, and cloud (Azure/O365). Experience with DLP, incident response, and ISO 27002 standards. Familiarity with tools such as Microsoft Defender, CrowdStrike, CyberArk, Rapid7, or Palo Alto. CISSP or CEH certification preferred. Excellent communication, problem-solving, and stakeholder More ❯
lead the secure device strategy, ensuring strong protection across all device types and operating systems. Engineer and operate scalable solutions for endpoint protection, datalossprevention (DLP), and compliance checking. Build automated controls for device posture, encryption, threat detection, and remediation. Own and optimize integrations with tools such as Microsoft Defender, Purview, Symantec, CrowdStrike, or equivalent. Platform More ❯
support & career development built-in Join a growing InfoSec team at the heart of a global financial institution’s expansion. As an Analyst, you’ll work hands-on with data governance, security tooling, and access management — helping to shape how a modern SME approaches cybersecurity. You’ll bring technical curiosity, the ability to interrogate data, and the confidence … SC-400) Experience with security tools (Microsoft Defender, web proxy, email security, CrowdStrike or equivalents) Knowledge of single sign-on and zero trust networks (beyond just segregation) Exposure to data management/governance tools (e.g. Microsoft Purview, or similar) Strong communicator: able to translate technical concepts into practical advice for IT and stakeholders What you’ll be doing: Recertification … of accounts : Pulling and interrogating data through bespoke platforms Security tooling : Working with Defender, web proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in datalossprevention, labelling, and stakeholder engagement (including DPO) Practical incident response input : Advising IT on immediate steps during incidents More ❯
collaborating across infrastructure, development, trading, and compliance groups. Expect a role that mixes architecture, hands-on engineering, and ownership of critical initiatives such as RBAC, PAM, cloud hardening, and data protection... Key Responsibilities Define and drive the technical direction for security engineering, ensuring controls and tooling evolve in line with the firm’s broader technology and business objectives Shape … and maintain the long-term architectural roadmap for security capabilities, ensuring key assets and data pathways are protected end-to-end Act as the principal technical adviser to engineering, infrastructure, trading, and operational teams, offering guidance on emerging threats, modern defensive techniques, and secure design patterns Partner closely with internal teams to embed security considerations into new systems and … excessive permissions, insecure interfaces, and other weaknesses Work with cloud and DevOps teams to design and implement remediation steps - covering IAM refinement, network segmentation, encryption practices, API security, and data access controls Promote strong cloud security hygiene across the organisation, ensuring new deployments follow best practice and remain compliant with internal and external standards Contribute to upcoming security engineering More ❯
collaborating across infrastructure, development, trading, and compliance groups. Expect a role that mixes architecture, hands-on engineering, and ownership of critical initiatives such as RBAC, PAM, cloud hardening, and data protection... Key Responsibilities Define and drive the technical direction for security engineering, ensuring controls and tooling evolve in line with the firm’s broader technology and business objectives Shape … and maintain the long-term architectural roadmap for security capabilities, ensuring key assets and data pathways are protected end-to-end Act as the principal technical adviser to engineering, infrastructure, trading, and operational teams, offering guidance on emerging threats, modern defensive techniques, and secure design patterns Partner closely with internal teams to embed security considerations into new systems and … excessive permissions, insecure interfaces, and other weaknesses Work with cloud and DevOps teams to design and implement remediation steps - covering IAM refinement, network segmentation, encryption practices, API security, and data access controls Promote strong cloud security hygiene across the organisation, ensuring new deployments follow best practice and remain compliant with internal and external standards Contribute to upcoming security engineering More ❯
Security Team operations and functions Analysis of data collected from established DataLossPrevention system(s) and methods to ensure compliance with Firm policies Manages DLP systems and processes as required Maintains and coordinates incident response planning, assisting in execution of the incident response plan as needed Controls access to the Firm’s Information Systems and … required Excellent knowledge of a network/firewall security preferred Good knowledge of Disaster Recovery preferred Strong technical knowledge of cloud environments such as Azure/O365 Familiarity with DLP incident handling, remediation, and reporting Proficiency in Microsoft Office products Experience in securing AI-driven systems and leveraging AI tools. Familiar with Microsoft Defender for Endpoint, Thales, CrowdStrike Falcon and More ❯
of pre- and post- sales security consulting activities across one or more of the following areas: Risk assessment and risk management Operational Technology (OT) or Industrial Control Systems (ICS) Data management and storage (for instance, DataLossPrevention or Rights Management) Audit event recording and analysis Cloud or network security, securing mobile data and devices More ❯
are looking to recruit another member of staff for the Technical team. The role will involve supporting the IT infrastructure of all our customer base including server, storage, network, data and applications in addition to project work to improve and enhance the customers infrastructure environment. Key Responsibilities: * Provide 3rd Line support to customers via telephone, email and remote control … VOIP, Leased Lines) * Dell/HP Server Hardware * Storage infrastructures SAN, NAS, DAS * Backup and DR technologies (experience of Veeam and Datto) * SharePoint management and support * IT Security including datalossprevention, encryption, EDR, MDR, Unified Threat Management, 2FA Education/Qualification: * Minimum of 5 GCSEs * 2 A Level passes or equivalent * Post-Secondary School education relating More ❯
Oxford, Oxfordshire, England, United Kingdom Hybrid/Remote Options
Nextech
VOIP, Leased Lines)* Dell/HP Server Hardware* Storage infrastructures SAN, NAS, DAS* Backup and DR technologies (experience of Veeam and Datto)* SharePoint management and support* IT Security including datalossprevention, encryption, EDR, MDR, Unified Threat Management, 2FA Education/Qualification: * Minimum of 5 GCSEs* 2 A Level passes or equivalent* Post-Secondary School education relating More ❯