We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal … Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and data … cloud adoption, Zero Trust, and frictionless user experiences. Partner with business and technology leaders to enable secure digital transformation through robust identity services. DataLossPrevention (DLP) Advance a comprehensive DataLossPrevention program to safeguard sensitive information across endpoints, cloud, email, and collaboration platforms. Establish enterprise-wide policies and controls to prevent unauthorized More ❯
model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do The Global Delivery Director - Secure Data is a critical leadership role that enables the secure foundation of BCG's digital operations globally. By driving scalable, automated, and user-focused security engineering-and by embedding security … practices to embed security early into development and delivery workflows. Data Security Engineering: Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Collaborate with the IAM team to align authentication, authorization, and privileged access policies with data security controls. Deliver security capabilities that support modern work … ability to present complex security topics to executive leadership. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Symantec DLP, Zscaler CASB, MS Purview, Palo Alto Prisma, Hashi Vault and other modern security platforms. Familiarity with DevSecOps principles, Infrastructure as Code, and secure software development practices. Who You'll Work More ❯
The Global Platform Team Lead and Senior Director - IT Security is responsible for leading the design, delivery, and continuous evolution of BCG's security platforms across identity, device, and data protection domains. This role ensures end-to-end security engineering across all technology environments, including cloud, on-prem, and hybrid systems. The leader will drive strategic planning, execution, and … security requirements, automation opportunities, user experience needs, and broader business outcomes. Key Responsibilities Strategic Leadership & Transformation: Define and execute a unified security engineering strategy that addresses identity, endpoint, and data protection across all environments. Lead the design and implementation of scalable, automated security solutions that integrate seamlessly into enterprise platforms and user experiences. Establish a global security architecture and … and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that More ❯
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
City of London, London, United Kingdom Hybrid/Remote Options
LHH
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Picture More
practice across all regions. Key Responsibilities Lead the design and implementation of secure authentication, authorisation, and data protection frameworks. Manage and enhance DataLossPrevention (DLP) systems, incident response, and risk management processes. Oversee cloud security architecture across Azure, O365, and iManage Cloud environments. Collaborate with global IT, compliance, and risk teams to deliver a consistent … improvement initiatives. About You Minimum 5 years’ experience in information security within a global enterprise environment . Strong knowledge of cloud and network security (Azure, O365). Experienced in DLP, SIEM, and incident response processes. Familiar with ISO 27001/27002 and governance frameworks. CISSP or CEH certification preferred. Excellent communication, stakeholder management, and documentation skills. Why Join? You’ll More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor's degree in computer science, Cybersecurity, Information Systems, or related field (master's preferred). Experience in cybersecurity with 3+ years in a security More ❯
AV), Sandbox, etc. and third-party integrations. We protect our customers from sensitive corporate data being exfiltrated to websites through both traditional DataLossPrevention (DLP) matching, static analysis and machine learning to identify, block and alert on sensitive content. This is an exciting, fast-paced team with many growth opportunities and responsibilities in which your … S3, and VPC on AWS and GCP equivalent) and software development tools such as Git, Terraform, GitLab, Jira, etc. Solid experience with developing in Linux environment Experience with complex data structures and database and analytics technologies such as Redis, Postgres, MySQL, DynamoDB and Apache Druid Ideally have experience of: C/C++, systemd, monit, cgroups/runc/libcontainer More ❯
lead the secure device strategy, ensuring strong protection across all device types and operating systems. Engineer and operate scalable solutions for endpoint protection, datalossprevention (DLP), and compliance checking. Build automated controls for device posture, encryption, threat detection, and remediation. Own and optimize integrations with tools such as Microsoft Defender, Purview, Symantec, CrowdStrike, or equivalent. Platform More ❯
collaborating across infrastructure, development, trading, and compliance groups. Expect a role that mixes architecture, hands-on engineering, and ownership of critical initiatives such as RBAC, PAM, cloud hardening, and data protection... Key Responsibilities Define and drive the technical direction for security engineering, ensuring controls and tooling evolve in line with the firm’s broader technology and business objectives Shape … and maintain the long-term architectural roadmap for security capabilities, ensuring key assets and data pathways are protected end-to-end Act as the principal technical adviser to engineering, infrastructure, trading, and operational teams, offering guidance on emerging threats, modern defensive techniques, and secure design patterns Partner closely with internal teams to embed security considerations into new systems and … excessive permissions, insecure interfaces, and other weaknesses Work with cloud and DevOps teams to design and implement remediation steps - covering IAM refinement, network segmentation, encryption practices, API security, and data access controls Promote strong cloud security hygiene across the organisation, ensuring new deployments follow best practice and remain compliant with internal and external standards Contribute to upcoming security engineering More ❯
collaborating across infrastructure, development, trading, and compliance groups. Expect a role that mixes architecture, hands-on engineering, and ownership of critical initiatives such as RBAC, PAM, cloud hardening, and data protection... Key Responsibilities Define and drive the technical direction for security engineering, ensuring controls and tooling evolve in line with the firm’s broader technology and business objectives Shape … and maintain the long-term architectural roadmap for security capabilities, ensuring key assets and data pathways are protected end-to-end Act as the principal technical adviser to engineering, infrastructure, trading, and operational teams, offering guidance on emerging threats, modern defensive techniques, and secure design patterns Partner closely with internal teams to embed security considerations into new systems and … excessive permissions, insecure interfaces, and other weaknesses Work with cloud and DevOps teams to design and implement remediation steps - covering IAM refinement, network segmentation, encryption practices, API security, and data access controls Promote strong cloud security hygiene across the organisation, ensuring new deployments follow best practice and remain compliant with internal and external standards Contribute to upcoming security engineering More ❯
Security Team operations and functions Analysis of data collected from established DataLossPrevention system(s) and methods to ensure compliance with Firm policies Manages DLP systems and processes as required Maintains and coordinates incident response planning, assisting in execution of the incident response plan as needed Controls access to the Firm’s Information Systems and … required Excellent knowledge of a network/firewall security preferred Good knowledge of Disaster Recovery preferred Strong technical knowledge of cloud environments such as Azure/O365 Familiarity with DLP incident handling, remediation, and reporting Proficiency in Microsoft Office products Experience in securing AI-driven systems and leveraging AI tools. Familiar with Microsoft Defender for Endpoint, Thales, CrowdStrike Falcon and More ❯
Job summary The NHS Counter Fraud Authority (NHSCFA) is the national body responsible for all matters relating to the prevention, detection and investigation of economic crime across the NHS. Further information about our work and annual plan for delivering this is available on our website. An exciting opportunity has arisen to join the NHSCFA Technology team as an Information … and remote. Demonstrate detailed knowledge of: oIT system monitoring (SIEM). oSecurity Incident Management. Demonstrate detailed knowledge of Information Security in several of the following areas: oIntrusion detection and prevention systems. oVulnerability Management. oNetwork technology and operations. oWindows 10 and Windows Server. oSUSE Linux. oMicrosoft365. oInformation Security Management Systems ISO27001. oRisk Management Process. oIT system auditing Experience with IT … Process. oPublic Services Network (PSN) and NHS N3. oDatabase Security. oMicrosoft Sentinel Experience with software security architecture and software security testing. Specialist Knowledge Essential Knowledge of IT security and Data protection issues. IT Service Management best practice, including ITIL and ISO20000 Demonstrate knowledge in some of the following areas: oEncryption Systems. oSecurity Products (Authentication, DataLossPreventionMore ❯
desktops, videoconferencing equipment, and Microsoft Office 365 desktop and mobile applications. You will perform administrative tasks in Microsoft 365 management tools including Azure Active Directory, Azure toolsets (Intune, Autopilot, DataLossPrevention, Flows etc) and assist in delivering differentiating solutions to the Soldo community. Additionally you will administer the Soldo Microsoft 365 tenant ensuring seamless service delivery More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Soldo
desktops, videoconferencing equipment, and Microsoft Office 365 desktop and mobile applications. You will perform administrative tasks in Microsoft 365 management tools including Azure Active Directory, Azure toolsets (Intune, Autopilot, DataLossPrevention, Flows etc) and assist in delivering differentiating solutions to the Soldo community. Additionally you will administer the Soldo Microsoft 365 tenant ensuring seamless service delivery More ❯
connect securely and directly to all applications from wherever they work. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, RBI, CASB and datalossprevention to all connections via the cloud, instantaneously and at scale. This eliminates the need for traditional network security appliances, such as VPNs, firewalls and web More ❯
connect securely and directly to all applications from wherever they work. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, RBI, CASB and datalossprevention to all connections via the cloud, instantaneously and at scale. This eliminates the need for traditional network security appliances, such as VPNs, firewalls and web More ❯
South East London, London, United Kingdom Hybrid/Remote Options
COMPUTACENTER (UK) LIMITED
working at the forefront of digitalisation. What you'll do Design and deliver Microsoft 365 solutions across Entra ID, Teams, Exchange, SharePoint, OneDrive, and associated security tools (Conditional Access, DLP, Data Labelling) Analyse customer requirements, recommend solutions, and guide stakeholders to achieve their business goals Take on medium to complex solution design and implementation, independently or as part of … and emerging technologies What you'll need Substantial hands-on experience with Microsoft 365 technologies and real-world solution delivery Strong understanding of security components such as Conditional Access, DLP, and Data Labelling Relevant qualifications or accreditations in Microsoft 365 or related technologies Proven ability to design technical solutions and contribute to project and bid documentation Strong communication, documentation More ❯
technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents Experience in managing shift roster Experience in managing day to day SOC operations activity Experience in ISO 27001, SOC 1 and More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest improvements and work collaboratively across teams A genuine passion for cyber security Certifications such as CISSP, SC More ❯