enabling secure growth. We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection … Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. As an FCA Senior Management Function holder, this leader is accountable for ensuring that cyber, IAM, and DLP controls are effective, proportionate, and resilient. They will be responsible for maintaining governance frameworks that align with FCA and PRA expectations, demonstrating reasonable steps in overseeing third-party and outsourced … be subject to the FCA's Conduct Rules and the Senior Manager Conduct Rules. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and dataMore ❯
We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal … Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and data … cloud adoption, Zero Trust, and frictionless user experiences. Partner with business and technology leaders to enable secure digital transformation through robust identity services. DataLossPrevention (DLP) Advance a comprehensive DataLossPrevention program to safeguard sensitive information across endpoints, cloud, email, and collaboration platforms. Establish enterprise-wide policies and controls to prevent unauthorized More ❯
the subject line: “Application Support Request”. Role: Netskope Technical Architect Job Type: Permanent Location: Coventry, UK Are you passionate about driving innovation and best practices in Networking and DLP? We have an exciting role for you – Netskope Technical Architect! Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not just … a Netskope Technical Architect you will serve as the subject matter expert for Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), and DataLossPrevention (DLP) technologies. You will work cross-functionally to architect scalable security solutions, lead incident response efforts, and drive continuous improvement in our cloud security posture. Your responsibilities: Work with teams to … and traffic steering configurations using Secure Web Gateway (SWG) and Cloud Access Security Broker (CASB). Analyse data exfiltration risks and design DataLossPrevention (DLP) policies to mitigate threats. Collaborate with Security Operations to enhance security requirements, apply ad-hoc site restrictions, and manage exception requests. Apply advanced knowledge of SSL inspection to define secure More ❯
Liverpool, England, United Kingdom Hybrid/Remote Options
Love2shop
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: 25 days’ holiday per year, plus bank holidays Company sick pay from More ❯
Welwyn Garden City, England, United Kingdom Hybrid/Remote Options
PayPoint plc
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: Holiday purchase scheme, with 25 days holiday plus bank holidays as standard. More ❯
model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do The Global Delivery Director - Secure Data is a critical leadership role that enables the secure foundation of BCG's digital operations globally. By driving scalable, automated, and user-focused security engineering-and by embedding security … practices to embed security early into development and delivery workflows. Data Security Engineering: Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Collaborate with the IAM team to align authentication, authorization, and privileged access policies with data security controls. Deliver security capabilities that support modern work … ability to present complex security topics to executive leadership. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Symantec DLP, Zscaler CASB, MS Purview, Palo Alto Prisma, Hashi Vault and other modern security platforms. Familiarity with DevSecOps principles, Infrastructure as Code, and secure software development practices. Who You'll Work More ❯
delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology. Your role and responsibilities As a Security Consultant specializing in Data and Application Security, you will help clients secure their applications and sensitive information across the full development and data lifecycle. You will guide organizations through application security challenges … embedding controls into design, build, and deployment phases, while leveraging practices such as Threat Modelling, Secure SDLC, and DevSecOps. With expertise in vulnerability management, data protection, and regulatory compliance, you will design security guardrails that support application modernization programs in multicloud environments, ensuring risks are minimized and business objectives are achieved securely. Responsibilities Provide advisory and technical expertise on … SDLC, DevSecOps, and security testing. Knowledge of data protection methods: encryption (at rest/in transit), masking, anonymization. Hands-on experience with DataLossPrevention (DLP) tools and strategies. Proficiency in database security controls, including access, auditing, and patch management. Familiarity with SIEM platforms for monitoring and analysis of data/application security events. Understanding More ❯
The Global Platform Team Lead and Senior Director - IT Security is responsible for leading the design, delivery, and continuous evolution of BCG's security platforms across identity, device, and data protection domains. This role ensures end-to-end security engineering across all technology environments, including cloud, on-prem, and hybrid systems. The leader will drive strategic planning, execution, and … security requirements, automation opportunities, user experience needs, and broader business outcomes. Key Responsibilities Strategic Leadership & Transformation: Define and execute a unified security engineering strategy that addresses identity, endpoint, and data protection across all environments. Lead the design and implementation of scalable, automated security solutions that integrate seamlessly into enterprise platforms and user experiences. Establish a global security architecture and … and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that More ❯
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
City of London, London, United Kingdom Hybrid/Remote Options
LHH
rationalisation of controls against regulatory frameworks. Perform threat modelling, risk identification, assessment, and mitigation planning. Analyse, protect, and manage data outputs, including DataLossPrevention (DLP) and Rights Management. Conduct 3rd party risk analysis, controls, audit, and cyber resilience and recovery assessments. Review cloud and network security posture, including mobile data and device protection. Manage More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Picture More
practice across all regions. Key Responsibilities Lead the design and implementation of secure authentication, authorisation, and data protection frameworks. Manage and enhance DataLossPrevention (DLP) systems, incident response, and risk management processes. Oversee cloud security architecture across Azure, O365, and iManage Cloud environments. Collaborate with global IT, compliance, and risk teams to deliver a consistent … improvement initiatives. About You Minimum 5 years’ experience in information security within a global enterprise environment . Strong knowledge of cloud and network security (Azure, O365). Experienced in DLP, SIEM, and incident response processes. Familiar with ISO 27001/27002 and governance frameworks. CISSP or CEH certification preferred. Excellent communication, stakeholder management, and documentation skills. Why Join? You’ll More ❯
and next move, and quickly and effectively respond to an attack. · Develop and optimize automation rules and playbooks in the SIEM (Microsoft Sentinel) · Carry out cost optimisation, considering what data tiering and appropriate filtering to ensure a cost effective solution for clients. · Assist in the onboarding and continued development of SOC clients and various aspects of their security stack … into the SIEM. · Work closely with management to develop service improvement plans · Integrate various data sources into Sentinel for use in platform such as NGFW, IAM solutions and network telemetary. · Act as an escalation point during peaks in demand and as and when required · Work closely with Information security management and senior security consultants to develop internal security posture … sophisticated security attacks · Analytical rule automation and playbook development · Design, implementation, and integration of a SIEM solutions into a customer environment · Security management tooling such as intrusion detection and prevention, datalossprevention, firewall, VPN, filtering and traffic inspection, and security reporting · Strong understanding of Microsoft 365 and Office 365 security products e.g. Microsoft Defender for More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor’s degree in computer science, Cybersecurity, Information Systems, or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security More ❯
Design Documents (SDDs) for security solutions, ensuring alignment with enterprise architecture and security policies. Design and architect solutions across various security domains including: DataLossPrevention (DLP) Security Information and Event Management (SIEM) Identity and Access Management (IAM) Endpoint Detection and Response (EDR), MDM, and Endpoint Management tools Cloud and On-Prem Security Solutions Collaborate with stakeholders … operations, application teams, compliance, and risk management to gather requirements and translate them into secure technical designs. Evaluate and recommend security products, tools, and technologies. Ensure solutions meet compliance, data privacy, and regulatory requirements (e.g., GDPR, HIPAA, ISO 27001). Support solution implementation teams with architecture guidance and … technical documentation. Maintain up-to-date knowledge of emerging security threats and best practices to continuously enhance solution designs. Qualifications - Proven experience designing security solutions across multiple domains including DLP, SIEM, IAM, and Endpoint Security. Bachelor's degree in computer science, Cybersecurity, Information Systems, or related field (master's preferred). Experience in cybersecurity with 3+ years in a security More ❯
AV), Sandbox, etc. and third-party integrations. We protect our customers from sensitive corporate data being exfiltrated to websites through both traditional DataLossPrevention (DLP) matching, static analysis and machine learning to identify, block and alert on sensitive content. This is an exciting, fast-paced team with many growth opportunities and responsibilities in which your … S3, and VPC on AWS and GCP equivalent) and software development tools such as Git, Terraform, GitLab, Jira, etc. Solid experience with developing in Linux environment Experience with complex data structures and database and analytics technologies such as Redis, Postgres, MySQL, DynamoDB and Apache Druid Ideally have experience of: C/C++, systemd, monit, cgroups/runc/libcontainer More ❯
Defender tools, including: Defender for Endpoint, Defender for Identity, Defender for Cloud, Defender for Office 365 etc. Leading engagements around Microsoft Purview, covering: DataLossPrevention (DLP), Information Protection and Sensitivity Labelling, Insider Risk Management, Data Lifecycle Management, Compliance and eDiscovery Acting as a trusted technical voice for customers, helping them turn security goals into tangible More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
secure architectures, managing risk, and driving security strategy across cloud and on-premise environments. Key Responsibilities Design and maintain secure authentication and authorization frameworks. Manage security risks, incidents, and DLP (DataLossPrevention) processes. Implement and enhance cloud security (Azure, Microsoft 365, iManage). Lead incident response, risk assessments, and compliance reviews. Collaborate globally to embed security … policy development, security awareness, and business continuity. Skills & Experience 5+ years' experience in Information Security. Strong technical knowledge of networking, authentication, and cloud (Azure/O365). Experience with DLP, incident response, and ISO 27002 standards. Familiarity with tools such as Microsoft Defender, CrowdStrike, CyberArk, Rapid7, or Palo Alto. CISSP or CEH certification preferred. Excellent communication, problem-solving, and stakeholder More ❯
Exposure to cloud platforms such as AWS or Azure (desirable but not essential). Experience with cyber security tools, including endpoint protection and datalossprevention (DLP) solutions. Excellent communication and documentation skills, with the ability to engage stakeholders at all levels. If youre looking to grow your career in infrastructure and security within a collaborative and More ❯
lead the secure device strategy, ensuring strong protection across all device types and operating systems. Engineer and operate scalable solutions for endpoint protection, datalossprevention (DLP), and compliance checking. Build automated controls for device posture, encryption, threat detection, and remediation. Own and optimize integrations with tools such as Microsoft Defender, Purview, Symantec, CrowdStrike, or equivalent. Platform More ❯
+ flights etc (If FTE) Location: Abu Dhabi - Permanent FTE - includes relocation support + bonus + healthcare + bens) or Freelance Considered Key Experience: - 5 Eyes and understanding complex Data Security challenges within Defence/National level projects/engineering projects and experienced setting up Frameworks, Structures and Architecture/process’s for managing across a multi-site/… manual), non-prod sanitisation pipelines, and evidence packs for audit and compliance. Implement CI/CD security gates and automated controls (SAST/DAST/IaC/secret scanning, DLP, data masking tests) across pipelines and environments. Validate encryption, key management, access controls (RBAC/ABAC), logging/immutable audit trails, backups, and DLP across on-prem and cloud … we’re looking for Demonstrable experience building security QA or assurance practices focused on data handling in hybrid environments. Strong technical experience with encryption/KMS/HSM, DLP, data masking/synthetic data, secrets management (Vault/KMS), IAM/SSO and cloud platform security. Hands-on familiarity with SAST/DAST/IaC/static More ❯
support & career development built-in Join a growing InfoSec team at the heart of a global financial institution’s expansion. As an Analyst, you’ll work hands-on with data governance, security tooling, and access management — helping to shape how a modern SME approaches cybersecurity. You’ll bring technical curiosity, the ability to interrogate data, and the confidence … SC-400) Experience with security tools (Microsoft Defender, web proxy, email security, CrowdStrike or equivalents) Knowledge of single sign-on and zero trust networks (beyond just segregation) Exposure to data management/governance tools (e.g. Microsoft Purview, or similar) Strong communicator: able to translate technical concepts into practical advice for IT and stakeholders What you’ll be doing: Recertification … of accounts : Pulling and interrogating data through bespoke platforms Security tooling : Working with Defender, web proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in datalossprevention, labelling, and stakeholder engagement (including DPO) Practical incident response input : Advising IT on immediate steps during incidents More ❯
cyber assurance reviews, projects, and initiatives as well as achieving the cyber assurance and compliance related objectives. Essential Cyber security essentials ISO 27001 NIST CSF Strong Technical Background in Data Classification and DataLossPrevention Experience in information security governance, policy and procedure definition Administration of Active Directory, Azure AD, Windows File Services, SharePoint & Office More ❯