We are seeking a highly experienced and strategic senior leader to oversee our Cyber Engineering, Identity & Access Management (IAM), and DataLossPrevention (DLP) functions. This role will be responsible for driving the design, delivery, and governance of enterprise-wide security engineering solutions, while ensuring secure, scalable, and resilient identity and data protection services. The ideal … Financial Conduct Authority regime, carrying personal accountability for compliance, operational resilience, and security effectiveness. The Role: Strategic Leadership Define and execute the global strategy for Cyber Engineering, IAM, and DLP in alignment with the enterprise security and technology roadmap. Serve as a trusted advisor to the CISO, CIO, and executive leadership on emerging threats, secure architecture, identity, and data … cloud adoption, Zero Trust, and frictionless user experiences. Partner with business and technology leaders to enable secure digital transformation through robust identity services. DataLossPrevention (DLP) Advance a comprehensive DataLossPrevention program to safeguard sensitive information across endpoints, cloud, email, and collaboration platforms. Establish enterprise-wide policies and controls to prevent unauthorized More ❯
the subject line: “Application Support Request”. Role: Netskope Technical Architect Job Type: Permanent Location: Coventry, UK Are you passionate about driving innovation and best practices in Networking and DLP? We have an exciting role for you – Netskope Technical Architect! Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do not just … a Netskope Technical Architect you will serve as the subject matter expert for Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), and DataLossPrevention (DLP) technologies. You will work cross-functionally to architect scalable security solutions, lead incident response efforts, and drive continuous improvement in our cloud security posture. Your responsibilities: Work with teams to … and traffic steering configurations using Secure Web Gateway (SWG) and Cloud Access Security Broker (CASB). Analyse data exfiltration risks and design DataLossPrevention (DLP) policies to mitigate threats. Collaborate with Security Operations to enhance security requirements, apply ad-hoc site restrictions, and manage exception requests. Apply advanced knowledge of SSL inspection to define secure More ❯
Liverpool, England, United Kingdom Hybrid/Remote Options
Love2shop
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: 25 days’ holiday per year, plus bank holidays Company sick pay from More ❯
Welwyn Garden City, England, United Kingdom Hybrid/Remote Options
PayPoint plc
ll also enhance threat-hunting capabilities by integrating threat intelligence and correlating EDR data with SIEM and XDR platforms for deeper insights. DataLossPrevention (DLP) In this part of the role, you’ll implement and configure DLP solutions, define classification policies, and monitor for potential data leaks. Your work will help protect sensitive information … and prevent unauthorised data exfiltration across the organisation. Incident Response You will form a key part of the incident response team when security incidents occur—analysing threats, assessing business impact, and be part of the response lifecycle from containment to recovery. You’ll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key … XDR, EDR, Azure Sentinel, Cloudflare, and Mimecast. IT environments: Including Windows, Linux, VMware, and AKS. Security Tools: Proficiency with security tools including WAF, proxy, DNS, IDS, firewalls, anti-virus, datalossprevention, idP, IAM, PAM, and MFA. Our benefits if you decide to join us: Holiday purchase scheme, with 25 days holiday plus bank holidays as standard. More ❯
The Global Platform Team Lead and Senior Director - IT Security is responsible for leading the design, delivery, and continuous evolution of BCG's security platforms across identity, device, and data protection domains. This role ensures end-to-end security engineering across all technology environments, including cloud, on-prem, and hybrid systems. The leader will drive strategic planning, execution, and … security requirements, automation opportunities, user experience needs, and broader business outcomes. Key Responsibilities Strategic Leadership & Transformation: Define and execute a unified security engineering strategy that addresses identity, endpoint, and data protection across all environments. Lead the design and implementation of scalable, automated security solutions that integrate seamlessly into enterprise platforms and user experiences. Establish a global security architecture and … and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable data protection solutions, including datalossprevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Picture More
practice across all regions. Key Responsibilities Lead the design and implementation of secure authentication, authorisation, and data protection frameworks. Manage and enhance DataLossPrevention (DLP) systems, incident response, and risk management processes. Oversee cloud security architecture across Azure, O365, and iManage Cloud environments. Collaborate with global IT, compliance, and risk teams to deliver a consistent … improvement initiatives. About You Minimum 5 years’ experience in information security within a global enterprise environment . Strong knowledge of cloud and network security (Azure, O365). Experienced in DLP, SIEM, and incident response processes. Familiar with ISO 27001/27002 and governance frameworks. CISSP or CEH certification preferred. Excellent communication, stakeholder management, and documentation skills. Why Join? You’ll More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
a good blend of them, then we encourage you to apply: Microsoft 365 Governance & Compliance Experience with M365 governance frameworks, including retention policies, datalossprevention (DLP), and compliance centre configurations. Identity & Access Management (IAM) Familiarity with conditional access policies, role-based access control (RBAC), and identity lifecycle management via Azure Entra ID (Active Directory) Single Sign More ❯
support & career development built-in Join a growing InfoSec team at the heart of a global financial institution’s expansion. As an Analyst, you’ll work hands-on with data governance, security tooling, and access management — helping to shape how a modern SME approaches cybersecurity. You’ll bring technical curiosity, the ability to interrogate data, and the confidence … SC-400) Experience with security tools (Microsoft Defender, web proxy, email security, CrowdStrike or equivalents) Knowledge of single sign-on and zero trust networks (beyond just segregation) Exposure to data management/governance tools (e.g. Microsoft Purview, or similar) Strong communicator: able to translate technical concepts into practical advice for IT and stakeholders What you’ll be doing: Recertification … of accounts : Pulling and interrogating data through bespoke platforms Security tooling : Working with Defender, web proxy, CrowdStrike-equivalent tools Data management : Supporting data labelling & retention projects using Purview or similar Governance support : Involved in datalossprevention, labelling, and stakeholder engagement (including DPO) Practical incident response input : Advising IT on immediate steps during incidents More ❯
cyber assurance reviews, projects, and initiatives as well as achieving the cyber assurance and compliance related objectives. Essential Cyber security essentials ISO 27001 NIST CSF Strong Technical Background in Data Classification and DataLossPrevention Experience in information security governance, policy and procedure definition Administration of Active Directory, Azure AD, Windows File Services, SharePoint & Office More ❯
cyber assurance reviews, projects, and initiatives as well as achieving the cyber assurance and compliance related objectives. Essential * Cyber security essentials * ISO 27001 * NIST CSF * Strong Technical Background in Data Classification and DataLossPrevention * Experience in information security governance, policy and procedure definition * Administration of Active Directory, Azure AD, Windows File Services, SharePoint & Office More ❯
cyber assurance reviews, projects, and initiatives as well as achieving the cyber assurance and compliance related objectives. Essential * Cyber security essentials * ISO 27001 * NIST CSF * Strong Technical Background in Data Classification and DataLossPrevention * Experience in information security governance, policy and procedure definition * Administration of Active Directory, Azure AD, Windows File Services, SharePoint & Office More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
Snc-Lavalin
Data Architect/Security page is loaded Data Architect/Securitylocations: GB.United Kingdom: CHE.Baden 5400.Nordhaus 3time type: Full timeposted on: Posted 2 Days Agojob requisition id: R-141464 Job Description Job Title: Data Architect/Security Location: UK or Switzerland Join Us Lead enterprise-wide data architecture strategy and governance: • Define and manage data architecture … across SAP S/4HANA, Workday, and cloud environments.• Develop conceptual, logical, and physical data models aligned with business and regulatory requirements.• Establish data governance frameworks, metadata standards, and MDM processes.• Embed governance checkpoints within PMO methodologies and quality gates.• Lead data lifecycle management initiatives ensuring accuracy and traceability.Architect secure and scalable data integration solutions:• Design … experience in SAP S/4HANA, cloud migration, and data governance programme delivery.• Strong expertise in data modelling, information security, and cloud platforms.• Familiarity with IAM, encryption, DLP technologies, and advanced analytics platforms.• Professional certifications preferred: TOGAF, DAMA DMBOK, CDMP, Azure/AWS Data Architect, SAP Architect, CISSP, CISM. What we offer: In return, we offer a More ❯
are looking to recruit another member of staff for the Technical team. The role will involve supporting the IT infrastructure of all our customer base including server, storage, network, data and applications in addition to project work to improve and enhance the customers infrastructure environment. Key Responsibilities: * Provide 3rd Line support to customers via telephone, email and remote control … VOIP, Leased Lines) * Dell/HP Server Hardware * Storage infrastructures SAN, NAS, DAS * Backup and DR technologies (experience of Veeam and Datto) * SharePoint management and support * IT Security including datalossprevention, encryption, EDR, MDR, Unified Threat Management, 2FA Education/Qualification: * Minimum of 5 GCSEs * 2 A Level passes or equivalent * Post-Secondary School education relating More ❯
Oxford, Oxfordshire, England, United Kingdom Hybrid/Remote Options
Nextech
VOIP, Leased Lines)* Dell/HP Server Hardware* Storage infrastructures SAN, NAS, DAS* Backup and DR technologies (experience of Veeam and Datto)* SharePoint management and support* IT Security including datalossprevention, encryption, EDR, MDR, Unified Threat Management, 2FA Education/Qualification: * Minimum of 5 GCSEs* 2 A Level passes or equivalent* Post-Secondary School education relating More ❯
cloud deployments, ensuring security, compliance, performance, and maintainability. Lead the design and architecture of complex cloud solutions, considering factors such as security controls, compliance requirements (e.g., FedRAMP, NIST, ITAR), data sovereignty, and resilience in highly sensitive environments. Oversee the creation of detailed architectural diagrams, documentation, and specifications for cloud infrastructure and applications. Provide architectural guidance and oversight throughout the … compliance standards relevant to defenceand national security (e.g., NCSC best practices, NIST 800-53, DISA STIGs, SOC 2, ISO 27001). Secure cloud architecture patterns (e.zero trust, micro-segmentation, datalossprevention, encryption at rest and in transit). Infrastructure-as-Code (IaC) and automation for secure cloud deployments. Containerisationand orchestration in secure environments (e.g., Kubernetes, OpenShift More ❯
tasks. Collaboration: Working closely with internal IT teams to integrate security measures and promote IT security awareness among senior management. Operational Oversight: Overseeing penetration testing, vulnerability scans, incident responses, datalossprevention, phishing tests, and system audits. Vendor Management: Conducting security evaluations of third party vendors and service providers, advising on application security initiatives. Let's talk More ❯
birmingham, midlands, united kingdom Hybrid/Remote Options
Axiom Software Solutions Limited
of Power Platform environments. o Monitor usage and compliance, ensuring governance standards are met across all Power Platform solutions. o Assist business users with best practices for app development, data modeling, and workflow automation in Power Apps and Power Automate. o Troubleshoot and resolve issues within Power Platform services, ensuring minimal disruption to business operations. • Microsoft 365 Administration: o … Apply patches and updates for Microsoft 365, ensuring systems remain secure and up-to-date. o Configure and enforce security and compliance policies across the MS 365 suite (e.g., datalossprevention, retention policies). o Perform user and license management within the Microsoft 365 environment, ensuring smooth provisioning and deprovisioning of accounts and permissions. o Ensure More ❯
Cyber Essentials, ISO 27001/22301, and NIST Experience working with operations teams to ensure compliance Understanding of a variety of security tools, in particular Microsoft Purview or another datalossprevention platform Ability to research and evaluate emerging cyber security threats and how to manage them Experience having input into disaster recovery plans as well as More ❯
Cyber Essentials, ISO 27001/22301, and NIST Experience working with operations teams to ensure compliance Understanding of a variety of security tools, in particular Microsoft Purview or another datalossprevention platform Ability to research and evaluate emerging cyber security threats and how to manage them Experience having input into disaster recovery plans as well as More ❯
In this role you will use your Information Security Engineer/Analyst expertise both supporting and enhancing this nationwide company’s cybersecurity posture through the securing of enterprise applications, data and infrastructure and by identifying, assessing, and mitigating security risks. This is a hands-on, predominantly office-based role requiring experience in application and data security, vulnerability assessments … including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP, HTTP, DNS, SSH • Familiarity with network segmentation • Experience with endpoint protection software EDR, Anti-Virus, DLP and securing mobile, tablet, laptop, desktop devices. • Familiar with Zero Trust security models • Proficient in using SIEM tools • Experience with log analysis and incident detection. • Familiarity with securing cloud-native … applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and DataLoss Prevention. • Identity Access Management deployment Azure AD, MFA, SSO, RBAC • Security auditing and monitoring. • Experience in deploying security solutions across business projects. • Excellent analytical and problem-solving abilities. • Strong communication skills and stakeholder management skills. More ❯
South East London, London, United Kingdom Hybrid/Remote Options
COMPUTACENTER (UK) LIMITED
working at the forefront of digitalisation. What you'll do Design and deliver Microsoft 365 solutions across Entra ID, Teams, Exchange, SharePoint, OneDrive, and associated security tools (Conditional Access, DLP, Data Labelling) Analyse customer requirements, recommend solutions, and guide stakeholders to achieve their business goals Take on medium to complex solution design and implementation, independently or as part of … and emerging technologies What you'll need Substantial hands-on experience with Microsoft 365 technologies and real-world solution delivery Strong understanding of security components such as Conditional Access, DLP, and Data Labelling Relevant qualifications or accreditations in Microsoft 365 or related technologies Proven ability to design technical solutions and contribute to project and bid documentation Strong communication, documentation More ❯
and prioritising features, epics, and user stories aligned with strategy and roadmaps. Develop and review security architectures and toolsets across cloud, infrastructure, and application domains (e.g. SIEM, IAM, PAM, DLP, endpoint protection). Provide security assurance and governance across projects, ensuring alignment with frameworks such as ISO 27001, NIST, GDPR, and PCI DSS. Collaborate with enterprise, technology, and business stakeholders More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯