Permanent Data Loss Prevention Job Vacancies

1 to 25 of 605 Permanent Data Loss Prevention Jobs

Security Engineer - 12 month FTC

London, England, United Kingdom
Walkers
for routine security testing activities. Develop and deploy tools and automation to streamline common IT Security Operations tasks. Identify areas of cyber security improvement to ensure cyber security and data security by design controls. Collaborate closely with IT and Development teams to embed security-by-design principles into development processes . Conduct reviews of existing tools and processes, identifying … vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support Data Loss Prevention (DLP) solutions that protect corporate data across platforms, devices, and environments globally. Monitoring and managing responses to the Security Incidents and Security DLP. Standard, third party and privilege Identity Access … application Firewalls, anti-malware, cloud proxies and CASB. Forcepoint, Palo Alto Firewall, and Cisco NAC experience Good knowledge of MS Defender for Cloud, Storage (SQL) and CSPM. Proficient with Data loss prevention tools experience, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tooling such as Exabeam, QRadar, Splunk and Sentinel. Experience with Azure (security More ❯
Posted:

Security Engineer - 12-Month Fixed-Term Contract

London, England, United Kingdom
Precise Placements
in a fast–paced environment Key Responsibilities: Implement new and existing security tooling to enhance the firm's security controls Support security operations, including incident response , vulnerability management , and DLP Embed security–by–design principles in collaboration with IT and Dev teams Operate and enhance security infrastructure, including HSM , EDR , SIEM , and IAM Monitor and respond to security alerts; manage … EDR tools : SentinelOne, CrowdStrike, Defender Cloud platforms : Azure, M365, Defender for Cloud SIEM : Exabeam, Splunk, QRadar IAM : ENTRA ID, CyberArk, DUO MFA Firewall & Network Security : Cisco, Palo Alto, NAC DLP tools: Microsoft Purview, Tessian Strong scripting abilities (PowerShell, Python, Perl) Familiarity with vulnerability management , penetration testing, and security frameworks (NIST, ISO 27001, OWASP, GDPR) Proficient in managing compliance and infrastructure More ❯
Posted:

Senior Information Security Analyst

London, England, United Kingdom
Hybrid / WFH Options
Onyx-Conseil
The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity … analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is essential. Responsibilities: • Collaborate with IT teams for input … as NIST, etc., implementing and auditing security measures, security response, and incident management. • Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. • Experience with identity access management solutions, such as SAMLOATH • Experience with HIDS and NIDS • The More ❯
Posted:

Senior Cloud Security Engineer (100% remote, only Spain)

Spain
Hybrid / WFH Options
UST España & Latam
Implement security hardening for critical Azure applications and access controls. Redesign Azure network security architecture with tools like Azure Firewall and NSGs. Implement Microsoft Purview for data governance, DLP, and compliance policies. Conduct security assessments to address vulnerabilities and misconfigurations. Oversee Azure IAM, including Azure AD and Conditional Access. Automate security tasks using IaC tools and scripting. Provide training More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

IT & InfoSec Manager

London, United Kingdom
Creditspring
information security policies, procedures, and best practices. Work with the MSP to implement security-first IT practices. Monitor and respond to security threats, incidents, and vulnerabilities. Improve endpoint protection, data encryption, and backup systems to safeguard sensitive company and customer information. Conduct regular security audits and risk assessments to ensure compliance with regulatory standards. Lead employee training and awareness … Strong understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) and security tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO 27001, GDPR, or NIST. Experience More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Architect - Information Security

Manchester, United Kingdom
Hybrid / WFH Options
Action For Humanity
Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring Data Loss Prevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across … and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and security audits. Define data protection, backup, and retention policies aligned with Microsoft 365 compliance tools. 5. Network Security & Infrastructure Protection (Plus Skills) Experience with Layer 7 firewalls (Cisco, Fortinet, Palo Alto, Sophos), VPNs More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Enterprise Security Architect

East London, London, United Kingdom
HMRC
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
Employment Type: Permanent
Salary: £80,000
Posted:

Enterprise Security Architect

Edinburgh, Midlothian, Scotland, United Kingdom
HMRC
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
Employment Type: Permanent
Salary: £80,000
Posted:

Enterprise Security Architect

Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, data loss prevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
Employment Type: Permanent
Salary: £80,000
Posted:

Chief Information Security Officer

Cataluña, Spain
Triple-A
European Union. You will be responsible for establishing and maintaining a robust security posture, ensuring compliance with local and EU regulations (particularly ACPR and GDPR), and safeguarding our assets, data, and reputation in a dynamic and rapidly evolving fintech landscape. Key Responsibilities: Strategic Leadership: Develop, implement, and monitor a comprehensive information security and risk management strategy and program specifically … Regulatory Compliance: Serve as the primary point of contact for all cybersecurity matters related to French and EU regulations. Ensure full compliance with ACPR requirements, GDPR, and other relevant data protection and cybersecurity directives (e.g., DORA, NIS2 if applicable). Liaise with regulatory bodies and auditors as required. Risk Management: Identify, evaluate, and mitigate information security risks across French … security, cloud security (AWS, Azure, GCP), cryptography, identity and access management, incident response, and disaster recovery. Experience with security technologies such as SIEM, IDS/IPS, WAF, endpoint protection, DLP, and vulnerability scanning tools. Certifications: Professional security certifications such as CISSP, CISM, CISA, CRISC, or equivalent are highly desirable. Languages: Fluency in French and English (both written and spoken) is More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Information Security Engineer

Street, Somerset, United Kingdom
Clarksoutlet
Somerset, United Kingdom Req PURPOSE To work with multidisciplinary teams across Clarks Technology and business areas to identify, design, and build security controls to protect Clarks' applications, networks, and data from security risks. To develop and embed best-practice security processes and knowledge into technical teams aligned to Zero Trust principles and in line with industry standards and frameworks … required to maintain cyber security for I T services, including managing endpoint compliance, system hardening, host firewall settings, endpoint applications, regulatory requirements, audit issues, endpoint security tools such as DLP, AV, EDR, patching etc. Development of monitoring processes and relevant measures/KPIs/metrics to support ongoing assessment of Clarks' security posture Support business continuity and disaster recovery processes … environments Good understanding of security controls and best practices across a number of the following areas/domains: Network and infrastructure (networking protocol knowledge is an advantage Endpoint (e.g. DLP, Endpoint Detection and Response, File Integrity, SIEM) Database technologies (SQL, Oracle) General cryptography practices (e.g. PKI) Cloud environments (Azure, AWS) Fundamental understanding of privacy and data protection laws and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Security Engineer

Chester-le-Street, England, United Kingdom
Clarksoutlet
United Kingdom Req #1846 PURPOSE To work with multidisciplinary teams across Clarks Technology and business areas to identify, design, and build security controls to protect Clarks’ applications, networks, and data from security risks. To develop and embed best-practice security processes and knowledge into technical teams aligned to Zero Trust principles and in line with industry standards and frameworks … required to maintain cyber security for I T services, including managing endpoint compliance, system hardening, host firewall settings, endpoint applications, regulatory requirements, audit issues, endpoint security tools such as DLP, AV, EDR, patching etc. Development of monitoring processes and relevant measures/KPIs/metrics to support ongoing assessment of Clarks’ security posture Support business continuity and disaster recovery processes … environments Good understanding of security controls and best practices across a number of the following areas/domains: Network and infrastructure (networking protocol knowledge is an advantage Endpoint (e.g. DLP, Endpoint Detection and Response, File Integrity, SIEM) Database technologies (SQL, Oracle) General cryptography practices (e.g. PKI) Cloud environments (Azure, AWS) Fundamental understanding of privacy and data protection laws and More ❯
Posted:

Professional Services Engineer - Hybrid Infrastructure

Northampton, England, United Kingdom
Hybrid / WFH Options
HanseVision GmbH
as Active Directory, Entra ID, SSO, and MFA integrations. Design Zero Trust architectures solutions to align with and implement least-privilege access models. Integration of security technologies, including SIEM, DLP (Data Loss Prevention), MFA, and identity and access management systems (IAM). Design & Implement backup solutions including, disaster recovery, and business continuity strategies for both on-premises More ❯
Posted:

Security Engineer

Leeds, England, United Kingdom
Maples Group - Legal Services
This role is responsible for deploying, maintaining, supporting and improving the tools and processes for Information Security at Maples. Primary responsibilities include: Implementing and maintaining network, intrusion detection and prevention systems as well as other security tools in a hybrid environment (both on-prem and cloud) Be aware of the latest threats in cybersecurity to guide and advise the … for the security operations team during active response efforts Track, record, and monitor identified security issues through to completion Support IAM technology stack by performing various identity, access and data protection activities including monitoring and enhancements to ensure that the security systems are operational and effective Manage user roles, permissions and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth, etc. … Work with cross-functional teams to ensure secure architecture, policies, controls and practices in cloud environment that maintains a high level of security Assist with implementation and management of data security policies including data loss prevention, privileged access management, insider risk management, etc Assist with the design, engineering and management of automations to improve workflows and More ❯
Posted:

Security Engineer

Leeds, England, United Kingdom
Maples Group
their work. About the Role This position involves deploying, maintaining, supporting, and enhancing our Information Security tools and processes. Key responsibilities include: Implementing and maintaining network, intrusion detection, and prevention systems in hybrid environments (on-premises and cloud). Staying updated on cybersecurity threats to advise on system protections. Monitoring threat intelligence feeds and translating them into detection and … response efforts as a technical resource for the security team. Tracking and resolving security issues from identification to resolution. Supporting IAM technologies by monitoring and enhancing identity, access, and data protection activities. Managing user roles, permissions, and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth). Designing and enforcing policies on least privilege access, identity governance, and access reviews. Overseeing … for incident response. Identifying and remediating vulnerabilities in cloud environments. Collaborating with cross-functional teams to ensure secure cloud architecture and practices. Implementing data security policies such as DLP, privileged access management, and insider risk management. Designing and managing automation to improve security workflows. Supporting audits, penetration tests, and vulnerability assessments. Developing and analyzing KPIs, KRIs, and other metrics More ❯
Posted:

Senior Lead, Cyber Security Engineer - (Encryption and O365 Security)

London, England, United Kingdom
Northern Trust
governance policies and procedures to ensure compliance with regulatory requirements and organizational standards. Monitor and report on compliance metrics, data classification, and data loss prevention (DLP) policies. Work closely with IT, security, and compliance teams to integrate Microsoft Purview and Defender for Cloud Apps with existing systems and workflows. Communicate effectively with stakeholders to report on … required. Proven experience in managing and supporting Microsoft Purview and Microsoft Defender for Cloud Apps. Experience with M365 Services (SPO, Teams, Exchange, Entra ID, etc), Microsoft Sentinel, Zscaler, Symantec DLP a plus Strong understanding of data governance, compliance frameworks, and information security best practices. Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Scripting experience … Security, Compliance, and Identity Fundamentals, Microsoft Certified: Information Protection Administrator, CISSP, CISM, CISA, Cisco, SANS, etc) are a plus. Preferred Skills Experience with data loss prevention (DLP) technologies and strategies. Familiarity with compliance regulations (e.g., GDPR, HIPAA) and data protection laws. Knowledge of cloud security concepts and technologies. Working with Us: As a Northern Trust partner More ❯
Posted:

Senior Information Security Analyst

London, United Kingdom
Hybrid / WFH Options
Onyx-Conseil
systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works … closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to … required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Security Engineer

Manchester, England, United Kingdom
Vix Technology
evaluate the effectiveness of existing security controls Design and implement security solutions to mitigate identified risks Implement, and manage security systems, including firewalls, intrusion detection/prevention systems, DLP, endpoint protection, MDM, SIEM, IAM, vulnerability management etc Respond to security events and incidents Perform regular security audits and risk assessments Maintain security controls, identify risks and propose treatment plans … commercial agreements Develop, implement, and maintain security policies, processes, procedures and guidelines Assist with internal and external audits, and provide advice to colleagues and technical teams Ensure compliance with data privacy regulations (e.g., GDPR, CCPA) Produce security reports for internal and external stakeholders Recommend and implement new security tools and technologies Stay current with infosec trends and tailor recommendations More ❯
Posted:

Cloud Security Architect

London Area, United Kingdom
iXceed Solutions
environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat modeling for cloud-native applications and hybrid environments. Collaborate with enterprise architects …/CD pipelines. Hands-on experience with GCP security services including IAM, VPC Service Controls, Cloud Armor, KMS, Security Command Center. Fluency in designing security policies using IAM, KMS, DLP, and SIEM/SOAR tools. Strong understanding of network security principles (firewalls, VPNs, load balancing, DNS) and their implementation on GCP. Proficiency in at least one scripting language (e.g., Python … strategies. Knowledge of DevSecOps practices and security integration into CI/CD pipelines. Strong communication and stakeholder engagement skills with experience presenting to C-suite executives. Experience in defining data classification, governance, and retention policies for financial services. More ❯
Posted:

Cloud Security Architect

City of London, London, United Kingdom
iXceed Solutions
environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat modeling for cloud-native applications and hybrid environments. Collaborate with enterprise architects …/CD pipelines. Hands-on experience with GCP security services including IAM, VPC Service Controls, Cloud Armor, KMS, Security Command Center. Fluency in designing security policies using IAM, KMS, DLP, and SIEM/SOAR tools. Strong understanding of network security principles (firewalls, VPNs, load balancing, DNS) and their implementation on GCP. Proficiency in at least one scripting language (e.g., Python … strategies. Knowledge of DevSecOps practices and security integration into CI/CD pipelines. Strong communication and stakeholder engagement skills with experience presenting to C-suite executives. Experience in defining data classification, governance, and retention policies for financial services. More ❯
Posted:

Cloud Security Architect

South East London, England, United Kingdom
iXceed Solutions
environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat modeling for cloud-native applications and hybrid environments. Collaborate with enterprise architects …/CD pipelines. Hands-on experience with GCP security services including IAM, VPC Service Controls, Cloud Armor, KMS, Security Command Center. Fluency in designing security policies using IAM, KMS, DLP, and SIEM/SOAR tools. Strong understanding of network security principles (firewalls, VPNs, load balancing, DNS) and their implementation on GCP. Proficiency in at least one scripting language (e.g., Python … strategies. Knowledge of DevSecOps practices and security integration into CI/CD pipelines. Strong communication and stakeholder engagement skills with experience presenting to C-suite executives. Experience in defining data classification, governance, and retention policies for financial services. More ❯
Posted:

Cloud Security Architect

London, England, United Kingdom
iXceed Solutions
environments for financial services clients leveraging GCP security services and best practices. Design and implement Zero Trust Architecture, identity and access management strategies, and secure networking models. Advise on data protection, encryption strategies, regulatory compliance (e.g., FCA, GDPR), and risk mitigation frameworks. Perform security assessments and threat modeling for cloud-native applications and hybrid environments. Collaborate with enterprise architects …/CD pipelines. Hands-on experience with GCP security services including IAM, VPC Service Controls, Cloud Armor, KMS, Security Command Center. Fluency in designing security policies using IAM, KMS, DLP, and SIEM/SOAR tools. Strong understanding of network security principles (firewalls, VPNs, load balancing, DNS) and their implementation on GCP. Proficiency in at least one scripting language (e.g., Python … strategies. Knowledge of DevSecOps practices and security integration into CI/CD pipelines. Strong communication and stakeholder engagement skills with experience presenting to C-suite executives. Experience in defining data classification, governance, and retention policies for financial services. Seniority level Seniority level Mid-Senior level Employment type Employment type Contract Job function Job function Information Technology Industries Information Services More ❯
Posted:

Security (SOC) Engineer

Manchester, North West, United Kingdom
Reed Technology
supporting the engineering lead in configuring, implementing, and maintaining the tools that support all SOC functions. You will assess, implement, configure, and optimise our technical security controls, tools, and data feeds to maintain and continuously improve the visibility across our environments. You will also lead initiatives to improve the security posture and respond to incidents, problems and change requests … a cyber security focused role - Ideally 1- 2 years working as an engineer. Knowledge of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. More ❯
Employment Type: Permanent
Salary: £55,000
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Birmingham, Staffordshire, United Kingdom
Hybrid / WFH Options
CET Structures Limited
networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP … VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Technical Engineer - 40 hours per week - hybrid contract

Birmingham, England, United Kingdom
Hybrid / WFH Options
CET Structures Limited
networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP … VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on More ❯
Posted:
Data Loss Prevention
10th Percentile
£45,000
25th Percentile
£49,168
Median
£65,000
75th Percentile
£81,250
90th Percentile
£117,500