use of Microsoft cloud services. Evaluating and optimizing existing IT environments. Developing best practices and concepts for automation. Implementing Modern Workplace Solutions, leveraging Microsoft Teams and Messaging, securing M365 data using Microsoft Purview, and enhancing company collaboration with tools like MS Viva Engage. Deploying and configuring Windows 10, 11 with Office 365, including image creation or Autopilot/Intune … of Microsoft 365, Windows 10, 11 (including AVD/VDI), Intune, SCCM, Office 365, Enterprise Mobility + Security (EMS), and Teams. Familiarity with Microsoft Office 365 Security, Azure ATP, DLP, AIP, Windows Defender ATP, and Entra. Technical leadership in a dynamic, fast-paced environment. Proficiency in PowerShell and other scripting languages. Up-to-date knowledge of Microsoft products. Strong communication More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Simmons & Simmons LLP
be an enabler, and whose role is to work with the business to achieve its goals. Broad experience of technologies including, but not limited to; Firewalls, IPS & IDS, SIEM, DLP, WAF, Modern Operating systems, AD/AAD, Microsoft management tools, Cloud Service Providers, Vulnerability management, Anti-virus, email and Web filtering. An understanding of core application development principles. Experience in … developing people-centric security controls with a focus on awareness, prevention, detection, and response. Great communication skills and able to build positive cross functional working relationships. Ability to multi-task, prioritise, and work well under pressure, either individually or as a team. Knowledge of best practice information security standards and frameworks, such as ISO 27001 and NIST. Broad knowledge More ❯
SLA standards. Incident Response: Lead and manage IT security incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security policies and More ❯
management and traffic control across regions. Managing M365 administration, including Microsoft 365 Defender, Defender for Endpoint, Defender for Identity, and Security Score. Handling M365 license management, Cloud App Security, DLP, and portals such as Security & Compliance, Exchange Online, SharePoint Online, and Intune. Building and installing servers using Azure Resource Manager templates or Azure Portal. Utilizing cloud technologies and third-party More ❯
Industry-recognized certifications such as CISSP, CISM, CompTIA Security+, CEH, or vendor-specific credentials (e.g., AWS Security, Microsoft SC-200). Experience with security tools and platforms (e.g., SIEM, DLP, vulnerability scanners). Familiarity with regulatory and compliance frameworks (e.g., ISO 27001, NIST, GDPR). Our benefits Boots Retirement Savings Plan Discretionary annual bonus Generous employee discounts Enhanced maternity/ More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100/+44 204 520 2575 with the subject line: “Application Support Request”. Role: DLP Support Specialist Location: London/Watford Mode of working: Hybrid (3 days) Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do … brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role DLP Analyst – Responsible for monitoring DLP alerts, conducting investigations, and ensuring compliance with security policies. DLP Administrator – Manages DLP policies, updates configurations, and ensures data protection measures are effectively implemented. … Security Operations Support – Collaborates with the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100/+44 204 520 2575 with the subject line: “Application Support Request”. Role: DLP Support Specialist Location: London/Watford Mode of working: Hybrid (3 days) Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do … brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role DLP Analyst – Responsible for monitoring DLP alerts, conducting investigations, and ensuring compliance with security policies. DLP Administrator – Manages DLP policies, updates configurations, and ensures data protection measures are effectively implemented. … Security Operations Support – Collaborates with the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100/+44 204 520 2575 with the subject line: “Application Support Request”. Role: DLP Support Specialist Location: London/Watford Mode of working: Hybrid (3 days) Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do … brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role DLP Analyst – Responsible for monitoring DLP alerts, conducting investigations, and ensuring compliance with security policies. DLP Administrator – Manages DLP policies, updates configurations, and ensures data protection measures are effectively implemented. … Security Operations Support – Collaborates with the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. More ❯
are looking for: A passionate technology focused individual, with an honest and empathic approach to customer conversations. You will have hands on experience with a variety of technologies in datalossprevention and a keen interest in emerging security technologies. You will be excited to join a growing team of consultants focused on helping our customers achieve … a range of industries, whilst also collaborating closely with internal teams across Bridewell. Your core focus will be leading the delivery of Microsoft Purview solutions - helping clients navigate complex data governance, compliance, and risk management requirements. From auditing and optimising existing deployments to designing and implementing scalable compliance architectures, you will provide strategic and technical oversight across projects, acting … need to have all the following: A people-first approach to team management. Demonstrable experience with Microsoft Purview across core compliance areas, including: DataLossPrevention (DLP) Information Protection (Sensitivity Labels, encryption, etc.) Insider Risk Management eDiscovery & Communication Compliance Data Lifecycle Management & Records Management Information Barriers Demonstrable experience with Azure and Microsoft cloud services. A passion More ❯
London, England, United Kingdom Hybrid / WFH Options
Bridewell Consulting Limited
are looking for: A passionate technology focused individual, with an honest and empathic approach to customer conversations. You will have hands on experience with a variety of technologies in datalossprevention and a keen interest in emerging security technologies. You will be excited to join a growing team of consultants focused on helping our customers achieve … a range of industries, whilst also collaborating closely with internal teams across Bridewell. Your core focus will be leading the delivery of Microsoft Purview solutions - helping clients navigate complex data governance, compliance, and risk management requirements. From auditing and optimising existing deployments to designing and implementing scalable compliance architectures, you will provide strategic and technical oversight across projects, acting … need to have all the following: A people-first approach to team management. Demonstrable experience with Microsoft Purview across core compliance areas, including: DataLossPrevention (DLP) Information Protection (Sensitivity Labels, encryption, etc.) Insider Risk Management eDiscovery & Communication Compliance Data Lifecycle Management & Records Management Information Barriers Demonstrable experience with Azure and Microsoft cloud services. A passion More ❯
Key Responsibilities: In this role, you will be responsible for overseeing and leading a team of security personnel across multiple domains including Security Operations, Global Security Administration, Physical Security, Data Security Analytics, PKI/Certificate Management, and Network Security Engineering. Your role will encompass a wide range of strategic, managerial, and technical responsibilities, including but not limited to: Technical … through involvement with vendors, conferences, connecting with peers for all the firms’ various key technologies. Lead, supervise and inspire local team multiple key areas, Global Security Admins, Security Operations, Data Security Scientists and other areas/teams as assigned. Security Responsibility: Conduct in-depth technical vendor security reviews for all vendor solutions integrated into the organization's technology stack … awareness and training programs Ensure that the firm’s technology risk management practices are aligned with industry standards and best practices. Participate in rolling out global security initiatives including DLP, Network Segmentation, Secure Server Access Help oversee the development and implementation of the firm's information security program and governance framework Coordinate the response to security incidents and breaches and More ❯
Key Responsibilities: In this role, you will be responsible for overseeing and leading a team of security personnel across multiple domains including Security Operations, Global Security Administration, Physical Security, Data Security Analytics, PKI/Certificate Management, and Network Security Engineering. Your role will encompass a wide range of strategic, managerial, and technical responsibilities, including but not limited to: Technical … through involvement with vendors, conferences, connecting with peers for all the firms’ various key technologies. Lead, supervise and inspire local team multiple key areas, Global Security Admins, Security Operations, Data Security Scientists and other areas/teams as assigned. Security Responsibility: Conduct in-depth technical vendor security reviews for all vendor solutions integrated into the organization's technology stack … awareness and training programs Ensure that the firm’s technology risk management practices are aligned with industry standards and best practices. Participate in rolling out global security initiatives including DLP, Network Segmentation, Secure Server Access Help oversee the development and implementation of the firm's information security program and governance framework Coordinate the response to security incidents and breaches and More ❯
Key Responsibilities: In this role, you will be responsible for overseeing and leading a team of security personnel across multiple domains including Security Operations, Global Security Administration, Physical Security, Data Security Analytics, PKI/Certificate Management, and Network Security Engineering. Your role will encompass a wide range of strategic, managerial, and technical responsibilities, including but not limited to: Technical … through involvement with vendors, conferences, connecting with peers for all the firms’ various key technologies. Lead, supervise and inspire local team multiple key areas, Global Security Admins, Security Operations, Data Security Scientists and other areas/teams as assigned. Security Responsibility: Conduct in-depth technical vendor security reviews for all vendor solutions integrated into the organization's technology stack … awareness and training programs Ensure that the firm’s technology risk management practices are aligned with industry standards and best practices. Participate in rolling out global security initiatives including DLP, Network Segmentation, Secure Server Access Help oversee the development and implementation of the firm's information security program and governance framework Coordinate the response to security incidents and breaches and More ❯
access control for all Microsoft 365 applications. Security administration : Implement security best practices such as conditional access policies, multi-factor authentication (MFA), and DataLossPrevention (DLP). Implement and manage device policies using Microsoft Endpoint Manager (Intune) for Windows and mobile devices. Support Teams and SharePoint for collaboration, including setting up communication channels, file sharing permissions More ❯
2. Certified Information Systems Security Professional (CISSP), Certified IPv6 Security Expert (CISE), or equivalent certifications preferred. 3. Proficiency in network security tools and technologies, such as intrusion detection/prevention systems, firewalls, and SIEM solutions. 4. Excellent communication and interpersonal skills to collaborate with team members and convey complex security concepts to non-technical stakeholders. 5. In-depth knowledge … A comprehensive understanding of cybersecurity best practices and industry standards for implementing IPv6 securely - Hands on experience with firewalls, routers, switches, proxies, cloud-based systems, operating systems, databases, networking, DataLossPrevention, Endpoint Security Software, Network Intrusion Detection and Prevention Systems (IDS/IPS) and host-based IDS and IPS and general cyber security best practices More ❯
2. Certified Information Systems Security Professional (CISSP), Certified IPv6 Security Expert (CISE), or equivalent certifications preferred. 3. Proficiency in network security tools and technologies, such as intrusion detection/prevention systems, firewalls, and SIEM solutions. 4. Excellent communication and interpersonal skills to collaborate with team members and convey complex security concepts to non-technical stakeholders. 5. In-depth knowledge … A comprehensive understanding of cybersecurity best practices and industry standards for implementing IPv6 securely - Hands on experience with firewalls, routers, switches, proxies, cloud-based systems, operating systems, databases, networking, DataLossPrevention, Endpoint Security Software, Network Intrusion Detection and Prevention Systems (IDS/IPS) and host-based IDS and IPS and general cyber security best practices More ❯
leadership role responsible for establishing and maintaining a robust information security program within the Modulr financial services environment. This individual will be instrumental in protecting the organization's sensitive data, systems, and infrastructure from cyber threats while ensuringpliance with global regulations and industry standards. Key responsibilities Leadership and Strategy: Develop and implement a comprehensive information security strategy aligned with … implement security architecture to protect critical assets, including on-premise and cloud-based systems (with a focus on AWS). Manage security technologies such as firewalls, intrusion detection systems, datalossprevention tools, and cloud security posture management (CSPM) solutions for AWS. Oversee security operations, including monitoring, incident response, and vulnerability management, with a focus on UK … specific threats and regulations. Policy andpliance: Develop and maintain information security policies, standards, and procedures in accordance with UK laws and regulations (, GDPR, Data Protection Act 2018, FCA regulations). Ensurepliance with relevant industry standards (, PCI DSS, ISO 27001) and UK-specific guidelines. Conduct security awareness training for employees, tailored to the UK financial services context. Third-Party Risk More ❯
London, England, United Kingdom Hybrid / WFH Options
Modulr Finance Limited
leadership role responsible for establishing and maintaining a robust information security program within the Modulr financial services environment. This individual will be instrumental in protecting the organization's sensitive data, systems, and infrastructure from cyber threats while ensuring compliance with global regulations and industry standards. Key responsibilities Leadership and Strategy: Develop and implement a comprehensive information security strategy aligned … implement security architecture to protect critical assets, including on-premise and cloud-based systems (with a focus on AWS). Manage security technologies such as firewalls, intrusion detection systems, datalossprevention tools, and cloud security posture management (CSPM) solutions for AWS. Oversee security operations, including monitoring, incident response, and vulnerability management, with a focus on UK … specific threats and regulations. Policy and Compliance: Develop and maintain information security policies, standards, and procedures in accordance with UK laws and regulations (e.g., GDPR, Data Protection Act 2018, FCA regulations). Ensure compliance with relevant industry standards (e.g., PCI DSS, ISO 27001) and UK-specific guidelines. Conduct security awareness training for employees, tailored to the UK financial services More ❯
and go spending! They can do that in-store or online. Sometimes we work in the consumer market, and sometimes we are all about business-to-business and insight data tells us that over 60% of the UK population recognises the Love2shop brand. We’ve been around for more than 55 years so you could say we really know … and strengthen security across our network. You'll also help manage endpoint security, check system health, and work with our infrastructure team to keep everything running smoothly. Incident Response & Prevention: When security incidents happen, you’ll investigate, assess the impact, and take action to contain threats. You'll also work on automating routine tasks to speed up our response … and hands-on knowledge of Microsoft Azure, Entra ID, Defender XDR, Azure Sentinel, Cloudflare, and Mimecast. You should also be comfortable working with security tools like firewalls, IDS, WAF, DLP, IAM, and MFA across platforms such as Windows, Linux, VMware, and AKS. Strong communication skills, problem-solving abilities, and a proactive mindset are key. If you love learning and staying More ❯
security including intrusion detection, incident response, vulnerability assessment, application security and compliance with the corporate information security policy. Primarily be responsible for implementing, operating and improving security technologies including DLP, Antivirus, IPS/IDS, End Point Protection, Database Activity Monitoring, Web Application Firewall and processes. Essential Functions - Design, build, test and deploy new security technologies, which include the development of … to complex computing environments, with advanced knowledge in security technologies and services - Hands-on experience with at least two or more of the following Enterprise Security Technologies - Network Intrusion Prevention/Detection - Virtual Private Networks; SSL, IPSec and Site-to-Site - Enterprise Class Stateful Inspection Firewalls - Network Access Controls in context to Identity management - Windows Server OS & Desktop OS More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
and strengthen security across our network. You'll also help manage endpoint security, check system health, and work with our infrastructure team to keep everything running smoothly. Incident Response & Prevention: When security incidents happen, you’ll investigate, assess the impact, and take action to contain threats. You'll also work on automating routine tasks to speed up our response … and hands-on knowledge of Microsoft Azure, Entra ID, Defender XDR, Azure Sentinel, Cloudflare, and Mimecast. You should also be comfortable working with security tools like firewalls, IDS, WAF, DLP, IAM, and MFA across platforms such as Windows, Linux, VMware, and AKS. Strong communication skills, problem-solving abilities, and a proactive mindset are key. If you love learning and staying More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
Job summary Join our dynamic Digital, Data and Technology (DDaT) team at NHSBSA as a Cyber Security Operations Team Lead. You'll lead a team of specialists, manage security operations, and support various projects and initiatives. Your role involves ensuring compliance with security standards, managing incidents, and collaborating with internal and external stakeholders. Key Responsibilities : Lead and manage the … with Information Security Standards ISO27001, NHS DSPT, NCSC CAF 4.Experience of managing security technologies including; firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP 5.Designing and recommending appropriate controls to enable the achievement of Cyber security and wider business goals. Desirable 1.Evaluation of threat intelligence data from multiple sources to inform decision making. More ❯
driven solutions to focus on sustainability. We're looking for an experienced Information Security & Compliance Officer to lead and evolve our security and compliance framework, protecting our customers, our data, and our business as we scale. The impact you’ll have: You’ll be the heart of our Governance, Risk & Compliance team, designing and delivering a security and compliance … be great if you also have: Certifications like ISO 27001 Lead Implementer/Auditor, CISSP, CISA, or CRISC Experience in cloud environments (Microsoft 365, Azure, AWS) Exposure to SIEM, DLP, or GRC platforms Background in B2B, e-commerce, logistics, or construction supply chains What you’ll get back: Join a forward-thinking team committed to transforming how businesses operate, using More ❯
The Depository Trust & Clearing Corporation (DTCC)
creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies We offer top class training and development for you to be an asset in More ❯
London, England, United Kingdom Hybrid / WFH Options
Ripjar
Chief Information Security Officer (CISO) Chief Information Security Officer (CISO) Get AI-powered advice on this job and more exclusive features. Ripjar specialises in the development of software and data products that help governments and organisations combat serious financial crime. Our technology is used to identify criminal activity such as money laundering and terrorist financing, enabling organisations to enforce … Expertise in ISO27001, SOC2, NIST CSF, Cyber Essentials, and DORA. Experience with modern cloud infrastructure and security (AWS, Azure, GCP, PaaS/IaaS/SaaS). Familiarity with IAM, DLP, and Linux-based environments. Strong understanding of security architecture, governance, and regulatory trends. Professional certifications such as CISSP, CISM, or CRISC (preferred). Exceptional communication skills to engage senior internal More ❯