and influence IT adoption. Conduct technology assessments and provide recommendations to improve the company's Network and Security technology stack. Collaborate with cross-functional teams to define and implement data governance and information security policies. Qualifications & Experience Bachelor’s degree in computer science or a related field. Minimum 5 years’ work experience in complex Network and Security projects, delivery …/or equivalent and higher certification. Security product knowledge (e.g., Cisco, Checkpoint, Palo Alto, SIEM). Cloud and infra-Security knowledge (e.g., AWS, Azure, CISSP, PAM, EDR, EPP, DAM, DLP). Certifications with major Network and Security OEMs (e.g., Cisco CCIE, Checkpoint, F5, Palo Alto, Carbon Black). Familiar with Technical and Critical Infrastructure Stack within Government environment and practices … like Data Classification compliance (e.g., IM8, Government Commercial Cloud (GCC), and/or Confidential Cloud Computing). This role is open to Native Singaporeans only as CAT1 Clearance will be required. Posted by: Harineshwari Lakxmi EA Personnel Reg No: R25139423 EA License: 14C7275 #J-18808-Ljbffr More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
SMART - Mortgage Brokers / Life Advisers
in demand globally by firefighters, paramedics, hospitals and governments. To meet this demand, we are building an industry-leading cyber security team in Belfast to protect our customers and data from a variety of fast moving and constantly evolving threats. We are looking for a Security Operations Analyst to join our Belfast team. This role will work alongside our … by deploying patches and antivirus products Working with network switches, firewalls and wireless access points Working with toolsets such as vulnerability management, SIEM, PAM, IDS/IPS, EDR or DLP platforms Familiarity with IAM best practices, including Multi-Factor Authentication (MFA), Conditional Access, and Identity Governance. RBAC configurations and understanding of how RBAC integrates with various services Be well versed … sick pay 25 days holiday which increases year on year until you reach 5 years of service + 14 additional days About ESO ESO is a fast-paced, growing data, technology and research company passionate about improving community health and safety through the power of data. We pioneer innovative, user-friendly software to meet the changing needs of today More ❯
London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
firm is seeking a Security Engineer to play a key role in strengthening their global security posture. As a subject matter expert, you’ll lead initiatives across network, cloud, data, and system security guiding critical IT projects, running threat models for complex systems, and building automation to validate controls and resilience. You'll act as the escalation point for … a proactive, driven security expert ready to take the lead in a cutting-edge fintech environment. Key Responsibilities Enhance security across critical domains including network, system, cloud, email, and data security. Act as a trusted security advisor on IT projects, embedding security from the ground up and mitigating risks. Lead the design and development of secure architectures and solutions … penetration testing, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit for you, then please apply More ❯
log analysis. Responsibilities: • Design, test and implement secure operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, lossprevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with More ❯
London, England, United Kingdom Hybrid / WFH Options
HowNow
with business needs. Maintain and evolve our ISO 27001 certification and manage the ISMS lifecycle. Perform regular risk assessments, manage remediation plans, and conduct internal audits. Ensure compliance with data protection laws (e.g., GDPR) and customer security requirements. Create and manage information security policies, standards, and procedures. Deliver internal training, onboarding, and awareness programs to promote secure behaviors. Security … working knowledge of ISO 27001 and experience maintaining or achieving certification. Understanding of cloud environments (AWS preferred) and common SaaS security risks. Hands-on knowledge of endpoint protection, SIEMs, DLP, IAM, and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/logging, vulnerability scanning). Experience More ❯
The Depository Trust & Clearing Corporation (DTCC)
creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies We offer top class training and development for you to be an asset in More ❯
London, England, United Kingdom Hybrid / WFH Options
Jobgether
collaborate across departments to integrate security into every stage of development and operations, while continuously optimizing tools, processes, and documentation. You’ll play a crucial role in safeguarding sensitive data and ensuring compliance, while also driving education and awareness on security best practices across the organization. Accountabilities: Lead improvements in detection, monitoring, and incident response capabilities Mentor junior engineers … experience in security engineering, including operations, blue team, DevOps, and architecture Strong knowledge of incident response, threat patterns, and mitigation strategies Hands-on experience with security tools: SIEM, IDS, DLP, MFA, vulnerability scanners, WAFs Proficient in AWS security best practices and Infrastructure as Code (e.g., Terraform, Ansible) Deep understanding of securing Windows, macOS, Linux, and virtualized environments Experience in automation More ❯
creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies We offer top class training and development for you to be an asset in More ❯
Description At Xe, we live currencies. We provide a comprehensive range of currency services and products, including our Currency Converter, Market Analysis, Currency Data API and quick, easy, secure Money Transfers for individuals and businesses. We leverage technology to deliver these services through our website, mobile app and by phone. Last year, we helped over 300 million people access … cloud provider hardening techniques Experience with multi-tier web applications, relational databases, and firewalls High level understanding of a wide range of security products such as IDS/IPS, DLP, cloud security solutions, FIM, proxy servers and AV etc. Desirable Prior DevOps or hands-on administrative experience is highly desirable. CCSP or AWS Certified Security Specialist, or other related cloud More ❯
London, England, United Kingdom Hybrid / WFH Options
Proofpoint
protecting organizations’ greatest assets and biggest risks vulnerabilities in people. With an integrated suite of cloud-based solutions, Proofpoint helps companies around the world stop targeted threats, safeguard their data, and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint for people-centric security … of networking topology, TCP/IP protocol, network configuration and components (firewalls, routers, etc.) Ability to work at all levels of the organization both technically and politically Experience of DLP concepts and products Why Proofpoint Protecting people is at the heart of our award-winning lineup of cybersecurity solutions, and the people who work here are the key to our More ❯
the organization shares intellectual property (IP), as well as regulated or other protected data. Conduct or facilitate threat modelling of network services and applications that ties to the risk, data and industry drivers associated with the service or application. Establish and deliver methods and tools which provide value for the organization by reducing risk. Your Profile Essential skills/… security architecture function, e.g., SABSA, TOGAF, and the embedding of security principles within this. Good knowledge of network security techniques and technologies such as Remote Access, VPN, Firewalls, NAC, DLP, IDS/IPS, SIEM and Wireless security. Good Knowledge of information security principles and best practices and experience in managing information security risk. Familiar with information security frameworks such as More ❯
London, England, United Kingdom Hybrid / WFH Options
Orbis
enhance DevSecOps capabilities. Strengthen security for APIs, Kubernetes, and containerized environments, ensuring robust workload protection. Deploy and manage security tools including IDS/IPS, WAF, Web Proxy, EDR, PAM, DLP, and anti-malware solutions. Monitor and assess emerging threats, providing proactive solutions to enhance security posture. Collaborate with cross-functional teams to integrate security best practices across development and operational … automation tools (Terraform, Ansible, GitHub Actions). Strong knowledge of API security, Kubernetes, and container security. Experience with enterprise security tools (IDS/IPS, WAF, Web Proxy, EDR, PAM, DLP, anti-malware). Deep understanding of networking protocols, operating systems (Linux, Windows, Mac), and cybersecurity principles. Why Join? Work at the forefront of cybersecurity in the digital assets sector. Competitive More ❯
tenant merges. • Proven experience with M365 security and configuration. • Proven experience with core M365 applications and services e.g. OneDrive, Teams, Exchange, Viva, SharePoint. • Proven experience with M365 governance and data protection services including Information Protection and DLP. • Proven experience with Azure AD including on premises Active Directory. • Experience with Intune and EndPoint security and management. • Ideally background in on … Desirable: • M365 business adoption and change management • PowerApps • Unified Communications and meeting services The Person should have 10+ years’ experience in cloud or infrastructure delivery: • Migration of applications and data or experience with business process modernisation\analysis. • Experience leading delivery engagements and managing technical teams. • Excellent interpersonal skills and the ability to influence and manage a range of relationships More ❯
with M365 security and configuration including Defender for Identity Proven experience with core M365 applications and services e.g. Exchange, OneDrive, Teams, Viva, SharePoint. Proven experience with M365 governance and data protection services including Information Protection and DLP. Ideally background in on premises infrastructure, virtualisation technologies or applications. Desirable: Experience with Intune and EndPoint security and management. M365 business adoption … and change management PowerApps Unified Communications and meeting services The Person should have 10+ years' experience in cloud or infrastructure delivery: Migration of applications and data or experience with business process modernisation\analysis. Experience leading delivery engagements and managing technical teams. Excellent interpersonal skills and the ability to influence and manage a range of relationships in a complex environment. More ❯
Cybersecurity Specialist or in a similar role within IT security ️ Strong knowledge of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to More ❯
London, England, United Kingdom Hybrid / WFH Options
Cyber UK
Description Information Security Analyst – Join a Leading Law Firm! Our client, a prestigious law firm, is looking for an Information Security Analyst to help safeguard their critical systems, sensitive data, and ensure compliance with security best practices. This is an exciting opportunity to work in a fast-paced, highly regulated environment. What You’ll Do: Manage and enhance Microsoft More ❯
Reading, England, United Kingdom Hybrid / WFH Options
FSP
Responsibilities Design and development of Microsoft 365 Solutions including, but not limited to: SharePoint, MS Teams apps) Implementation of Power Platform Solutions Guidance on licensing models, environment strategy, and DLP policies Accountability and commitment to tasks, estimates and timelines Provide support and handover to clients and FSP’s own Managed Services team Sharing of skills, knowledge, and continuous improvement through … Copilot Studio and AI Builder Competency in advanced Power Platform methodologies that support ALM best practices including, but not limited to: (Power FX, Environment management, Custom connectors, Solution management, DLP Able to work individually or as a team building Power Platform solutions Understanding of Power Platform licensing models and capacity-based services Experience of using PowerShell for configuration and administration More ❯
M365 and Exchange management. Good communication skills for working across teams and with vendors. Experience with large-scale enterprise deployments. Knowledge of ITIL practices. Familiarity with email archiving and DLP solutions. More ❯
M365 and Exchange management. Good communication skills for working across teams and with vendors. Experience with large-scale enterprise deployments. Knowledge of ITIL practices. Familiarity with email archiving and DLP solutions. More ❯
M365 and Exchange management. Good communication skills for working across teams and with vendors. Experience with large-scale enterprise deployments. Knowledge of ITIL practices. Familiarity with email archiving and DLP solutions. #J-18808-Ljbffr More ❯
improvement plans Essential Skills and Experience Strong communication and cross-team collaboration abilities Expertise in security operations, architecture, and engineering Deep technical knowledge of vulnerabilities, exploits, IDS/IPS, DLP, and firewalls Experience with cloud and hybrid security (e.g. Microsoft Azure, MTP) Industry certifications (e.g. SSCP, CEH, CySA+) Experience designing secure networks and protecting application infrastructure Hands-on familiarity with More ❯
improvement plans Essential Skills and Experience Strong communication and cross-team collaboration abilities Expertise in security operations, architecture, and engineering Deep technical knowledge of vulnerabilities, exploits, IDS/IPS, DLP, and firewalls Experience with cloud and hybrid security (e.g. Microsoft Azure, MTP) Industry certifications (e.g. SSCP, CEH, CySA+) Experience designing secure networks and protecting application infrastructure Hands-on familiarity with More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Intec Select
improvement plans Essential Skills and Experience Strong communication and cross-team collaboration abilities Expertise in security operations, architecture, and engineering Deep technical knowledge of vulnerabilities, exploits, IDS/IPS, DLP, and firewalls Experience with cloud and hybrid security (e.g. Microsoft Azure, MTP) Industry certifications (e.g. SSCP, CEH, CySA+) Experience designing secure networks and protecting application infrastructure Hands-on familiarity with More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
DataLossPrevention (DLP) Governance Analyst Location: Remote/Hybrid – Flexible for the right candidate We are seeking a highly motivated DataLossPrevention (DLP) Governance Analyst to join the Security Operations Governance Program. In this critical role, you’ll support the oversight and reporting functions of our enterprise DLP program, helping to ensure … adherence to internal information protection standards. As a DLP Governance Analyst, you will be responsible for generating insightful, actionable reports and scorecards used to evaluate compliance across business units. You will work collaboratively with cross-functional teams and third-party vendors, ensuring that data classification, removable media handling, and media inventorization practices align with security policies and regulatory requirements. … Key Responsibilities: Develop and maintain governance reports and scorecards that track DLP compliance Support reporting requirements for internal committees and regulatory forums Collaborate with internal teams and vendors to ensure data handling governance standards are met What We’re Looking For: In-depth knowledge of DLP controls and best practices in a corporate setting Strong analytical, problem-solving, and More ❯
Dunfermline, Scotland, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: DataLossPrevention (DLP) Governance Analyst, dunfermline col-narrow-left Client: Acumin Location: Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 26.06.2025 Expiry Date: 10.08.2025 col-wide Job Description: DataLossPrevention (DLP) Governance Analyst Location: Remote/… Hybrid – Flexible for the right candidate We are seeking a highly motivated DataLossPrevention (DLP) Governance Analyst to join the Security Operations Governance Program. In this critical role, you’ll support the oversight and reporting functions of our enterprise DLP program, helping to ensure adherence to internal information protection standards. As a DLP Governance Analyst, you … that data classification, removable media handling, and media inventorization practices align with security policies and regulatory requirements. Key Responsibilities: Develop and maintain governance reports and scorecards that track DLP compliance Support reporting requirements for internal committees and regulatory forums Collaborate with internal teams and vendors to ensure data handling governance standards are met What We’re Looking For More ❯