client. This analyst will play a crucial role in detecting, analyzing, and mitigating potential security risks. This work will be onsite in Washington, DC. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and reporting them through case management systems. • Develop & Implement countermeasures against known adversarial tactics, techniques, and … procedures (TTPs). • Collaborate with cybersecurity, counterintelligence, and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on network traffic, intrusion attempts, and datalossprevention technologies. • Support Insider Threat Programs by integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom
Nominate Recruitment Ltd
that is genuinely a great place to work. Job Duties: Cybersecurity Oversight : Leads the implementation and ongoing oversight of the Cyber Assessment Framework, ensuring the organisation’s systems and data remain secure and compliant. Audit Leadership : Organises and manages critical audits such as the CAA audit, coordinating with internal and external stakeholders to ensure regulatory and operational standards are … the business. Incident Response & Management : Manage security alerts and incidents, including threat detection and mitigation. Policy & Compliance : Writing, reviewing and ensuring adherence to internal policies and external regulations, including data protection and cyber resilience standards. Programme Management: Understand approaches to improving business security with the ability to best implement practical solutions and manage robust implementations on schedule. Essential Criteria … the past. Incident management experience - working with industry standard systems, or in a Security Operations Centre (SOC), or adjacently having managed workstreams with a SOC function. Email Security and DataLossPrevention execution experience. Cloud security skills - ability to manage complex security environment across a hybrid of on-premises and cloud solutions. Ability to adopt, oversee, and More ❯
to support, operate, and maintain the Distributed Continuity Integrated Network - Top Secret Enterprise Services (DCIN-TS ES) which is a DoD-provided, TS/SCI, integrated voice, video, and data, global communications network that facilitates collaboration among senior leaders and key staff. The Lone Wolf program boasts a professional workforce comprised of specialists throughout the Information Technology lifecycle and … queries, generate reports, and configure alerts and notifications using cybersecurity tools such as Splunk, Tenable, and Trellix to support monitoring, analysis, and incident response activities. Identify and onboard new data sources into cybersecurity tools, and perform analysis to detect anomalies, patterns, and trends that support threat detection and situational awareness. Use knowledge, skills, and ability to conduct research for … site, distributed Splunk environment. Including Multi-site Clustering, Search Head Clustering, Universal Forwarders, Deployer, and Deployment Server. Configure, operate, and maintain Trellix and its components (ePolicy Orchestrator, Trellix Agent, DataLossPrevention, Host Intrusion Prevention System, Policy Auditor, Asset Baseline Monitor, and Virus Scan Enterprise) on Windows and Linux creating exceptions to allow essential processes to More ❯
Two (2) years performing root cause analysis of cybersecurity events and incidents. • Working knowledge of at least two types of security tools: Firewall, IDS/IPS, Host based antivirus, Datalossprevention, Vulnerability Management, Forensics, Malware Analysis, Device Hardening, Understanding of Defense-in-Depth, Ability to build scripts and tools to enhance threat detection and incident response More ❯
technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents Experience in managing shift roster Experience in managing day to day SOC operations activity Experience in ISO 27001, SOC 1 and More ❯
cyber threats using advanced threat intelligence and proactive defense strategies. Oversee incident response planning and execution, ensuring alignment with broader crisis management frameworks. Build and maintain robust capabilities in DataLossPrevention, cyber forensics, and eDiscovery. Direct red teaming, cyber countermeasures, and threat hunting initiatives, including internal and external cyber defense exercises. Drive effective vulnerability management strategies More ❯
log analysis. Responsibilities: • Design, test and implement secure operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, lossprevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research, evaluate, and recommend new security tools, techniques, and technologies in alignment with More ❯
Oversee the execution of security measures called out in the security plan to include timely scans of network resources and software patches. • Incident response, digital forensics, lossprevention, and eDiscovery actions. Includes security control design and solution planning at the system, mission, and enterprise level, security-in-depth/defense-in-depth, and other related IAM/ISSO More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Bonhill Partners
You'll work at the intersection of technology, risk, and compliance translating regulatory and business requirements into secure, actionable outcomes. Key Responsibilities Deliver end-to-end cyber projects (e.g. DLP, cloud security tools, infrastructure upgrades). Translate regulatory and risk requirements into business-aligned cyber solutions. Produce and manage key artefacts: BRDs, traceability matrices, roadmaps, status reports, risk logs. Support More ❯
You'll work at the intersection of technology, risk, and compliance translating regulatory and business requirements into secure, actionable outcomes. Key Responsibilities Deliver end-to-end cyber projects (e.g. DLP, cloud security tools, infrastructure upgrades). Translate regulatory and risk requirements into business-aligned cyber solutions. Produce and manage key artefacts: BRDs, traceability matrices, roadmaps, status reports, risk logs. Support More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Accudo Solutions Ltd
Strong understanding of Exchange Online, SharePoint, Teams, Intune, Viva and Copilot Experience with PowerShell scripting for automation and administration Good grasp of security/compliance features (MFA, Conditional Access, DLP, etc.) Excellent problem-solving skills and attention to detail Strong communication and documentation skills Relevant Microsoft certifications (e.g., MS-100, MS-101, SC-300) are a plus What They Offer More ❯
within a CSOC/SOC environment. Demonstrable technical knowledge, skills, and/or experience in intrusion analysis, and network and security investigation using a variety of security tools (EDR, DLP, AV, Snort, Wireshark, TCPdump, etc.). Working knowledge and experience of core security and infrastructure technologies (e.g., firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS). More ❯
Desirable PKI, N-cypher and Certificate Management Microsoft Endpoint Configuration Manager (MECM) for Windows patching and Application Deployments Windows Server Update Services Trellix ePO, ENS, Firewall, Application Control, DLP Scripting (PowerShell, VB, etc.) Print Services RSA Exposure to Virtualisation technologies Understanding of Networking - WAN/LAN + Firewalls + Routing If you are looking for an exciting new challenge to More ❯
/Nutanix AHV Familiarity with Microsoft 365 technologies, including: Collaboration tools: Teams, OneDrive, SharePoint Access Management: Azure AD, Conditional Access, Analytics Endpoint Management: InTune, Autopilot, MDM Threat & Security: Defender, DLP/WIP Backup technologies Networking and Routing Benefits: Competitive remuneration package. Comprehensive training and development opportunities. Regular company and team social events, plus participation in charity and sports events. Cycle More ❯
Desirable PKI, N-cypher and Certificate Management Microsoft Endpoint Configuration Manager (MECM) for Windows patching and Application Deployments Windows Server Update Services Trellix ePO, ENS, Firewall, Application Control, DLP Scripting (PowerShell, VB, etc.) Print Services RSA Exposure to Virtualisation technologies Understanding of Networking - WAN/LAN + Firewalls + Routing If you are looking for an exciting new challenge to More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Red Snapper Group
DataLossPrevention (DLP) Governance Analyst Location: Remote/Hybrid - Flexible for the right candidate We are seeking a highly motivated DataLossPrevention (DLP) Governance Analyst to join the Security Operations Governance Program. In this critical role, you'll support the oversight and reporting functions of our enterprise DLP program, helping to ensure … adherence to internal information protection standards.As a DLP Governance Analyst, you will be responsible for generating insightful, actionable reports and scorecards used to evaluate compliance across business units. You will work collaboratively with cross-functional teams and third-party vendors, ensuring that data classification, removable media handling, and media inventorization practices align with security policies and regulatory requirements. Key … Responsibilities: Develop and maintain governance reports and scorecards that track DLP compliance Support reporting requirements for internal committees and regulatory forums Collaborate with internal teams and vendors to ensure data handling governance standards are met What We're Looking For: In-depth knowledge of DLP controls and best practices in a corporate setting Strong analytical, problem-solving, and communication More ❯
Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
DataLossPrevention (DLP) Governance Analyst Location: Remote/Hybrid - Flexible for the right candidate We are seeking a highly motivated DataLossPrevention (DLP) Governance Analyst to join the Security Operations Governance Program. In this critical role, you'll support the oversight and reporting functions of our enterprise DLP program, helping to ensure … adherence to internal information protection standards. As a DLP Governance Analyst, you will be responsible for generating insightful, actionable reports and scorecards used to evaluate compliance across business units. You will work collaboratively with cross-functional teams and third-party vendors, ensuring that data classification, removable media handling, and media inventorization practices align with security policies and regulatory requirements. … Key Responsibilities: Develop and maintain governance reports and scorecards that track DLP compliance Support reporting requirements for internal committees and regulatory forums Collaborate with internal teams and vendors to ensure data handling governance standards are met What We're Looking For: In-depth knowledge of DLP controls and best practices in a corporate setting Strong analytical, problem-solving, and More ❯
firewall/AWS cloud security. The network security engineer will have a solid understanding of the modern cyber security landscape with a strong background in network security, cyber-attacks, datalossprevention, and DoD and AF information technology standards and practices. This is a full-time position located at Hanscom AFB, Bedford, MA. Responsibilities Duties include, but … integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements. Knowledge of monitoring and managing network and host-based intrusion prevention systems actively in-line, Full Packet Capture (with analytics), Sandboxing, DataLossprevention, malware prevention systems, vulnerability scanning solutions, DDOS protection, Security Event/Information … Develop and assist with new LAN/WAN security applications and hardware as assigned. Experience with SEIM technologies and best practices, and experience implementing a more robust advanced security data analytics capability. Lead comprehensive network security assessments and risk analyses, proposing robust enhancements to the security infrastructure for KR. Stay ahead of cyber security developments, recommend cutting-edge security More ❯
hiring Cybersecurity SME with the following skillset: Job Summary: We are looking for a Cybersecurity SME in the UK (based out of Telford, Shropshire) with a strong experience of – Data Protection, Application & Cloud Data Security Key Responsibilities: Information Security Governance & Compliance: • Develop and maintain security policies, standards, and procedures aligned with UK GDPR and other compliance. • Conduct risk … data (e.g., PII, PHI). • Ensure security controls are embedded across enterprise platforms including Pega CRM, contact center systems, and cloud data environments . Data Protection & DLP: • Design and implement DLP strategies across endpoints, cloud storage, and enterprise applications. • Enforce data classification, encryption, and access control policies for regulated data. • Collaborate with stakeholders to ensure compliance … with data protection regulations and privacy-by-design principles. Cloud Data Security: • Define and enforce security controls for structured and unstructured data stored in cloud platforms AWS S3. • Implement encryption, key management, and access governance for cloud data. • Monitor data flows between cloud services and on-prem systems to prevent unauthorized access or data leakage. More ❯
technologies? Then we need your expertise in controls and activities for the effective management of critical cyber security platforms. Are you skilled with Privilege Access management, Application Control and DataLossPrevention solutions? The we need you to help optimise performance and ensure compliance to our cyber security certification requirements. This position requires a deep understanding of More ❯
Johnston, Rhode Island, United States Hybrid / WFH Options
FM
FORTUNE 1000-size companies with engineering-based risk management and property insurance solutions. FM helps clients maintain continuity in their business operations by drawing upon state-of-the-art loss-prevention engineering and research; risk management skills and support services; tailored risk transfer capabilities; and superior financial strength. To do so, we rely on a dynamic, culturally diverse … experience presenting information to and soliciting feedback from small and medium-sized groups. Effective interpersonal abilities and clear communication skills. Analytical and problem-solving skills. Able to gather appropriate data needed to diagnose the cause of a problem or to develop a solution. Ability to translate technical concepts as appropriate to the level of the audience. Ability to work More ❯
complete. Conduct quantitative analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability, Survivability, etc. Capture all interface designs in a common interface control format, and stores interface data in a commonly accessible repository Prepares time-line analysis diagrams illustrating the flow of time-dependent functions Support establishment of a process to formally and proactively control and manage … is required with the provision of SE services for physical security systems and IT solutions. Experience eliciting requirements, conducting research, designing, testing, and implementing hardware and software solutions for data center and virtual infrastructure technologies. Strong engineering experience with the following core platforms and services: VMware ESXi and vSphere. Microsoft Windows Server 2016 and 2019 Deployment and Administration. Microsoft … SCCM and Operating System Deployment (OSD). Experience administering OCSP (e.g. Axway Validation Authority, Microsoft OCSP Responder). Experience troubleshooting and optimizing the McAfee security product suite (Endpoint Security, DLP, HIPS, etc.). Large on-premise storage engineering and administration experience with 3PAR, NetApp, Dell/EMC, Pure Storage, etc. Experience designing and deploying SQL Database Infrastructure such as Microsoft More ❯
complete. Conduct quantitative analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability, Survivability, etc. Capture all interface designs in a common interface control format, and stores interface data in a commonly accessible repository Prepares time-line analysis diagrams illustrating the flow of time-dependent functions Support establishment of a process to formally and proactively control and manage … is required with the provision of SE services for physical security systems and IT solutions. Experience eliciting requirements, conducting research, designing, testing, and implementing hardware and software solutions for data center and virtual infrastructure technologies. Strong engineering experience with the following core platforms and services: VMware ESXi and vSphere. Microsoft Windows Server 2016 and 2019 Deployment and Administration. Microsoft … SCCM and Operating System Deployment (OSD). Experience administering OCSP (e.g. Axway Validation Authority, Microsoft OCSP Responder). Experience troubleshooting and optimizing the McAfee security product suite (Endpoint Security, DLP, HIPS, etc.). Large on-premise storage engineering and administration experience with 3PAR, NetApp, Dell/EMC, Pure Storage, etc. Experience designing and deploying SQL Database Infrastructure such as Microsoft More ❯
complete. Conduct quantitative analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability, Survivability, etc. Capture all interface designs in a common interface control format, and stores interface data in a commonly accessible repository Prepares time-line analysis diagrams illustrating the flow of time-dependent functions Support establishment of a process to formally and proactively control and manage … is required with the provision of SE services for physical security systems and IT solutions. Experience eliciting requirements, conducting research, designing, testing, and implementing hardware and software solutions for data center and virtual infrastructure technologies. Strong engineering experience with the following core platforms and services: VMware ESXi and vSphere. Microsoft Windows Server 2016 and 2019 Deployment and Administration. Microsoft … SCCM and Operating System Deployment (OSD). Experience administering OCSP (e.g. Axway Validation Authority, Microsoft OCSP Responder). Experience troubleshooting and optimizing the McAfee security product suite (Endpoint Security, DLP, HIPS, etc.). Large on-premise storage engineering and administration experience with 3PAR, NetApp, Dell/EMC, Pure Storage, etc. Experience designing and deploying SQL Database Infrastructure such as Microsoft More ❯
Responsibilities include, but are not limited to: Perform system or network designs that encompass multiple Cloud hosting environments, to include those with differing data protection/classification requirements Support ATO accreditation with analyzing security scans, organizational policies, and perform continuous monitoring Provide security planning, assessment, risk analysis, and risk management Recommend cybersecurity-enabled products to implement security measures that …/valid DoD 8570.01-M IAT-II certification Experience using various IA tools in audit collection, audit review, audit management, and end point protection (ACAS, HBSS, McAfee ePO, ENS, DLP) Experience with RMF, ICD 503, NIST SP800-53 or DCID 6/3, or knowledge of current authorization practices, particularly within the DoD is desired. Experience with AWS Government Cloud More ❯