accessed and used by end users across the enterprise. The ideal candidate will have deep expertise in identity and access management (IAM), datalossprevention (DLP), secure authentication, and regulatory compliance. This position plays a critical role in ensuring that data protection measures align with business needs while maintaining a frictionless user experience. Key success … across enterprise systems. Design and implement secure authentication and authorization mechanisms using protocols such as OAuth 2.0, OpenID Connect, SAML, and Kerberos. Participate in the deployment and management of DLP, encryption, and secure collaboration tools. Collaborate with IAM, DLP, and application teams to integrate data protection into identity workflows. Define and enforce policies for secure data access, handling … a master's degree and 4 years' experience; a Ph.D. and 1 year of experience; or 18 years' experience in a related field. Experience implementing and managing enterprise-grade DLP and encryption solutions, together with hands-on experience with IAM platforms and authentication protocols Ability to clearly articulate the objective of specific cybersecurity policies and procedures to technical and non More ❯
South East London, London, United Kingdom Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
working at the forefront of digitalisation. What you'll do Design and deliver Microsoft 365 solutions across Entra ID, Teams, Exchange, SharePoint, OneDrive, and associated security tools (Conditional Access, DLP, Data Labelling) Analyse customer requirements, recommend solutions, and guide stakeholders to achieve their business goals Take on medium to complex solution design and implementation, independently or as part of … and emerging technologies What you'll need Substantial hands-on experience with Microsoft 365 technologies and real-world solution delivery Strong understanding of security components such as Conditional Access, DLP, and Data Labelling Relevant qualifications or accreditations in Microsoft 365 or related technologies Proven ability to design technical solutions and contribute to project and bid documentation Strong communication, documentation More ❯
establishing metrics to demonstrate continuous improvement. The ideal candidate will possess expert-level knowledge in SIEM implementation and log ingestion, SOAR, Incident Response, and Threat Intelligence that will be data-driven with strong verbal, written communication, and leadership skills. Cybersecurity Detection Engineering: Define detection engineering strategy, roadmap, and objectives to achieve. Design and implement advanced threat detection techniques using … cloud, identity, network, and email threats. Work with internal IT teams and external MSSPs for creation and operationalization of Detection Engineering use cases for WAF, DDoS Protection, Email systems, DLP, AV, and Endpoint security technologies. Practical experience with Detection & Response tools for network, endpoints, cloud, and identity as well as SOAR platforms. Apply security Threat Intelligence to identify new threat … experience with developing SIEM/SOAR detection and automation use cases. Working experience with industry standard security technologies and services such as Threat Intelligence, Firewalls, SASE, IPS, Endpoint Security, DLP, SIEM/SOAR, and Data Lakes. Expert level knowledge on the attack kill chain and diamond model. 5+ years' experience in an Incident Response or Security Operations role 3+ More ❯