for a seasoned and strategic Head of Security Engineering to shape the next phase of security at G-Research. This is a key leadership role, responsible for protecting sensitive data and maintaining a robust, forward-looking security posture across our technology landscape. Based within the Technology department, the successful candidate will collaborate closely with the CTO, executive leadership and … as CISSP, CISM or GIAC. Exposure to privacy regulations, such as GDPR and CCPA, and financial compliance requirements Experience with insider threat programs, datalossprevention (DLP) and zero-trust security models Behavioural Competencies Strategic mindset with a hands-on approach to execution Strong interpersonal and stakeholder engagement skills High level of discretion and integrity Ability to More ❯
lead the secure device strategy, ensuring strong protection across all device types and operating systems. Engineer and operate scalable solutions for endpoint protection, datalossprevention (DLP), and compliance checking. Build automated controls for device posture, encryption, threat detection, and remediation. Own and optimize integrations with tools such as Microsoft Defender, Purview, Symantec, CrowdStrike, or equivalent. Platform More ❯
significant technical solution design and development, leveraging existing tool suites, and proposing best-of-breed solutions. Must have strong hands-on experience working on Exchange Online Experience implementing M365 DLP, Cloud App Security, Defender, and Conditional Access Tools Experience like Bittitan, Quest, Avepoint. To maintain Exchange Hybrid Co-Existence in a multi-Active Directory Forest/Exchange Org Topology To … maintain Data Sovereignty compliance (GDPR) when Multi-Geo must have to be used Migrations from Lotus Notes & GroupWise, along with InterOrg (Exchange to Exchange) and GSuite/O365 Tenant to Tenant Migrations Migrations from SharePoint on-premises, Gsuite, and other CMS tools to SharePoint Online and OneDrive for Business Must have Architectural understanding of how Third Party Archive & Journaling … Proof-Point, Exchange Online Protection, Mimecast, etc.) SPF, DKIM, and DMARC (along with ARC) Office 365 Advanced Threat Protection, Must have an architectural understanding of Microsoft 365 protections (CAS, DLP, ATP, AIP) DataLossPrevention, RMS/IRM, Azure Information Protection (Classification-Labelling & Sensitive Information Types), Office 365 Message Encryption & Transport Rules Legal/Litigation Holds, Retention More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Softwerx
includes advising on, designing, and implementing end-to-end data governance, compliance, and risk management solutions. Experience across all the Purview capabilities is essential from DSPM for AI, DLP, IP, IRM, Communication compliance and DLM. Experiencing in deployment of Purview for data discovery, classification and compliance is essential. Location Hybrid Role with regular travel across the UK and … visits to the Cambridge Head Office. Key Responsibilities Designing and deploying Microsoft Purview solutions across Microsoft 365 and Azure platforms to meet organisational data governance and compliance objectives. Delivering Microsoft Data Security envisioning workshops. Assessing customer environments to deliver targeted Purview configurations, policies and controls Implementing best practices around communication compliance, insider risk in Purview Integrate and adopt … to align Purview technical capabilities with business policies and requirements. Create and maintain technical project documentation Provide support to customers Essential Experience Delivering Purview workshops Deep current Purview knowledge DataLossPrevention Information Protection DSPM for AI Insider Risk Management Communication Compliance eDiscovery Data Lifecycle Management Information and Data Classification Knowledge around the Microsoft More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
Job description We are recruiting for aSecurity Architecture and Engineering Senior Managerto join the A&O Shearman London office. About the team The firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Information security is not an afterthought; it … is core to all that we do, to protect not only our data but that of our clients, and has the unwavering support of the Board. Led by our new CISO, the in-house Information Security team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber … Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the firms platforms, including M365, legal and risk platforms, legal tech systems, data platforms, AI, infrastructure, and knowledge management. Ensure that platform-specific security standards, patterns, and design principles which suitably support secure business operations and digital transformation have been defined and More ❯
join the A&O Shearman London office. Apply today via the link below or contact for more information. About the team The firm's ability to keep our clients' data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the world's large and prestigious organisations. Information security is not an afterthought … it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering support of the Board. Led by our new CISO, the in-house Information Security team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and … the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the firm's platforms, including M365, legal and risk platforms, legal tech systems, data platforms, AI, infrastructure, and knowledge management. Ensure that platform-specific security standards, patterns, and design principles which suitably support secure business operations and digital transformation have been defined and More ❯
superdrive will help us achieve our vision. As a Senior Security Engineer you'll be supporting the delivery of information security operations, covering but not limited to company policies, datalossprevention, access protection, incident response and investigation, vulnerability mitigation, systems monitoring and related projects. This will help us excel at maintaining secure, reliable and compliant systems … What you'll be doing Our Information Security team is on a mission: protect and serve. We use the latest technologies to detect and remove any threats to our data, while serving the best interests of the business. And by embracing a YES mentality. It's not just in problem-solving where we challenge our team. We also encourage … architecture, engineer and operations. A solid foundation in computer networking fundamentals & security control, Firewalls, routing and the various threats applicable to the various OSI Networking layers. Demonstrable understanding of DLP/IDS/IPS technologies, ability to construct custom signatures and investigate intercepted traffic/logs. Demonstrable understanding of application security (web based) and how to protect business services through More ❯
closely with architects, analysts, designers, and project teams to ensure our solutions are secure, compliant, and resilient. Your work will directly impact the protection of customer, employee, and company data, helping to ensure that security is integrated at every stage of our technology and business initiatives. What will you be doing? Provide end-to-end security engagement across a … of business and technical projects Attend and contribute to project meetings, offering expert information security guidance Review and consult on technical and design documentation (e.g. design documents, network/data flow diagrams) Collaborate with Security Architects and delivery teams to implement secure solutions Ensure security policies and standards are applied through a hands-on, consultative approach Translate technical risk … security frameworks, regulations, and best practices (e.g., ISO 27001, DPA, GDPR) Familiarity with security tools such as vulnerability scanners, SIEM, DDoS protection, remote access, authentication/authorisation technologies, and datalossprevention Understanding of OWASP top vulnerabilities and methodologies Technical knowledge of cloud, networking, virtualisation, mobile technologies, and more Experience of working with external suppliers, including reviewing More ❯
with overall cloud strategy Required Skills & Experience: Proven expertise in Microsoft 365 security technologies (Defender suite, Purview, Entra ID, Intune) Strong knowledge of Zero Trust principles, conditional access and datalossprevention Experience working in regulated enterprise environments Hands-on experience with Sentinel, Log Analytics and KQL is a plus Relevant certifications (SC-200, MS-500, AZ More ❯
in Microsoft 365 security technologies (Defender suite, Purview, Entra ID, Intune) Azure Policy and Azure Resource Manager experience is essential Strong knowledge of Zero Trust principles, conditional access and datalossprevention Experience working in regulated enterprise environments Hands-on experience with Sentinel, Log Analytics and KQL is a plus Relevant certifications (SC-200, MS-500, AZ More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
Azure, AWS) Email systems and complex email routing environments Application deployment (not necessarily development) System deployments, upgrades or migrations Security system rollout, as an example to; manage privileged access, datalossprevention, MFA Networking - WAN, LAN, WiFi, Firewalls Release Management experience beneficial Ability to work within the varied International Compliance and Regulatory requirements. Ability to work within More ❯
Exchange online and Azure) Email migration processes and complex email routing environments Application deployment System deployments, upgrades or migrations Security system rollout, as an example to; manage privileged access, datalossprevention, MFA Release Management experience beneficial Ability to work within the varied International Compliance and Regulatory requirements. Ability to work within a hybrid On-premise and More ❯
your responsibilities will include: Secure AI Engineering & Design Collaboration: - Partner with engineering teams to implement security-by-design and privacy-by-design principles. - Define and enforce technical controls for data access, model transparency, human oversight, and audit logging. AI Risk & Compliance Architecture: - Design compliance frameworks aligned with the EU AI Act and ISO/IEC 42001. - Conduct technical risk … assessments and collaborate on developing model cards and risk registers. Microsoft Purview Integration: - Leverage Microsoft Purview for data classification, lossprevention policies, and compliance reporting. AI System Onboarding & Governance Support: - Collaborate with the AI Governance Lead to assess and onboard new AI systems. - Evaluate solutions for compliance with internal policies and external regulations. Security & DevSecOps Integration: - Integrate … CD pipelines and MLOps workflows. - Monitor AI systems using Azure Monitor and Application Insights. Policy Implementation & Regulatory Alignment: - Translate regulatory requirements into actionable engineering guidelines. - Ensure compliance with transparency, data minimization, and incident response obligations. Cross-Functional Collaboration & Governance: - Partner with legal, compliance, and architecture teams to align AI development with governance frameworks. - Educate stakeholders on emerging AI risks More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
your responsibilities will include: Secure AI Engineering & Design Collaboration: - Partner with engineering teams to implement security-by-design and privacy-by-design principles. - Define and enforce technical controls for data access, model transparency, human oversight, and audit logging. AI Risk & Compliance Architecture: - Design compliance frameworks aligned with the EU AI Act and ISO/IEC 42001. - Conduct technical risk … assessments and collaborate on developing model cards and risk registers. Microsoft Purview Integration: - Leverage Microsoft Purview for data classification, lossprevention policies, and compliance reporting. AI System Onboarding & Governance Support: - Collaborate with the AI Governance Lead to assess and onboard new AI systems. - Evaluate solutions for compliance with internal policies and external regulations. Security & DevSecOps Integration: - Integrate … CD pipelines and MLOps workflows. - Monitor AI systems using Azure Monitor and Application Insights. Policy Implementation & Regulatory Alignment: - Translate regulatory requirements into actionable engineering guidelines. - Ensure compliance with transparency, data minimization, and incident response obligations. Cross-Functional Collaboration & Governance: - Partner with legal, compliance, and architecture teams to align AI development with governance frameworks. - Educate stakeholders on emerging AI risks More ❯
technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents Experience in managing shift roster Experience in managing day to day SOC operations activity Experience in ISO 27001, SOC 1 and More ❯
technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Further info: Competitive Basic/day rate London To apply: Please either register your CV and complete the information fields requested or send your CV to More ❯
Comms and Creative, Digital Marketing, CRM and Loyalty, Nectar 360, Insights, and Corporate Responsibility and Sustainability. More people shopping with us each week means more interactions. And thanks to data insight, we understand customers in a way that almost nobody else does. We work alongside incredible brand partners and the best agencies around. So if you have a passion … UK's largest loyalty scheme and an ever-evolving set of digital platforms. All this equals over 1.2 billion transactions a year, presenting a volume, depth, and complexity of data that few can match. We don't think we're exaggerating when we say we have the most exciting data set in the country. We've got data … across the UK. In the Sainsbury's Business Protection Analytics team, we're embarking on a major transformation, and you'll stretch the imagination of what the power of data and insights can bring to how we do things. You'll unlock value and use your intense curiosity to find creative ways to land impactful solutions that directly support More ❯
Company Description Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people … Investigator will lead and support efforts to enhance and expand Experian's global Insider Risk Management Program. This role is responsible for conducting thorough and objective security investigations involving data theft, espionage, misuse, sabotage, unintentional incidents, and workplace violence. The investigator must be detail-oriented, multi-task effectively, analyze and evaluate disparate data sets, and establish and maintain … a related field; advanced degree preferred. Experience in insider risk, counterintelligence, cybersecurity, or a related discipline. Hands-on experience with insider threat detection tools such as SIEM, UEBA, UAM, DLP, and other monitoring technologies. Strong understanding of insider risk frameworks, regulatory and privacy requirements, and relevant laws. Familiarity with SOC or Fusion Centre operations, including threat monitoring, intrusion detection, incident More ❯
management and traffic control across regions. Managing M365 administration, including Microsoft 365 Defender, Defender for Endpoint, Defender for Identity, and Security Score. Handling M365 license management, Cloud App Security, DLP, and portals such as Security & Compliance, Exchange Online, SharePoint Online, and Intune. Building and installing servers using Azure Resource Manager templates or Azure Portal. Utilizing cloud technologies and third-party More ❯
For Proven experience in a hands-on Information Security Consultant or similar role. Strong technical knowledge of Microsoft 365 Security Suite (including Defender for Office 365, Purview, Secure Score, DLP and compliance tools) and Azure Security Stack (including Microsoft Defender for Cloud, Microsoft Sentinel, Azure AD etc). Solid understanding of security frameworks (e.g., ISO 27001, Cyber Essentials, NIST, GDPR More ❯
Employment Type: Permanent
Salary: £50000 - £60000/annum Depending on Experience
For Proven experience in a hands-on Information Security Consultant or similar role. Strong technical knowledge of Microsoft 365 Security Suite (including Defender for Office 365, Purview, Secure Score, DLP and compliance tools) and Azure Security Stack (including Microsoft Defender for Cloud, Microsoft Sentinel, Azure AD etc). Solid understanding of security frameworks (e.g., ISO 27001, Cyber Essentials, NIST, GDPR More ❯
and implement secure AI services from lab to production, ensuring scalability and compliance Develop robust APIs for LLMs, RAG pipelines, agentic workflows and document intelligence systems Embed cybersecurity and data privacy controls across all AI workflows (e.g., encryption, anonymisation, access logging) Collaborate with the CISO function on threat modeling, security reviews, and AI-specific control design. Integrate with enterprise … Secrets scanning, encryption (at rest/in-transit), token management Identity integration (Google Identity, Azure Entra ID) Data Security & Governance RAG pipelines with data classification, masking, and DLP GDPR and data residency compliance MLOps & DevSecOps GitHub Actions, CI/CD security testing, model drift detection, audit logging Lab Environment Tooling Infrastructure-as-Code (IaC): Terraform, Pulumi Containerization … Orchestration: Docker, Kubernetes (GKE/AKS) Networking & Isolation: VPCs, private endpoints, firewall rules, network policies Data Sandboxing: Synthetic datasets, masking, DLP tooling Monitoring & Observability: Prometheus, Grafana, Cloud Logging More ❯
and implement secure AI services from lab to production, ensuring scalability and compliance Develop robust APIs for LLMs, RAG pipelines, agentic workflows and document intelligence systems Embed cybersecurity and data privacy controls across all AI workflows (e.g., encryption, anonymisation, access logging) Collaborate with the CISO function on threat modeling, security reviews, and AI-specific control design. Integrate with enterprise … Secrets scanning, encryption (at rest/in-transit), token management Identity integration (Google Identity, Azure Entra ID) Data Security & Governance RAG pipelines with data classification, masking, and DLP GDPR and data residency compliance MLOps & DevSecOps GitHub Actions, CI/CD security testing, model drift detection, audit logging Lab Environment Tooling Infrastructure-as-Code (IaC): Terraform, Pulumi Containerization … Orchestration: Docker, Kubernetes (GKE/AKS) Networking & Isolation: VPCs, private endpoints, firewall rules, network policies Data Sandboxing: Synthetic datasets, masking, DLP tooling Monitoring & Observability: Prometheus, Grafana, Cloud Logging More ❯
implementation of security architectural standards, patterns, and guidelines for cloud-native and hybrid-cloud deployments. Solution Design & Assurance: Provide expert security architecture guidance for critical enterprise applications, infrastructure, and data platforms, with a strong focus on secure-by-design principles. Conduct comprehensive security architecture reviews of high-level and low-level designs, identifying risks, proposing effective controls, and ensuring … Management: Lead threat modeling, risk assessments, and security posture management across cloud environments. Ensure architectural designs meet stringent regulatory compliance requirements relevant to the financial industry in Europe (e.g., data residency, privacy, operational resilience). Develop and implement security controls that align with frameworks like NIST CSF, ISO 27001, PCI DSS, and CSA CCM. DevSecOps & Automation: Champion the integration … IAM, Azure AD, GCP IAM). Network Security (VPCs, firewalls, WAFs, micro-segmentation, private connectivity). Data Security (encryption at rest/in transit, KMS, data classification, DLP). Application Security (secure coding, API security, SAST/DAST, WAF integration). Container Security (Kubernetes, Docker, service mesh). Security Information and Event Management (SIEM) and logging strategies. Zero More ❯