of pre- and post- sales security consulting activities across one or more of the following areas: Risk assessment and risk management Operational Technology (OT) or Industrial Control Systems (ICS) Data management and storage (for instance, DataLossPrevention or Rights Management) Audit event recording and analysis Cloud or network security, securing mobile data and devices More ❯
are looking to recruit another member of staff for the Technical team. The role will involve supporting the IT infrastructure of all our customer base including server, storage, network, data and applications in addition to project work to improve and enhance the customers infrastructure environment. Key Responsibilities: * Provide 3rd Line support to customers via telephone, email and remote control … VOIP, Leased Lines) * Dell/HP Server Hardware * Storage infrastructures SAN, NAS, DAS * Backup and DR technologies (experience of Veeam and Datto) * SharePoint management and support * IT Security including datalossprevention, encryption, EDR, MDR, Unified Threat Management, 2FA Education/Qualification: * Minimum of 5 GCSEs * 2 A Level passes or equivalent * Post-Secondary School education relating More ❯
Oxford, Oxfordshire, England, United Kingdom Hybrid/Remote Options
Nextech
VOIP, Leased Lines)* Dell/HP Server Hardware* Storage infrastructures SAN, NAS, DAS* Backup and DR technologies (experience of Veeam and Datto)* SharePoint management and support* IT Security including datalossprevention, encryption, EDR, MDR, Unified Threat Management, 2FA Education/Qualification: * Minimum of 5 GCSEs* 2 A Level passes or equivalent* Post-Secondary School education relating More ❯
Job summary The NHS Counter Fraud Authority (NHSCFA) is the national body responsible for all matters relating to the prevention, detection and investigation of economic crime across the NHS. Further information about our work and annual plan for delivering this is available on our website. An exciting opportunity has arisen to join the NHSCFA Technology team as an Information … and remote. Demonstrate detailed knowledge of: oIT system monitoring (SIEM). oSecurity Incident Management. Demonstrate detailed knowledge of Information Security in several of the following areas: oIntrusion detection and prevention systems. oVulnerability Management. oNetwork technology and operations. oWindows 10 and Windows Server. oSUSE Linux. oMicrosoft365. oInformation Security Management Systems ISO27001. oRisk Management Process. oIT system auditing Experience with IT … Process. oPublic Services Network (PSN) and NHS N3. oDatabase Security. oMicrosoft Sentinel Experience with software security architecture and software security testing. Specialist Knowledge Essential Knowledge of IT security and Data protection issues. IT Service Management best practice, including ITIL and ISO20000 Demonstrate knowledge in some of the following areas: oEncryption Systems. oSecurity Products (Authentication, DataLossPreventionMore ❯
cloud deployments, ensuring security, compliance, performance, and maintainability. Lead the design and architecture of complex cloud solutions, considering factors such as security controls, compliance requirements (e.g., FedRAMP, NIST, ITAR), data sovereignty, and resilience in highly sensitive environments. Oversee the creation of detailed architectural diagrams, documentation, and specifications for cloud infrastructure and applications. Provide architectural guidance and oversight throughout the … compliance standards relevant to defenceand national security (e.g., NCSC best practices, NIST 800-53, DISA STIGs, SOC 2, ISO 27001). Secure cloud architecture patterns (e.zero trust, micro-segmentation, datalossprevention, encryption at rest and in transit). Infrastructure-as-Code (IaC) and automation for secure cloud deployments. Containerisationand orchestration in secure environments (e.g., Kubernetes, OpenShift More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Soldo
desktops, videoconferencing equipment, and Microsoft Office 365 desktop and mobile applications. You will perform administrative tasks in Microsoft 365 management tools including Azure Active Directory, Azure toolsets (Intune, Autopilot, DataLossPrevention, Flows etc) and assist in delivering differentiating solutions to the Soldo community. Additionally you will administer the Soldo Microsoft 365 tenant ensuring seamless service delivery More ❯
desktops, videoconferencing equipment, and Microsoft Office 365 desktop and mobile applications. You will perform administrative tasks in Microsoft 365 management tools including Azure Active Directory, Azure toolsets (Intune, Autopilot, DataLossPrevention, Flows etc) and assist in delivering differentiating solutions to the Soldo community. Additionally you will administer the Soldo Microsoft 365 tenant ensuring seamless service delivery More ❯
tasks. Collaboration: Working closely with internal IT teams to integrate security measures and promote IT security awareness among senior management. Operational Oversight: Overseeing penetration testing, vulnerability scans, incident responses, datalossprevention, phishing tests, and system audits. Vendor Management: Conducting security evaluations of third party vendors and service providers, advising on application security initiatives. Let's talk More ❯
birmingham, midlands, united kingdom Hybrid/Remote Options
Axiom Software Solutions Limited
of Power Platform environments. o Monitor usage and compliance, ensuring governance standards are met across all Power Platform solutions. o Assist business users with best practices for app development, data modeling, and workflow automation in Power Apps and Power Automate. o Troubleshoot and resolve issues within Power Platform services, ensuring minimal disruption to business operations. • Microsoft 365 Administration: o … Apply patches and updates for Microsoft 365, ensuring systems remain secure and up-to-date. o Configure and enforce security and compliance policies across the MS 365 suite (e.g., datalossprevention, retention policies). o Perform user and license management within the Microsoft 365 environment, ensuring smooth provisioning and deprovisioning of accounts and permissions. o Ensure More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Lorien
Azure, AWS) Email systems and complex email routing environments Application deployment (not necessarily development) System deployments, upgrades or migrations Security system rollout, as an example to; manage privileged access, datalossprevention, MFA Networking - WAN, LAN, WiFi, Firewalls Release Management experience beneficial Ability to work within the varied International Compliance and Regulatory requirements. Ability to work within More ❯
Exchange online and Azure) Email migration processes and complex email routing environments Application deployment System deployments, upgrades or migrations Security system rollout, as an example to; manage privileged access, datalossprevention, MFA Release Management experience beneficial Ability to work within the varied International Compliance and Regulatory requirements. Ability to work within a hybrid On-premise and More ❯
connect securely and directly to all applications from wherever they work. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, RBI, CASB and datalossprevention to all connections via the cloud, instantaneously and at scale. This eliminates the need for traditional network security appliances, such as VPNs, firewalls and web More ❯
connect securely and directly to all applications from wherever they work. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, RBI, CASB and datalossprevention to all connections via the cloud, instantaneously and at scale. This eliminates the need for traditional network security appliances, such as VPNs, firewalls and web More ❯
In this role you will use your Information Security Engineer/Analyst expertise both supporting and enhancing this nationwide company’s cybersecurity posture through the securing of enterprise applications, data and infrastructure and by identifying, assessing, and mitigating security risks. This is a hands-on, predominantly office-based role requiring experience in application and data security, vulnerability assessments … including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP, HTTP, DNS, SSH • Familiarity with network segmentation • Experience with endpoint protection software EDR, Anti-Virus, DLP and securing mobile, tablet, laptop, desktop devices. • Familiar with Zero Trust security models • Proficient in using SIEM tools • Experience with log analysis and incident detection. • Familiarity with securing cloud-native … applications, containers and microservices. • Incident detection, containment and mitigation through post-incident investigations and root cause analysis. • Data encryption and DataLoss Prevention. • Identity Access Management deployment Azure AD, MFA, SSO, RBAC • Security auditing and monitoring. • Experience in deploying security solutions across business projects. • Excellent analytical and problem-solving abilities. • Strong communication skills and stakeholder management skills. More ❯
South East London, London, United Kingdom Hybrid/Remote Options
COMPUTACENTER (UK) LIMITED
working at the forefront of digitalisation. What you'll do Design and deliver Microsoft 365 solutions across Entra ID, Teams, Exchange, SharePoint, OneDrive, and associated security tools (Conditional Access, DLP, Data Labelling) Analyse customer requirements, recommend solutions, and guide stakeholders to achieve their business goals Take on medium to complex solution design and implementation, independently or as part of … and emerging technologies What you'll need Substantial hands-on experience with Microsoft 365 technologies and real-world solution delivery Strong understanding of security components such as Conditional Access, DLP, and Data Labelling Relevant qualifications or accreditations in Microsoft 365 or related technologies Proven ability to design technical solutions and contribute to project and bid documentation Strong communication, documentation More ❯
technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents Experience in managing shift roster Experience in managing day to day SOC operations activity Experience in ISO 27001, SOC 1 and More ❯
and prioritizing multiple project work streams in response to rapidly developing and changing portfolios. Broad knowledge of computer, networking and IT security systems including operating systems, databases, firewalls, SIEM, DLP etc. Good presentation, documentation and reporting skillsPreferred: Experience in project management Experience in providing assurance for cybersecurity technologies, policies, standards and procedures Ability to maintain a working knowledge of cybersecurity More ❯
and prioritising features, epics, and user stories aligned with strategy and roadmaps. Develop and review security architectures and toolsets across cloud, infrastructure, and application domains (e.g. SIEM, IAM, PAM, DLP, endpoint protection). Provide security assurance and governance across projects, ensuring alignment with frameworks such as ISO 27001, NIST, GDPR, and PCI DSS. Collaborate with enterprise, technology, and business stakeholders More ❯
attacks, through timely detection, investigation and remediation of potential threats. Role summary The Cyber Security Incident Response Manager plays a pivotal role in identifying, investigating, and managing cyber and data handling incidents within KPMG’s Global Information Security Services (ISS) function. ISS delivers and oversees critical cybersecurity capabilities—including Security Monitoring & Response (SMR), Vulnerability Assessment & Secure Development (VASD), and … security posture. Key Accountabilities Incident Detection & Response Triage alerts reported by GSOC, Global functions and KPMGs network of member firms, including clients, supply chain and from Security tooling like DLP, CASB, XDR and SIEM. Contribute to the investigation and response to cyber and data handling incidents, including misdirected emails, unauthorized data access, and policy violations. Support containment, eradication … functionally to mitigate risks and enhance our data security posture. Technical Expertise in Cybersecurity & Incident Response Experience with email security, cloud platforms, and endpoint protection. Strong understanding of DLP, CASB, SIEM, XDR and other security monitoring tools. Proven ability to manage and/or support response to complex security incidents and data breaches. Strong troubleshooting and problem-solving More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
Architect secure and scalable workplace solutions integrating cloud services (Azure, AWS). Implement endpoint management, patching, and device lifecycle strategies. 3. Security & Compliance Configure and manage security features like DLP, Safe Links, and Defender for Office 365. Enforce Zero Trust principles and privileged access management. 4. Administer email protection systems (e.g., Proofpoint) and ensure compliance with DKIM, SPF, DMARC. 5. More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerability management * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify issues, suggest improvements and work collaboratively across teams * A genuine passion for cyber security * Certifications such as CISSP, SC More ❯