Office 365, Teams, SharePoint, and Active Directory, including SSO and access controls. Maintain and monitor IT security tools including anti-virus, patch management, and datalossprevention solutions, working in collaboration with information security teams. Configure and maintain network infrastructure including Wi-Fi access points, VPNs, and … disability, sexual orientation, gender reassignment, religion or belief, marital/civil partnership status, or pregnancy and maternity. At GB Bank, we value privacy and data protection rights. We have longstanding data protection culture and promote robust ethical standards in data management. Please read our Privacy Notice in More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JobHeron
Security Engineer: Develop and implement comprehensive security strategies, policies, and procedures. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, datalossprevention and encryption. Design and manage security in the cloud, including AWS Control Tower, Azure, and More ❯
field parsers, models and automated playbooks, and integrate new log sources where appropriate. Threat Intelligence & Threat Hunting - provide, develop and integrate external threat intelligence data into the team's detection capabilities; perform proactive threat hunts based on working hypotheses, and implement subsequent SIEM alerts where required. Purple Team & Scenario … capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat - maintain and develop the DataLossPrevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures where required. … the role, benefits/downsides, and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerability scanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
Develop Use Cases - Develop use case and facilitation, threat modelling and translation of operational requirements into SOC SIEM tool. Focus on insider threat and DataLossPrevention use case to demonstrate the process used by SOC analysts. Cyber Security Incident Management Plan (SIMP) - Develop the Cyber Incident … range of different stakeholders. Network and application security and architecture, incident response, forensic investigation, and business continuity management. Knowledge of various Cyber Security Frameworks, Data Protection, and bulk data controls. Hands-on experience with security tooling such as SIEM and EDR solutions. Technical ability to operate them from More ❯
rail, and defense organizations with the most comprehensive product portfolio to elevate operational excellence, and transform safety management and training, with closer integration of data across these domains. Comply365 ensures our customers' teams and assets are always geared for peak operational performance and unlocks unparalleled financial and operational gains … As a person, you'll be proactive rather than reactive, able to build cross functional relationships and be able to articulate value and represent data in a way that can be consumed at all levels. Key Duties and Responsibilities Conducting security assessments and prioritising findings for remediation. Designing and … business. Logging and Auditing Ensuring standards are updated and clearly understood across the business. Ensure collected data is useful and actionable. Office 365, DLP and Endpoint Security Policy changes to secure devices are in place and suitable. Security updates are applied to protect the business. DatalossMore ❯
London, England, United Kingdom Hybrid / WFH Options
Client Server
have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymising technology, datalossprevention, Endpoint Detection and Response (EDR) You have experience of More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Client Server
have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymising technology, datalossprevention, Endpoint Detection and Response (EDR) You have experience of More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Client Server
have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymising technology, datalossprevention, Endpoint Detection and Response (EDR) You have experience of More ❯
cyber adversaries targeting the financial sector, including eBanking Trojans, POS/ATM malware, mobile malware, webinjects, and phishing kits. Experience with fraud detection and prevention systems. Strong stakeholder management skills. Additional valued skills include: Knowledge of social engineering tactics used by cybercriminals. Proficiency with Microsoft PowerPoint, Confluence, JIRA, and … cyber threats and attack techniques, collaborating with industry conferences and networks for knowledge sharing. Analyze security logs and alerts to identify potential threats. Triage datalossprevention alerts to prevent sensitive data exfiltration. Manage cyber security incidents, including remediation and closure. Assistant Vice President Expectations Provide … mitigate risks and support governance. Manage risk and strengthen controls related to your work. Collaborate across teams to align with business strategies. Conduct complex data analysis from multiple sources to solve problems creatively. Communicate complex or sensitive information effectively. Influence stakeholders to achieve desired outcomes. All colleagues are expected More ❯
industry-standard SIEM tools for security monitoring and analysis. Familiarity with security technologies and an understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of Threat Intelligence , Digital Forensics , and DataLossPrevention . Relevant certifications such as CISSP , CEH , or Splunk certifications More ❯
and organisation resilience to improve cyber defences and attack preparedness. Manage and maintain the suite of Cyber Security tools and platforms to enable effective prevention and detection of cyber threats. Drive security orchestration, automation, and response (SOAR) solutions for systems and operational playbooks to enable efficient discovery of security … IEC 27001/27002, GDPR. Working knowledge of security technologies including but not limited to SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics. Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (Mitre ATT&CK). Practical experience of incident … and Response (SOAR), running red-team exercises and tabletop crisis war games. Working knowledge of SIEM and SOAR solutions, Identity and Access Management and DataLossPrevention tools and technologies preferably including FortiSIEM, Q-Radar, Sentinel, Darktrace, Microsoft Defender. Log correlation and analysis, including chain of custody More ❯
to: Security engineering, designing IT and security architecture, implementing IAM/PAM technologies, building robust backup and recovery capabilities, delivering vulnerability management solutions, implementing datalossprevention controls. Experience in delivering cyber security risk assessments against industry standards (NIST CSF, 800-53 and ISO27001) within an established … non-technical terms to senior executives. You might have some of these Strong understanding of operational technology cyber security best practices. An understanding of data privacy requirements and cyber security regulations in the EU and wider European region. A deep understanding of governance, standards, and compliance as they pertain More ❯
Job Purpose The Data Security Manager will partner with multiple divisions and technical managers to enhance security aspects of the data security program. Extensive oversight and control of CLS information assets, mitigating the risks of dataloss at CLS in all aspects of day-to-day … business. The individual will be accountable for the Data Security Program, setting strategic direction and driving operational excellence while leveraging resources distributed across several functional teams. The Data Security Manager will be responsible for analyzing potential weaknesses and identifying a roadmap to improve the security of information assets … business audiences). Excellent time management and organizational skills. Knowledge of policy frameworks and understanding of policies, procedures, guideline structure. Knowledge of firewalls, IPS, DLP, proxies, SEIM, & endpoint protection software. Qualifications/Certifications B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Security certifications More ❯
Computacenters rapidly expanding Consultancy Practice as a Microsoft 365 Purview Consultant, and become part of a high-performing, forward-thinking team thats delivering transformative data protection and compliance solutions across industries. You'll collaborate with experts in an environment that values innovation, knowledge sharing, and continuous development. With exposure … advisor, providing technical insight and leadership while working on both standalone and collaborative projects Delivering end-to-end solutions across Microsoft Purview technologies, including DataLossPrevention, Information Protection, eDiscovery, Information Barriers, Insider Risk Management, and Data Lifecycle Management Supporting customer engagements by analysing requirements, designing More ❯
rapidly expanding Consultancy Practice as a Microsoft 365 Purview Consultant, and become part of a high-performing, forward-thinking team that's delivering transformative data protection and compliance solutions across industries. You'll collaborate with experts in an environment that values innovation, knowledge sharing, and continuous development. With exposure … advisor, providing technical insight and leadership while working on both standalone and collaborative projects Delivering end-to-end solutions across Microsoft Purview technologies, including DataLossPrevention, Information Protection, eDiscovery, Information Barriers, Insider Risk Management, and Data Lifecycle Management Supporting customer engagements by analysing requirements, designing More ❯
rapidly expanding Consultancy Practice as a Microsoft 365 Purview Consultant, and become part of a high-performing, forward-thinking team that's delivering transformative data protection and compliance solutions across industries. You'll collaborate with experts in an environment that values innovation, knowledge sharing, and continuous development. With exposure … advisor, providing technical insight and leadership while working on both standalone and collaborative projects Delivering end-to-end solutions across Microsoft Purview technologies, including DataLossPrevention, Information Protection, eDiscovery, Information Barriers, Insider Risk Management, and Data Lifecycle Management Supporting customer engagements by analysing requirements, designing More ❯
with developing and maintaining software for cloud platforms. Infrastructure as Code (IaC): Proficiency with IaC tools and DevOps practices. Security and compliance: Knowledge of datalossprevention, cybersecurity, privacy, and compliance frameworks like SOC 2 and ISO 27001. Containerization and orchestration: Expertise in containerization technologies (e.g., Docker More ❯
Azure/Entra platform, and PowerShell automation Working knowledge of Nintex Forms and Workflow solutions Desired skills: Dynamics (Dataverse), Purview information protection and datalossprevention, and Power BI implementation and dashboard creation To be considered, please ensure you complete your application on the Computappoint website. Services More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Computappoint
Azure/Entra platform, and PowerShell automation Working knowledge of Nintex Forms and Workflow solutions Desired skills: Dynamics (Dataverse), Purview information protection and datalossprevention, and Power BI implementation and dashboard creation To be considered, please ensure you complete your application on the Computappoint website. Services More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Axiom Software Solutions Limited
environments. Monitor usage and compliance, ensuring governance standards are met across all Power Platform solutions. Assist business users with best practices for app development, data modeling, and workflow automation in Power Apps and Power Automate. Troubleshoot and resolve issues within Power Platform services, ensuring minimal disruption to business operations. … for Microsoft 365, ensuring systems remain secure and up-to-date. Configure and enforce security and compliance policies across the MS 365 suite (e.g., datalossprevention, retention policies). Perform user and license management within the Microsoft 365 environment, ensuring smooth provisioning and deprovisioning of accounts More ❯
Worcestershire, West Midlands, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
business change elements excellent stakeholder management abilities at all levels of business user and management of third party resource Cyber Security, Business Continuity Management, DataLossPrevention are all highly advantageous but not essential. Hybrid role with 2/3 days a week on site. 6 month More ❯
in Security Operations, Risk Management, IAM, and Compliance. Hands-on experience with security tools such as SIEM, EDR/XDR, Firewalls, IDS/IPS, DLP, and IAM solutions. Working knowledge of security frameworks: ISO 27001, NIST, CIS, SOC 2, GDPR, GXP, etc. Experience in cloud security Proficient in threat modeling More ❯
Security Architect (Data Security) To £100,000 + Exceptional Benefits + Remote I'm looking for a Principal Solutions Architect to join a global leader in information governance, data protection, and compliance, powered by Microsoft 365 and a MISA finalist 2023 + 2024. They work with some of … CTO who quite literally wrote the book on Purview itself! . Key Responsibilities: Design, Implement and manage Microsoft Purview solutions across data classification, DLP policies, insider risk management, and compliance workflows. Develop and enforce robust records management systems to align with organisational needs and regulatory requirements. Collaborate with CISO … and forward-thinking. Qualifications: Proven SME level knowledge of the Microsoft Purview product suite (Information Protection, Insider Risk Management, eDiscovery, Data lifecycle Management, DLP, Defender for Cloud Apps etc) Solid knowledge of data security architecture and regulatory requirements. Exceptional troubleshooting skills, with the ability to identify and mitigate More ❯
Madrid, Barcelona, Luxembourg, Milan, Munich, Leipzig, The Risk Manager, Innovation supports Global Security Risk Management & Resilience by leading initiatives that transform complex risk-related data into actionable insights across Amazon's worldwide operations. This role blends traditional risk management expertise with advanced analytics, utilizing technology and automation to significantly … enhance risk identification, assessment, and response capabilities. Key responsibilities include designing robust data integration systems, implementing predictive risk models, and driving technological innovation to ensure risk insights are timely, accurate, and strategically actionable Key job responsibilities • Lead strategic innovation projects, including the implementation of global data centralization and … automation initiatives, to enhance GRMR's risk, resilience, and business continuity capabilities. • Collaborate on optimizing risk data pipelines ensuring accurate global and regional risk insights. • Integrate advanced analytics, predictive modeling, AI, and machine learning to enhance risk assessment accuracy, streamline processes, and support real-time monitoring. • Collaborate closely with More ❯