development and delivery. Technical degree preferred but not essential, practical experience and problem-solving skills are prioritized over specific degrees. Experience in enterprise-level application deployment. Background in retail lossprevention, security systems, or fraud detection preferred. Key Responsibilities Configure and deploy software tailored to customer needs. Optimise system performance and troubleshoot technical issues. Collaborate with clients to More ❯
enterprise level. As part of a growing security engineering team of around 15 people, your role will include end-to-end responsibility for projects, tooling, and systems covering EDR, DLP, Secure Web Gateway, Email Security, and Secrets Management. The successful candidate will have considerable hands-on experience in security engineering within a medium-to-large regulated environment. Hybrid working is More ❯
piracy, and IP infringement at scale. From digital platforms to physical marketplaces, we help clients safeguard what matters most-everywhere it matters. Overview of the Role: To assist with data analysis and research under the direction and operational control of the department lead. Essential Duties and Responsibilities: To support delivery of the following services: Brand protection Services - including Watchdog … software subscriptions LossPrevention Investigations Online removals using Watchdog Running reports using the Watchdog software Test purchase programmes, covert and pretext capabilities Brand and Market surveys To assist the Investigations Team with investigative support in other fraud and brand protection related tasks, operations and research. To provide the following operational support: To assist in the running of employee … related operations To assist with investigative support in other fraud and brand protection related tasks, operations and research What You'll Bring: Inquisitive Competent at working with and interrogating data Discretion and an understanding of implications relating to confidential and/or sensitive information Why IP House: IP House is redefining how the world combats illicit trade and intellectual More ❯
SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD, firewalls, servers, cloud infrastructure) Manage event collection and forwarding infrastructure Implement … data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incident response playbooks Provide expert guidance on securing applications and infrastructure Security … Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain) Experience with EDR, DLP, Proxy, and SEG tools Desirable Qualifications Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP Experience with SOAR playbooks, YARA rules, STIX, and YAML Participation More ❯
SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD, firewalls, servers, cloud infrastructure) Manage event collection and forwarding infrastructure Implement … data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incident response playbooks Provide expert guidance on securing applications and infrastructure Security … Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain) Experience with EDR, DLP, Proxy, and SEG tools Desirable Qualifications Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP Experience with SOAR playbooks, YARA rules, STIX, and YAML Participation More ❯
concepts, controls, and best practices for Servers (e.g. Windows and Linux). General IT networking concepts, protocols, standards and network security concepts, controls, and best practices. Cryptography fundamentals and data security controls and … best practices. Forensic investigation techniques. Prior experience deploying, configuring, managing, and/or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow More ❯
design of prevent and detect controls within the business. Ensure all incidents are resolved in a timely manner. Provide clear guidance and awareness on operational security controls such as DLP, Phishing, EDR and SEP to ensure the business can achieve its objectives safely and securely. Oversee the response to security alerts from SG CERT and Ayvens central and co-ordinate … and experience of industry standards and best practice e.g. ISO 27000 series, OWASP, NIST cyber security framework. Knowledge of risk management frameworks and methodologies. Good understanding of GDPR, and data protection. Experience of implementing or delivering security awareness and education. Experience of building strong and effective relationships with teams, stakeholders, customers, partners and delivering excellent customer service. Fluent in More ❯
Bedford, Bedfordshire, England, United Kingdom Hybrid / WFH Options
Reed Talent Solutions
Key Responsibilities: In this role you will be responsible for the following; Support the current Senior Cyber Security Engineer and Cyber Team. Demonstrate a passion for cybersecurity and IAM, experience in monitoring security controls and Authentication, Authorization, and Accounting implementation More ❯
our L1 Insider Threat team. Reporting to the Insider Threat - IRM Operations Manager, the L2 Insider Threat- IRM Analyst role is suited to someone who has strong Microsoft Purview DLP and Insider Risk Management (IRM) analyst experience. It is a business facing role and requires working proactively with stakeholders and colleagues to investigate Insider Threat and IRM cases. The Role … across the various egress channels in both on premise and cloud environments. Analyse event/case/alert patterns to properly interpret and prioritise threats with available IRM and DLP tools and other data protection devices. Help Identify trends and drive requirements aimed at improving and enhancing existing IRM detection policies. Work closely with Cyber Defence teams such as … projects and initiatives that enhance Insider Risk and IRM policies and standards. Qualifications The Requirements: It is essential that you have in-depth experience within an L2 IRM/DLP or Insider Threat Analyst role in a global enterprise organisation. Relevant Microsoft Qualifications for Purview IRM, Defender and DLP (like SC400/401, AZ 900). Excellent operational knowledge of More ❯
highest quality products. Here's what you'll be doing: Coordinate the movement of goods within the warehouse to ensure efficient work flow Maintain accurate inventory records to support lossprevention and stock management Communicate effectively with transport and delivery teams to ensure timely dispatches Implement processes for efficient storage and retrieval of warehouse items Assist in developing More ❯
Eastfield, Scarborough, North Yorkshire, England, United Kingdom
Adecco
highest quality products. Here's what you'll be doing: Coordinate the movement of goods within the warehouse to ensure efficient work flow Maintain accurate inventory records to support lossprevention and stock management Communicate effectively with transport and delivery teams to ensure timely dispatches Implement processes for efficient storage and retrieval of warehouse items Assist in developing More ❯
Must have: Proven experience with Bluecoat to FortiProxy migrations Deep expertise in FortiProxy/Web Secure Gateway Strong knowledge of Bluecoat configuration translation Background in web filtering, SSL inspection, DLP Solid understanding of proxy architecture and TCP/IP, HTTP/S protocols Fortinet certifications (e.g., NSE 4+), Bluecoat certs Experience with cloud-based proxy environments Benefits: Extension Salary More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
monitor and undertake activities that mitigate threats to the integrity of the NHS BSAs Information Assets. Assesses the effectiveness of firewalls, Gateways, IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems) to improve network/system resilience3. Ensure that all controls are in place to ensure continued certification to the Information Security Management Standard ISO27001 and continued adherence to … activities, ensuring compliance with Information Security Standards ISO27001 Extensive experience of managing security technologies including; firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP Designing and recommending appropriate controls to enable the achievement of Cyber security and wider business goals. Evaluation of threat intelligence data from multiple sources to inform decision making A More ❯
and manage digital access controls across cloud platforms, internal systems, and third-party tools. • Assist in the detection, investigation, and response to security incidents, including unauthorized access, phishingattempts, and data anomalies. • Collaborate with cybersecurity teams and other third parties to analyse threat intelligence feeds and proactively identifyemerging risks. • Participate in vulnerability assessments and support external/internal penetration testing … records of incidents, access violations, and remediation actions. • Perform risk assessments, policy reviews and development, and continuous improvement of security operations. Cybersecurity Management: • Supervise technological security measures including SIEM, DLP, IDS/IPS, Firewall, WAF, cryptological mechanisms, EDR • Analyse security alerts and conduct technical incident investigations. • Run and monitor vulnerability tests and periodic scans of key assets • Collaborate on managing More ❯
security infrastructure and systems. This pivotal role will drive the transformation from legacy platforms to modern, secure solutions, ensuring compliance with best practices and alignment with our Digital and Data strategy. As the go-to expert across the organisation, youll provide critical support and guidance, enabling continuous improvement and resilience in our digital services. Please note, this is a … in designing cyber security systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under pressure. Excellent communicator, able to engage stakeholders at all levels. Skilled in tailoring technical information for More ❯
security infrastructure and systems. This pivotal role will drive the transformation from legacy platforms to modern, secure solutions, ensuring compliance with best practices and alignment with our Digital and Data strategy. As the go-to expert across the organisation, you'll provide critical support and guidance, enabling continuous improvement and resilience in our digital services. Please note, this is … in designing cyber security systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under pressure. Excellent communicator, able to engage stakeholders at all levels. Skilled in tailoring technical information for More ❯
up on the remediation of vulnerabilities Configure, customize, tune, manage, troubleshoot, and maintain effective and efficient operation of security technologies, such as SIEM, endpoint security, secure web gateway, CASB, DLP, email security, intrusion detection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms Define, document, and follow approved processes for all the responsibilities … To develop and implement security policies, managing SIEM systems, and investigating incidents. General IT networking concepts, protocols, standards and network security concepts, controls, and best practices Cryptography fundamentals and data security controls and best practices Forensic investigation techniques Security standards/best practices and frameworks About us We're a diverse group of visionary innovators who provide trading and More ❯
Firewall, API Gateway security rules and definitions. Adept with Fortinet and Checkpoint Firewall configuration and ability to review. Experience working on data classification, labelling and understanding of M365 DLP controls. Experience of the Cyber Security Tools : Fortinet, Checkpoint, Tenable, Microsoft Defender, Microsoft Purview, SCCM/Endpoint Manager. Working knowledge of Cyber Essentials, UK DPA/GDPR. Knowledge of one More ❯
Through a positive attitude and dedication, we work together to solve some of the industry's most challenging problems. Who We Serve We partner with manufacturers to produce the data needed to deliver complex products like aircraft, jet engines, components, and defence systems. We work with airlines to take control of that data to revise and deliver it … Engineer with astrong background in Networking and Cybersecurity to join our growing team . This position is located in the UK, preferably within close proximity to our London area Data Centres, or our Derby office. Remote and Hybrid working options are offered and immediately available candidates, or candidates with a short notice period, are of particular interest. Due to … Hands-on experience with firewalls, IDS/IPS, and VPN configurations. Experience with virtualization (VMware, Hyper-V, etc.). Familiarity with various security tool sets such as SIEM solutions, DLP, Endpoint Protection. Experience implementing disaster recovery and business continuity plans. Familiarity with compliance and security frameworks (NIST, ISO 27001, etc). Knowledge of zero-trust architecture and secure remote access More ❯
all approach or prescriptive methodology. We work consultatively with our clients to revitalise their operations, reinvent established processes, and implement future-ready solutions that deliver measurable benefit and improve data-driven decision making. The Role We are seeking a versatile Microsoft Cloud & Desktop Leader to manage the design, deployment, and day-to-day operations of Microsoft Azure and Microsoft … platforms. 5. Security, Governance & Compliance Implement cloud and endpoint security policies, access controls, and threat protections. Ensure regulatory compliance through secure cloud configurations and monitoring. Oversee device encryption, MFA, DLP, and Conditional Access policies for endpoint and cloud environments. 6. Team Leadership & Development Lead and mentor teams of Azure engineers, M365 administrators, and desktop support specialists. Manage resourcing, workloads, and More ❯
Data Classification Lead (Varonis MDDR) Rate - £500 per day Ltd Duration - 7 Months Location - London We are currently seeking an experienced Data Classification Lead for a 7-month contract to take full technical ownership of delivering a major data governance and security initiative. This role will focus on the end-to-end implementation of Varonis MDDR in … conjunction with Microsoft Purview, playing a key part in strengthening the organisation's data protection, compliance, and governance frameworks. The position will be based on a hybrid working arrangement with time on site at the head office as required. You will lead the planning, delivery, and execution of the programme in line with a detailed Statement of Work, ensuring … optimisation of the chosen technologies. This will involve working closely with IT, Security, Compliance, and business stakeholders to identify and classify sensitive information, align sensitivity labels with the wider data classification strategy, and configure and fine-tune policies, labels, and rules for optimal data protection. You will oversee the full lifecycle of data discovery, labelling, and access More ❯
London, Peninsula, United Kingdom Hybrid / WFH Options
Ganymede Solutions
Data Classification Lead (Varonis MDDR) Rate - £500 per day Ltd Duration – 7 Months Location – London We are currently seeking an experienced Data Classification Lead for a 7-month contract to take full technical ownership of delivering a major data governance and security initiative. This role will focus on the end-to-end implementation of Varonis MDDR in … conjunction with Microsoft Purview, playing a key part in strengthening the organisation’s data protection, compliance, and governance frameworks. The position will be based on a hybrid working arrangement with time on site at the head office as required. You will lead the planning, delivery, and execution of the programme in line with a detailed Statement of Work, ensuring … optimisation of the chosen technologies. This will involve working closely with IT, Security, Compliance, and business stakeholders to identify and classify sensitive information, align sensitivity labels with the wider data classification strategy, and configure and fine-tune policies, labels, and rules for optimal data protection. You will oversee the full lifecycle of data discovery, labelling, and access More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Addition
business helping to shape the future of secure technology in the insurance sector. This is a pivotal role with real impact where your expertise will help protect critical systems, data, and services across multiple markets. Role Overview: Role: Security Architect. Location: Remote based with 1-2 days per month in Central London Package: £100,000- £130,000 per annum … TOGAF or SABSA. Significant experience in Financial Services or Insurance, including PCI-compliant environments. Expert knowledge of network and cloud security using Azure, Hands-on experience with application security, data protection … and threat modelling. Confident communicator, able to influence across technical and business functions. Track record in risk assessment, vulnerability management and secure architecture delivery. Knowledge of DevSecOps, SIEM, IAM, DLP, and related security tools is a plus. What’s in It for You: Opportunity to make a meaningful impact across a growing international group. Collaborative environment with strong security leadership More ❯
Marston Green, Birmingham, West Midlands, England, United Kingdom
TXP
and SABSA frameworks. Provide expert guidance to clients on secure cloud architecture (Azure, AWS) Lead the design and implementation of SIEM tools (e.g., Azure Sentinel, Splunk). Architect enterprise DLP solutions, including Varonis and Microsoft Purview. Support organisations in defining their security architecture roadmap, ensuring alignment to business and IT strategy Support infrastructure architecture including backup, archive, and XDR implementation. … technology consultancy. Experience working in Pharmaceuticals is desirable. Strong knowledge of security architecture frameworks (TOGAF, SABSA). Experience with SIEM platforms (Azure Sentinel, Splunk). Deep understanding of enterprise DLP systems and data protection strategies. Familiarity with Microsoft security tools including Purview, MCAS, MDI. Strong governance and risk management capabilities. Ability to work collaboratively across technical and non-technical More ❯
and mentor junior staff Essential (Must Have): 2+ years' experience as a Solutions Architect or similar within an MSP Strong technical knowledge of Microsoft 365, including migrations, hybrid identity, DLP, retention policies Hands-on Azure IaaS experience: networking, NSGs, VPNs, load balancers, governance Proven Microsoft Sentinel experience: KQL, dashboards, incident response Solid grasp of Intune, AutoPilot, security and compliance policies … and client requirements Job Information Job Reference: JO-93 Salary: £55000.00 - £58000.00 per annum Salary per: annum Job Duration: Job Start Date: 01/09/2025 Job Industries: Data Job Locations: Greater London Job Types: Permanent Apply for this Job Name Please enter your full name. Email Enter a valid email address. Upload a CV Upload your CV … to accompany your application for this job. Please tick this box to consent to us using your data. How we use your data is outlined in our privacy policy Fields marked with are required. More ❯