The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity … analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is essential. Responsibilities: Collaborate with IT teams for input … as NIST, etc., implementing and auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience with HIDS and NIDS The More ❯
information security policies, procedures, and best practices. Work with the MSP to implement security-first IT practices. Monitor and respond to security threats, incidents, and vulnerabilities. Improve endpoint protection, data encryption, and backup systems to safeguard sensitive company and customer information. Conduct regular security audits and risk assessments to ensure compliance with regulatory standards. Lead employee training and awareness … Strong understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD/Microsoft Entra) and security tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO 27001, GDPR, or NIST. Experience More ❯
in real life environments: Identity and Access Management Capabilities and Solutions.? Infrastructure Security including Endpoints, Operating Systems, Network Security architectures, technologies and the OSI Model. Knowledge of Application and Data Security Solutions and modern practices of deployment. Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Knowledge and Experience of Modernised Security Operations Centre including Attack Surface … Models, AzureAD, MIM, FIM, and modern authentication protocols (SAML, OIDC). Network Security: Proficient in designing segmentation, securing WLAN, LAN, WAN, SDWAN, SaaS proxies, VPNs, firewalls, IPS, DDoS, WAF, DLP, DNS, NAC, NSPM, and architectures like SASE and Zero Trust. Application Security: Experience with SAST, DAST, RAST, IAST tools, integrating security into SDLC processes, OWASP, API security design, robust threat … modelling, and containerization security. Data Security: Skilled in implementing information protection tools, key and secrets management, datalossprevention, and protective marking and classification capabilities. Cyber Security Operations: Proficient in incident response, vulnerability management, SIEM, SOAR, threat modeling, threat hunting, intelligence, data analytics, and anti-phishing methodologies. Infrastructure and Endpoint Security: Experience with endpoint security More ❯
systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works … closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to … required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze More ❯
Develop and implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, datalossprevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS Control Tower, Azure, and Microsoft O365. More ❯
What We're Looking For 10+ years in a cybersecurity engineering role, ideally in a complex, enterprise-scale environment Deep experience with security tools: Firewalls, SIEM, EDR/XDR, DLP, WAF, PAM, etc. Strong understanding of server/network/system security - Windows (), Linux, Azure, Active Directory, M365 Knowledge of secure architecture, Zero Trust, and cloud security frameworks Professional certifications More ❯
data. The ideal candidate will have a deep understanding of cybersecurity threats, risk management frameworks, regulatory compliance, and modern security technologies. This role also includes responsibilities typical of a Data Protection Officer, ensuring that data privacy and governance meet the high regulatory standards of the financial sector. Responsibilities: Strategic Management and Security Operations Develop, implement, and maintain information … with business objectives. Lead risk assessments and threat modelling exercises for internal systems and third-party services. Manage the deployment and maintenance of security solutions (SIEM, firewalls, endpoint protection, DLP, etc.). Oversee the organization's incident response and business continuity plans, including simulations and real-time responses. Conduct regular security audits and work with internal/external auditors to … secure systems development and operations. Compliance & Risk Management Ensure compliance with regulatory and legal security requirements (e.g., ISO 27001, NIST, HIPAA, GDPR, SOX, etc.). Ensure compliance with applicable data protection laws (e.g., GDPR, CCPA, GLBA). Guide Data Protection Impact Assessments (DPIAs) for high-risk financial data processing activities. Work closely with Legal, Risk, and Compliance More ❯
the team you will help to design, develop, and mature the company's cybersecurity capability, including the selection, implementation, and management of security tools/technologies, focused on detection, prevention, and analysis of security threats. This role offers a great opportunity to help define and shape the security function within a collaborative IT department, ensuring the protection of customer … knowledge of deploying, maintaining, and configuring a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols like TCP, ARP, ICMP, DHCP, DNS, HTTP, SNMP, VPN etc., and accompanying More ❯
SLA standards. Incident Response: Lead and manage IT security incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security policies and More ❯
Job Purpose The Data Security Manager will partner with multiple divisions and technical managers to enhance security aspects of the data security program. Extensive oversight and control of CLS information assets, mitigating the risks of dataloss at CLS in all aspects of day-to-day business. The individual will be accountable for the Data Security Program, setting strategic direction and driving operational excellence while leveraging resources distributed across several functional teams. The Data Security Manager will be responsible for analyzing potential weaknesses and identifying a roadmap to improve the security of information assets across CLS. The candidate will advise Business Owners, developers, and technical teams on options to mitigate risk. The candidate … skills (to both technical and business audiences). Excellent time management and organizational skills. Knowledge of policy frameworks and understanding of policies, procedures, guideline structure. Knowledge of firewalls, IPS, DLP, proxies, SEIM, & endpoint protection software. Qualifications/Certifications B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Security certifications such as CompTIA Security + More ❯
Key Responsibilities: In this role, you will be responsible for overseeing and leading a team of security personnel across multiple domains including Security Operations, Global Security Administration, Physical Security, Data Security Analytics, PKI/Certificate Management, and Network Security Engineering. Your role will encompass a wide range of strategic, managerial, and technical responsibilities, including but not limited to: Technical … through involvement with vendors, conferences, connecting with peers for all the firms various key technologies. Lead, supervise and inspire local team multiple key areas, Global Security Admins, Security Operations, Data Security Scientists and other areas/teams as assigned. Security Responsibility: Conduct in-depth technical vendor security reviews for all vendor solutions integrated into the organization's technology stack … awareness and training programs Ensure that the firm s technology risk management practices are aligned with industry standards and best practices. Participate in rolling out global security initiatives including DLP, Network Segmentation, Secure Server Access Help oversee the development and implementation of the firm's information security program and governance framework Coordinate the response to security incidents and breaches and More ❯
Key Responsibilities: In this role, you will be responsible for overseeing and leading a team of security personnel across multiple domains including Security Operations, Global Security Administration, Physical Security, Data Security Analytics, PKI/Certificate Management, and Network Security Engineering. Your role will encompass a wide range of strategic, managerial, and technical responsibilities, including but not limited to: Technical … through involvement with vendors, conferences, connecting with peers for all the firms’ various key technologies. Lead, supervise and inspire local team multiple key areas, Global Security Admins, Security Operations, Data Security Scientists and other areas/teams as assigned. Security Responsibility: Conduct in-depth technical vendor security reviews for all vendor solutions integrated into the organization's technology stack … awareness and training programs Ensure that the firm’s technology risk management practices are aligned with industry standards and best practices. Participate in rolling out global security initiatives including DLP, Network Segmentation, Secure Server Access Help oversee the development and implementation of the firm's information security program and governance framework Coordinate the response to security incidents and breaches and More ❯
Key Responsibilities: In this role, you will be responsible for overseeing and leading a team of security personnel across multiple domains including Security Operations, Global Security Administration, Physical Security, Data Security Analytics, PKI/Certificate Management, and Network Security Engineering. Your role will encompass a wide range of strategic, managerial, and technical responsibilities, including but not limited to: Technical … through involvement with vendors, conferences, connecting with peers for all the firms’ various key technologies. Lead, supervise and inspire local team multiple key areas, Global Security Admins, Security Operations, Data Security Scientists and other areas/teams as assigned. Security Responsibility: Conduct in-depth technical vendor security reviews for all vendor solutions integrated into the organization's technology stack … awareness and training programs Ensure that the firm’s technology risk management practices are aligned with industry standards and best practices. Participate in rolling out global security initiatives including DLP, Network Segmentation, Secure Server Access Help oversee the development and implementation of the firm's information security program and governance framework Coordinate the response to security incidents and breaches and More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, DataLossPrevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. More ❯
the globe in multiple countries. Global Services is in short, the backbone of BCG. What You'll Do Join Us in BCG Worldwide IT! We are seeking an exceptional data protection expert to play key role in our growing Information Protection team, as an IT Data Protection Security Engineer. You will be part of a growing team, providing … world class Security Engineering, Architecture and Operations, driving and supporting improvements globally to our Information Protection Portfolio. You will be: Engaging collaboratively with application development, data protection, information security, and risk management teams to understand and implement data security solutions. Supporting vendor assessments, including proof of concepts & security technologies research Continuously improving data protection services based on … experience with large scale globally distributed implementations Extensive experience in data-at-rest and data-in-transit, data security techniques and methodologies Experience of using relevant DLP tools such as Symantec DLP, Zscaler CASB, MS Purview & similar Experience in managing DLP IM Management and have good understanding of end-to-end IM processes Experience of working with More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100/+44 204 520 2575 with the subject line: “Application Support Request”. Role: DLP Support Specialist Location: London/Watford Mode of working: Hybrid (3 days) Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do … brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role DLP Analyst – Responsible for monitoring DLP alerts, conducting investigations, and ensuring compliance with security policies. DLP Administrator – Manages DLP policies, updates configurations, and ensures data protection measures are effectively implemented. … Security Operations Support – Collaborates with the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100/+44 204 520 2575 with the subject line: “Application Support Request”. Role: DLP Support Specialist Location: London/Watford Mode of working: Hybrid (3 days) Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do … brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role DLP Analyst – Responsible for monitoring DLP alerts, conducting investigations, and ensuring compliance with security policies. DLP Administrator – Manages DLP policies, updates configurations, and ensures data protection measures are effectively implemented. … Security Operations Support – Collaborates with the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. More ❯
please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100/+44 204 520 2575 with the subject line: “Application Support Request”. Role: DLP Support Specialist Location: London/Watford Mode of working: Hybrid (3 days) Careers at TCS: It means more TCS is a purpose-led transformation company, built on belief. We do … brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership. The Role DLP Analyst – Responsible for monitoring DLP alerts, conducting investigations, and ensuring compliance with security policies. DLP Administrator – Manages DLP policies, updates configurations, and ensures data protection measures are effectively implemented. … Security Operations Support – Collaborates with the cybersecurity team to integrate DLP measures with broader security initiatives. Your responsibilities: Monitor DLP Systems – Oversee and manage DLP alerts to prevent unauthorized data access and leakage. Incident Analysis – Investigate DLP security incidents, provide reports, and recommend corrective actions. Policy Implementation & Maintenance – Assist in deploying and updating DLP policies, configurations, and security controls. More ❯
manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cyber … industry knowledge and expertise. * Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats. * Triage of datalossprevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. * Management of cyber security incidents including remediation & driving to closure. … function. * Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategy. * Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc).to solve problems creatively and effectively. * Communicate complex information. More ❯
requires experience in a similar position within a large, complex, and technologically diverse organization. Proficiency in deploying, maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification More ❯
including incident, change, and problem management. Understanding of cloud security principles (AWS, Google, Azure). • Strong working knowledge of Splunk and the Splunk Query Language. Experience or knowledge of datalossprevention, which would be advantageous. You may be assessed on the key critical skills relevant for success in role, such as risk and controls, change and More ❯
The Depository Trust & Clearing Corporation (DTCC)
creatively while maintaining a high level of flexibility, professionalism, and integrity. Ability to work independently and manage multiple tasks simultaneously. Experience in managing Data Protection Technologies: Endpoint & Web DLP, CASB Network Security: Secure Web Gateways, Secure Access Secure Edge (SASE), Firewalls, IDS/IPS technologies We offer top class training and development for you to be an asset in More ❯
tenant merges. • Proven experience with M365 security and configuration. • Proven experience with core M365 applications and services e.g. OneDrive, Teams, Exchange, Viva, SharePoint. • Proven experience with M365 governance and data protection services including Information Protection and DLP. • Proven experience with Azure AD including on premises Active Directory. • Experience with Intune and EndPoint security and management. • Ideally background in on … Desirable: • M365 business adoption and change management • PowerApps • Unified Communications and meeting services The Person should have 10+ years’ experience in cloud or infrastructure delivery: • Migration of applications and data or experience with business process modernisation\analysis. • Experience leading delivery engagements and managing technical teams. • Excellent interpersonal skills and the ability to influence and manage a range of relationships More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Intec Select
improvement plans Essential Skills and Experience Strong communication and cross-team collaboration abilities Expertise in security operations, architecture, and engineering Deep technical knowledge of vulnerabilities, exploits, IDS/IPS, DLP, and firewalls Experience with cloud and hybrid security (e.g. Microsoft Azure, MTP) Industry certifications (e.g. SSCP, CEH, CySA+) Experience designing secure networks and protecting application infrastructure Hands-on familiarity with More ❯
improvement plans Essential Skills and Experience Strong communication and cross-team collaboration abilities Expertise in security operations, architecture, and engineering Deep technical knowledge of vulnerabilities, exploits, IDS/IPS, DLP, and firewalls Experience with cloud and hybrid security (e.g. Microsoft Azure, MTP) Industry certifications (e.g. SSCP, CEH, CySA+) Experience designing secure networks and protecting application infrastructure Hands-on familiarity with More ❯