technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents Experience in managing shift roster Experience in managing day to day SOC operations activity Experience in ISO 27001, SOC 1 and More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
Architect secure and scalable workplace solutions integrating cloud services (Azure, AWS). Implement endpoint management, patching, and device lifecycle strategies. 3. Security & Compliance Configure and manage security features like DLP, Safe Links, and Defender for Office 365. Enforce Zero Trust principles and privileged access management. 4. Administer email protection systems (e.g., Proofpoint) and ensure compliance with DKIM, SPF, DMARC. 5. More ❯
engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest improvements and work collaboratively across teams A genuine passion for cyber security Certifications such as CISSP, SC More ❯
engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest improvements and work collaboratively across teams A genuine passion for cyber security Certifications such as CISSP, SC More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Circle Recruitment
years' experience in IT support or infrastructure roles, ideally within an MSP. Strong hands-on experience with Microsoft 365 administration (essential). Familiarity with security best practices (e.g., CAP, DLP, tenancy hardening, policy management). Bonus: Experience with compliance frameworks (ISO audits, certification, policy management). Good understanding of networking principles and troubleshooting. Excellent communication skills and a proactive, team More ❯
telephony providers. Good knowledge of networking - Layer2/3, dynamic routing, MPLS and firewall management. Good knowledge of IT security practices and the implementation of tools that provide MFA, DLP, proxy services, encryption, event logging and alerting. Able to provide input to, and technical solutions to business requirements. Worked within project delivery frameworks, able to demonstrate time management and labour More ❯
telephony providers. Good knowledge of networking - Layer2/3, dynamic routing, MPLS and firewall management. Good knowledge of IT security practices and the implementation of tools that provide MFA, DLP, proxy services, encryption, event logging and alerting. Able to provide input to, and technical solutions to business requirements. Worked within project delivery frameworks, able to demonstrate time management and labour More ❯
telephony providers. Good knowledge of networking - Layer2/3, dynamic routing, MPLS and firewall management. Good knowledge of IT security practices and the implementation of tools that provide MFA, DLP, proxy services, encryption, event logging and alerting. Able to provide input to, and technical solutions to business requirements. Worked within project delivery frameworks, able to demonstrate time management and labour More ❯
cloud environments. Administer and optimise Microsoft 365 services, including Exchange Online, Teams, SharePoint Online, OneDrive , and the Compliance Centre . Implement and maintain email security controls (SPF, DKIM, DMARC, DLP, ATP). Ensure service reliability, scalability, and compliance across messaging and collaboration platforms. Provide Tier-3 technical support and act as the escalation point for complex issues. Deliver engineering-level More ❯
cloud environments. Administer and optimise Microsoft 365 services, including Exchange Online, Teams, SharePoint Online, OneDrive , and the Compliance Centre . Implement and maintain email security controls (SPF, DKIM, DMARC, DLP, ATP). Ensure service reliability, scalability, and compliance across messaging and collaboration platforms. Provide Tier-3 technical support and act as the escalation point for complex issues. Deliver engineering-level More ❯
Review estate and help plan DLP with best practice deployment Identify the types of data needed to protect (e.g., personal data, financial records, intellectual property) and determine the environments where DLP will be applied (e.g., endpoints, cloud, email, network). Conduct a thorough audit of the assets. Locate where sensitive data resides, how it is used, and … with monitoring and alerting to minimise disruption, and gradually move to blocking or quarantining actions. Test policies in a controlled environment to refine them and reduce false positives Implement DLP in phases, beginning with the most critical areas or departments. Monitor performance, gather feedback, and make adjustments. Work with the IT teams to educate employees on the importance of data protection, how DLP works, and their responsibilities. Regular training reduces accidental violations and encourages reporting of suspicious activities Support in AI Copilot readiness for protecting data in SharePoint (Linked to Data Classification rules) Randstad Technologies is acting as an Employment Business in relation to this vacancy. More ❯
Review estate and help plan DLP with best practice deployment Identify the types of data needed to protect (e.g., personal data, financial records, intellectual property) and determine the environments where DLP will be applied (e.g., endpoints, cloud, email, network). Conduct a thorough audit of the assets. Locate where sensitive data resides, how it is used, and … with monitoring and alerting to minimise disruption, and gradually move to blocking or quarantining actions. Test policies in a controlled environment to refine them and reduce false positives Implement DLP in phases, beginning with the most critical areas or departments. Monitor performance, gather feedback, and make adjustments. Work with the IT teams to educate employees on the importance of data protection, how DLP works, and their responsibilities. Regular training reduces accidental violations and encourages reporting of suspicious activities Support in AI Copilot readiness for protecting data in SharePoint (Linked to Data Classification rules) Randstad Technologies is acting as an Employment Business in relation to this vacancy. More ❯
solutions - enabling clients to modernise, secure, and scale their digital environments. You'll work closely with customers to design, propose, and implement tailored solutions across Microsoft 365, Azure, and data governance technologies. This role combines hands-on technical expertise with strong client engagement, offering the chance to shape cloud adoption strategies and drive real business outcomes. Ideal Candidate You … proactive engineer with a passion for cloud technology and a focus on delivering results. You thrive in client-facing environments and are comfortable leading conversations around modern workplace transformation, data protection, and cloud security. You will bring: 3+ years of hands-on experience in Microsoft 365 and Azure … solutions Proven understanding of Microsoft 365 Security, Modern Workplace, and Identity Management Strong technical background in Exchange Online, SharePoint, Teams, and Intune Expertise in Microsoft Purview, including Information Protection, DLP, and Data Retention Experience configuring and managing Active Directory, Entra ID, and Windows Server environments Strong communication skills with the ability to build trust with clients and internal teams More ❯
solutions - enabling clients to modernise, secure, and scale their digital environments. You'll work closely with customers to design, propose, and implement tailored solutions across Microsoft 365, Azure, and data governance technologies. This role combines hands-on technical expertise with strong client engagement, offering the chance to shape cloud adoption strategies and drive real business outcomes. Ideal Candidate You … proactive engineer with a passion for cloud technology and a focus on delivering results. You thrive in client-facing environments and are comfortable leading conversations around modern workplace transformation, data protection, and cloud security. You will bring: 3+ years of hands-on experience in Microsoft 365 and Azure … solutions Proven understanding of Microsoft 365 Security, Modern Workplace, and Identity Management Strong technical background in Exchange Online, SharePoint, Teams, and Intune Expertise in Microsoft Purview, including Information Protection, DLP, and Data Retention Experience configuring and managing Active Directory, Entra ID, and Windows Server environments Strong communication skills with the ability to build trust with clients and internal teams More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
eTech Partners
formula-based logic. Experience with SharePoint, Teams, Outlook, and other Microsoft 365 tools. Familiarity with REST APIs, JSON, and custom connectors. Understanding of role-based security, environment management, and DLP policies. Excellent communication and problem-solving skills Desirable Skills Familiarity with Python, JSON, JavaScript, or SharePoint Lists Exposure to Power BI is advantageous. Excellent communication, problem-solving, and interpersonal skills. More ❯
or Proofpoint specialist cert ITIL v4 Foundation Microsoft 365 Certified: Enterprise Administrator Expert CompTIA Security+ or Microsoft Security Operations Analyst (SC-200) Desirable Expertise: Experience with Proofpoint Core Email DLP (Tessian) WHY YOU’LL LIKE WORKING HERE: • Medical benefits • 25 days paid holidays • Enjoyable and dynamic company culture • Training and professional development opportunities MORE ABOUT US: AVI-SPL is an More ❯
or Proofpoint specialist cert ITIL v4 Foundation Microsoft 365 Certified: Enterprise Administrator Expert CompTIA Security+ or Microsoft Security Operations Analyst (SC-200) Desirable Expertise: Experience with Proofpoint Core Email DLP (Tessian) WHY YOU’LL LIKE WORKING HERE: • Medical benefits • 25 days paid holidays • Enjoyable and dynamic company culture • Training and professional development opportunities MORE ABOUT US: AVI-SPL is an More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
eTech Partners
Power Automate, and SharePoint, Strong command of Power Fx and formula-based logic. Familiarity with REST APIs, JSON, and custom connectors. Understanding of role-based security, environment management, and DLP policies. Excellent communication and problem-solving skills This role offers genuine opportunities for career development, ongoing training, and the chance to grow within the team. Etech Partners needs to collect More ❯
will be required to obtain security clearance and undergo vigorous onboarding checks - UK Only. Sponsorship NOT available.The main purpose of this job mainly focusses on information security, cybersecurity, and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices, application … security both development and testing phrases, terminal security, backup security, third party and supply chain security of IT service provider.Liaison with the Head Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline … solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA/CISSP/CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Hays Specialist More ❯
be required to obtain security clearance and undergo vigorous onboarding checks - UK Only. Sponsorship NOT available. The main purpose of this job mainly focusses on information security, cybersecurity, and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices, application … security both development and testing phrases, terminal security, backup security, third party and supply chain security of IT service provider. Liaison with the Head Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international … solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA/CISSP/CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Hays Specialist More ❯
a focus on user experience and continuous improvement. Nice to Have ITIL certification (v3 or v4) Experience in a SaaS, fintech, or product-led organisation Exposure to CASB/DLP solutions and compliance frameworks (e.g., ISO27001, SOC2 More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Levy Global
a focus on user experience and continuous improvement. Nice to Have ITIL certification (v3 or v4) Experience in a SaaS, fintech, or product-led organisation Exposure to CASB/DLP solutions and compliance frameworks (e.g., ISO27001, SOC2 More ❯