SIEM Management & Optimization: Design, implement, and maintain Microsoft Sentinel workspaces, connectors, analytics rules, and playbooks Develop advanced KQL queries for threat hunting and reporting Optimize SIEM performance, cost, and data retention policies Troubleshoot log ingestion and parsing issues Log Source Integration: Onboard and configure critical log sources (AD, firewalls, servers, cloud infrastructure) Manage event collection and forwarding infrastructure Implement … data filtering and custom log parsing Threat Detection & Use Case Development: Develop and refine detection rules based on threat intelligence and attack patterns Continuously improve detection efficacy and reduce false positives Security Monitoring & Incident Response: Monitor systems for anomalies and malicious activity Contribute to threat hunting and incident response playbooks Provide expert guidance on securing applications and infrastructure Security … Directory, Windows/Linux systems, and cloud platforms (Azure, AWS, GCP) Proficiency in scripting (PowerShell, Python) Familiarity with security frameworks (MITRE ATT&CK, NIST, Kill Chain) Experience with EDR, DLP, Proxy, and SEG tools Desirable Qualifications Certifications: AZ-500, SC-200, SC-900, CompTIA Security+, CISSP, GCIA, GCIH, GCFA, CCSP Experience with SOAR playbooks, YARA rules, STIX, and YAML Participation More ❯
concepts, controls, and best practices for Servers (e.g. Windows and Linux). General IT networking concepts, protocols, standards and network security concepts, controls, and best practices. Cryptography fundamentals and data security controls and … best practices. Forensic investigation techniques. Prior experience deploying, configuring, managing, and/or operating security technologies is preferred, such as endpoint security (e.g. AV/EPP/EDR), SIEM, DLP, SWG, CASB, UEBA, IDS, IPS, firewalls, IAM/PIM/PAM, vulnerability management, MDM, etc. About us We're a diverse group of visionary innovators who provide trading and workflow More ❯
our L1 Insider Threat team. Reporting to the Insider Threat - IRM Operations Manager, the L2 Insider Threat- IRM Analyst role is suited to someone who has strong Microsoft Purview DLP and Insider Risk Management (IRM) analyst experience. It is a business facing role and requires working proactively with stakeholders and colleagues to investigate Insider Threat and IRM cases. The Role … across the various egress channels in both on premise and cloud environments. Analyse event/case/alert patterns to properly interpret and prioritise threats with available IRM and DLP tools and other data protection devices. Help Identify trends and drive requirements aimed at improving and enhancing existing IRM detection policies. Work closely with Cyber Defence teams such as … projects and initiatives that enhance Insider Risk and IRM policies and standards. Qualifications The Requirements: It is essential that you have in-depth experience within an L2 IRM/DLP or Insider Threat Analyst role in a global enterprise organisation. Relevant Microsoft Qualifications for Purview IRM, Defender and DLP (like SC400/401, AZ 900). Excellent operational knowledge of More ❯
Must have: Proven experience with Bluecoat to FortiProxy migrations Deep expertise in FortiProxy/Web Secure Gateway Strong knowledge of Bluecoat configuration translation Background in web filtering, SSL inspection, DLP Solid understanding of proxy architecture and TCP/IP, HTTP/S protocols Fortinet certifications (e.g., NSE 4+), Bluecoat certs Experience with cloud-based proxy environments Benefits: Extension Salary More ❯
up on the remediation of vulnerabilities Configure, customize, tune, manage, troubleshoot, and maintain effective and efficient operation of security technologies, such as SIEM, endpoint security, secure web gateway, CASB, DLP, email security, intrusion detection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms Define, document, and follow approved processes for all the responsibilities … To develop and implement security policies, managing SIEM systems, and investigating incidents. General IT networking concepts, protocols, standards and network security concepts, controls, and best practices Cryptography fundamentals and data security controls and best practices Forensic investigation techniques Security standards/best practices and frameworks About us We're a diverse group of visionary innovators who provide trading and More ❯
Through a positive attitude and dedication, we work together to solve some of the industry's most challenging problems. Who We Serve We partner with manufacturers to produce the data needed to deliver complex products like aircraft, jet engines, components, and defence systems. We work with airlines to take control of that data to revise and deliver it … Engineer with astrong background in Networking and Cybersecurity to join our growing team . This position is located in the UK, preferably within close proximity to our London area Data Centres, or our Derby office. Remote and Hybrid working options are offered and immediately available candidates, or candidates with a short notice period, are of particular interest. Due to … Hands-on experience with firewalls, IDS/IPS, and VPN configurations. Experience with virtualization (VMware, Hyper-V, etc.). Familiarity with various security tool sets such as SIEM solutions, DLP, Endpoint Protection. Experience implementing disaster recovery and business continuity plans. Familiarity with compliance and security frameworks (NIST, ISO 27001, etc). Knowledge of zero-trust architecture and secure remote access More ❯
all approach or prescriptive methodology. We work consultatively with our clients to revitalise their operations, reinvent established processes, and implement future-ready solutions that deliver measurable benefit and improve data-driven decision making. The Role We are seeking a versatile Microsoft Cloud & Desktop Leader to manage the design, deployment, and day-to-day operations of Microsoft Azure and Microsoft … platforms. 5. Security, Governance & Compliance Implement cloud and endpoint security policies, access controls, and threat protections. Ensure regulatory compliance through secure cloud configurations and monitoring. Oversee device encryption, MFA, DLP, and Conditional Access policies for endpoint and cloud environments. 6. Team Leadership & Development Lead and mentor teams of Azure engineers, M365 administrators, and desktop support specialists. Manage resourcing, workloads, and More ❯
Data Classification Lead (Varonis MDDR) Rate - £500 per day Ltd Duration - 7 Months Location - London We are currently seeking an experienced Data Classification Lead for a 7-month contract to take full technical ownership of delivering a major data governance and security initiative. This role will focus on the end-to-end implementation of Varonis MDDR in … conjunction with Microsoft Purview, playing a key part in strengthening the organisation's data protection, compliance, and governance frameworks. The position will be based on a hybrid working arrangement with time on site at the head office as required. You will lead the planning, delivery, and execution of the programme in line with a detailed Statement of Work, ensuring … optimisation of the chosen technologies. This will involve working closely with IT, Security, Compliance, and business stakeholders to identify and classify sensitive information, align sensitivity labels with the wider data classification strategy, and configure and fine-tune policies, labels, and rules for optimal data protection. You will oversee the full lifecycle of data discovery, labelling, and access More ❯
London, Peninsula, United Kingdom Hybrid / WFH Options
Ganymede Solutions
Data Classification Lead (Varonis MDDR) Rate - £500 per day Ltd Duration – 7 Months Location – London We are currently seeking an experienced Data Classification Lead for a 7-month contract to take full technical ownership of delivering a major data governance and security initiative. This role will focus on the end-to-end implementation of Varonis MDDR in … conjunction with Microsoft Purview, playing a key part in strengthening the organisation’s data protection, compliance, and governance frameworks. The position will be based on a hybrid working arrangement with time on site at the head office as required. You will lead the planning, delivery, and execution of the programme in line with a detailed Statement of Work, ensuring … optimisation of the chosen technologies. This will involve working closely with IT, Security, Compliance, and business stakeholders to identify and classify sensitive information, align sensitivity labels with the wider data classification strategy, and configure and fine-tune policies, labels, and rules for optimal data protection. You will oversee the full lifecycle of data discovery, labelling, and access More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Addition
business helping to shape the future of secure technology in the insurance sector. This is a pivotal role with real impact where your expertise will help protect critical systems, data, and services across multiple markets. Role Overview: Role: Security Architect. Location: Remote based with 1-2 days per month in Central London Package: £100,000- £130,000 per annum … TOGAF or SABSA. Significant experience in Financial Services or Insurance, including PCI-compliant environments. Expert knowledge of network and cloud security using Azure, Hands-on experience with application security, data protection … and threat modelling. Confident communicator, able to influence across technical and business functions. Track record in risk assessment, vulnerability management and secure architecture delivery. Knowledge of DevSecOps, SIEM, IAM, DLP, and related security tools is a plus. What’s in It for You: Opportunity to make a meaningful impact across a growing international group. Collaborative environment with strong security leadership More ❯
and mentor junior staff Essential (Must Have): 2+ years' experience as a Solutions Architect or similar within an MSP Strong technical knowledge of Microsoft 365, including migrations, hybrid identity, DLP, retention policies Hands-on Azure IaaS experience: networking, NSGs, VPNs, load balancers, governance Proven Microsoft Sentinel experience: KQL, dashboards, incident response Solid grasp of Intune, AutoPilot, security and compliance policies … and client requirements Job Information Job Reference: JO-93 Salary: £55000.00 - £58000.00 per annum Salary per: annum Job Duration: Job Start Date: 01/09/2025 Job Industries: Data Job Locations: Greater London Job Types: Permanent Apply for this Job Name Please enter your full name. Email Enter a valid email address. Upload a CV Upload your CV … to accompany your application for this job. Please tick this box to consent to us using your data. How we use your data is outlined in our privacy policy Fields marked with are required. More ❯
access management Enforce secure configurations across SaaS, endpoint, and MDM platforms (e.g., CrowdStrike, Jamf, Intune). Evaluate and guide SaaS tool usage, integrations, and risk mitigation. Design and maintain DLP, insider threat, and device posture enforcement capabilities. Collaborate with product and platform engineering teams to embed security into the SDLC and CI/CD. Define security controls for cloud-native … GuardDuty, VPC security, etc.). Contribute to secure API design, secrets management, service-to-service auth, and cloud segmentation. Provide architectural governance input into vendor risk, procurement reviews, and data privacy design. Provide input as the security architecture voice in planning meetings, engineering forums, and GRC efforts to ensure Security by Design. We'd love to hear from you … implementing Zero Trust in a cloud-first, SaaS-heavy environment. Strong knowledge of Cloud security architecture and tools (Preferably AWS). Experience with securing enterprise IT tools (O365, MDM, DLP, CASB). Familiarity with compliance frameworks (e.g., ISO 27001, PCI DSS, GDPR). Strong communication skills: equally comfortable in technical architecture forums and executive briefings. Strategic mindset with a bias More ❯
Data Classification Lead (Varonis MDDR Engineer) Rate - £500 per day Ltd Duration - 7 Months Location - London We are currently seeking an experienced Data Classification Lead for a 7-month contract to take full technical ownership of delivering a major data governance and security initiative. This role will focus on the end-to-end implementation of Varonis MDDR … in conjunction with Microsoft Purview, playing a key part in strengthening the organisation's data protection, compliance, and governance frameworks. The position will be based on a hybrid working arrangement with time on site at the head office as required. You will lead the planning, delivery, and execution of the programme in line with a detailed Statement of Work … optimisation of the chosen technologies. This will involve working closely with IT, Security, Compliance, and business stakeholders to identify and classify sensitive information, align sensitivity labels with the wider data classification strategy, and configure and fine-tune policies, labels, and rules for optimal data protection. You will oversee the full lifecycle of data discovery, labelling, and access More ❯
London, Peninsula, United Kingdom Hybrid / WFH Options
Ganymede Solutions
day Ltd Duration – 7 Months Location – London We are currently seeking an experienced Varonis Engineer for a 7-month contract to take full technical ownership of delivering a major data governance and security initiative. This role will focus on the end-to-end implementation of Varonis MDDR in conjunction with Microsoft Purview, playing a key part in strengthening the … organisation’s data protection, compliance, and governance frameworks. The position will be based on a hybrid working arrangement with time on site at the head office as required. You will lead the planning, delivery, and execution of the programme in line with a detailed Statement of Work, ensuring the successful configuration, integration, and optimisation of the chosen technologies. This … will involve working closely with IT, Security, Compliance, and business stakeholders to identify and classify sensitive information, align sensitivity labels with the wider data classification strategy, and configure and fine-tune policies, labels, and rules for optimal data protection. You will oversee the full lifecycle of data discovery, labelling, and access control processes, providing expert guidance, training More ❯
Marex's critical systems Contributing to the organisation's security standards and procedures Assessing and approving requests Assisting ISO and/or lead security projects such as vulnerability scanning, DLP and/or privileged access monitoring Participating in 3rd party monitoring activities; Advising IT and business on security matters Building connectors to various 3rd party products and services Maintenance and … auditing, and maintaining privilege access management solution Performing periodic risk assessments of Marex's systems Auditing PII data within the environment for proper sanitization, responsible for deployment of DLP controls Assisting technology teams with incident response and disaster recovery planning Communicating Marex's security requirements to 3rd party vendors Assisting with technology audits conducted by internal or external auditors More ❯
the leading strategic intelligence company, Strider empowers organizations to secure and advance their technology and innovation. We leverage cutting-edge AI technology and proprietary methodologies to transform publicly available data into critical insights. These insights enable organizations to proactively address and respond to risks associated with state-sponsored intellectual property theft, targeted talent acquisition, and supply chain vulnerabilities. Job … in helping clients activate Strider's platform through tailored integrations and scalable technical solutions. We're looking for a trusted technical advisor who thrives at the intersection of software, data, and customer success. This is an opportunity to shape how our clients operationalize strategic intelligence and to support Strider's European expansion. Key Responsibilities In this role, you will … years in solutions architecture, sales engineering, or a similar client-facing technical role. Demonstrated experience integrating with enterprise security and data platforms, including SIEM (e.g., Splunk, Sentinel, Elastic), DLP, UEBA, or SCRM systems. Proficiency with scripting and programming languages (e.g., Python, Node.js, Java, SQL, C++, or C#). Strong understanding of authentication protocols such as OAuth and SAML, and More ❯