3 of 3 Data Loss Prevention Jobs in Scotland

AI Director

Hiring Organisation
Global University Systems
Location
Aberdeen, UK
Employment Type
Full-time
continually refine the AI initiatives portfolio and roadmap for the group. Run a structured intake process for new ideas, assessing value, feasibility, data readiness, ethical risk, and compliance. Define clear success measures for every proof of concept (PoC) and MVP, including KPIs, leading indicators, and decision gates to continue … MVPs (8–16 weeks) using Agile methods (Scrum or Kanban) with regular demos and retrospectives. Build and lead cross-functional squads including Product Owner, Data Scientists, ML Engineers, Integration Engineers, Solution Architect, and domain experts from Admissions, Registry and Student Services. Design experiments, test hypotheses, and iterate quickly, ensuring ...

Lead IT Analyst - Business Services - EAL12114

Hiring Organisation
East Lothian Council
Location
Haddington, East Lothian, UK
sites, libraries, permissions, and information architecture. Develop and maintain standards for site provisioning, content lifecycle, metadata, and retention. Configure and maintain Purview compliance features (DLP, sensitivity labels, data classification, retention policies, insider risk). Collaborate with cyber security, legal, and data protection teams to ensure regulatory compliance … solid grasp of SharePoint permissions, Microsoft 365 Groups/Teams integration, information architecture, and compliance concepts Strong understanding of Microsoft Purview (data classification, DLP, retention, sensitivity labelling) & proven administration experience Ability to document governance frameworks and processes. Excellent communication and stakeholder management skills. Experience with Power Automate for workflow ...

Cyber Security Manager ( SC)

Hiring Organisation
Sanderson Recruitment
Location
Glasgow, Lanarkshire, Scotland, United Kingdom
Employment Type
Permanent, Work From Home
cloud security (IaaS, PaaS, SaaS, CASB, Zero Trust, micro-segmentation) Broad knowledge of security technologies (firewalls, IDS/IPS, endpoint protection, SIEM, SOAR, DLP, PKI, cryptography) Solid understanding of IAM concepts (RBAC, ABAC, PAM, SSO) Strong analytical skills with the ability to interpret complex technical information Good understanding of threat ...