You'll be helping the team delivery an exciting piece of work, integrating crucial security solutions to evolve functions such as Database Monitoring and DataLoss Prevention. Immediate start & 1-stage interview process Must be able to travel onsite 2 days per week to Manchester or London Experience … Technical project manager, with capabilities in AWS and database monitoring projects. Strong experience defining, delivering, and supporting strategic plans for implementing data base monitoring project. Experience of delivering projects by coordinating engineering resources and timetables with technology departments. Strong knowledge/experience with Imperva Sonar/DAM Please apply more »
environment and conduct regular audits to ensure the integrity and confidentiality of sensitive data. Alongside the engineering aspects of the role, strong knowledge of DLP is needed to prevent data breaches and to fine-tune their policies. Identifying and addressing potential security risks making sure the organisation adheres to more »
environment and conduct regular audits to ensure the integrity and confidentiality of sensitive data. Alongside the engineering aspects of the role, strong knowledge of DLP is needed to prevent data breaches and to fine-tune their policies. Identifying and addressing potential security risks making sure the organisation adheres to more »
of SAML, OIDC, and Kerberos authentication. Experience with Office 365 security controls and Azure Active Directory. Understanding of DataLossPrevention (DLP) solutions and Azure Information Protection (AIP). Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security more »
crawley, west sussex, south east england, United Kingdom
InfoSec People Ltd
/IEC 62443, ISO/IEC 27001/27002, GDPR.Working knowledge of security technologies including SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics.Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (Mitre ATT&CK). Experience working within a regulated more »
crawley, west sussex, south east england, United Kingdom
Vallum Associates
ISO/IEC 27001/27002, and GDPR. Working knowledge of security technologies including SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics. Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (Mitre ATT&CK). Experience working within a regulated more »
leeds, west yorkshire, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Fruition IT
BAU support. Professional experience in supporting and managing Microsoft Cloud solutions, E5 level management of 365 technologies including Azure, Active Directory, SharePoint, OneDrive, MFA, DLP, VPN, Security and SaaS, IaaS, SASE integration and orchestration. Proven experience in deploying new projects, services and features to cloud. Ability to support SaaS platforms … applications Experience and use of automation, scripting and orchestration tooling Terraform, Ansible, Chef or Puppet. Experience of Python, PowerShell, JS or equivalent. Knowledge of data management and relational Databases, SQL, Postgres, Oracle. Knowledge of CI/CD pipelines, Git repositories. If this role would be of interest, then please more »
Exchange Online, SharePoint Online, Teams, and OneDrive. * Knowledge in Microsoft Security, Compliance, and Identity including Azure Information Protection, DataLossPrevention (DLP), Security Centre, Compliance Centre, and Retention Policies. * Familiar with AvePoint (M365 backup solutions), Windows 10 Lifecycle Management, Modern Endpoint Management, Intune, PowerShell Scripting, managing Multiple more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
the maintaining and recommending new tools, as well as updating the systems. You will be a key player across technology groups interfacing with Network, Data Centres and our internal Design Authority with a remit of driving cyber best practises into our operation. You will be responsible for the daily … to tune SIEM, IDS and associated tooling in an effective and timely manner. Working with threat management teams and liaising directly with Network and Data Centre teams to ensure Network architecture, Security Zone configuration and deployment of sensors and remediation platforms Is optimal and effective. Proficiency in use and … Arrange via change control all maintenance and changes. Maintain all related CIs in the CMDB. Report on availability, capacity, faults, risks and CSI. Forcepoint DLP, Forcepoint WEB Hygiene, Forcepoint Email Security, NEXPOSE, SIEM-QRadar, SEP Candidate Requirement Essential: Experience of creating small utilities or scripting in Powershell, Perl or Python. more »
Exchange Online, SharePoint Online, Teams, and OneDrive. * Knowledge in Microsoft Security, Compliance, and Identity including Azure Information Protection, DataLossPrevention (DLP), Security Centre, Compliance Centre, and Retention Policies. * Familiar with AvePoint (M365 backup solutions), Windows 10 Lifecycle Management, Modern Endpoint Management, Intune, PowerShell Scripting, managing Multiple more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
Eviden is an Atos Group business with an annual revenue of circa € 5 billion and a global leader in data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise … countries. By uniting unique high-end technologies across the full digital continuum with 55,000 world-class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are … and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLPDatalossprevention PKI Public key infrastructure Ability to guide engineering teams through the deployment where required; ability to write and review more »
reference libraries, security advisories and alerts, information on security trends and practices, and laws and regulations. Ensure audit trails, system logs and other monitoring data sources are reviewed periodically and are in compliance with policies and audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity … intelligence An understanding of Microsoft security product portfolio CISSP/CISM (Desired) CCSP/SSCP (Desired) Proven experience in Cybersecurity and IT Operations (Required) DLP, EDR/XDR, CASB, E-mail Security, SWG and ZTNA/SASE You'll be able to be yourself; we'll recognise and value you more »
Microsoft 365 Purview Specialist Location: Horsforth, UK Job Type: Full-time We are seeking a Microsoft 365 Purview Specialist to enhance our IT data protection and compliance management capabilities. This role is ideal for professionals with a strong background in Microsoft Purview, looking to make a significant impact in … on expertise to cross-functional teams. Configure and maintain Microsoft Purview solutions, ensuring alignment with organisational goals and best practices. Develop and contribute to data governance policies, standards, and procedures to ensure compliance and data integrity. Collaborate with stakeholders to define data management requirements and establish effective … controls. Conduct training sessions to educate users on Microsoft Purview functionality and best practices. Identify opportunities for process improvements and provide recommendations to enhance data governance initiatives. Stay updated with industry trends and best practices in data governance and metadata management. Analyse information security risks and address issues more »
Chichester, West Sussex, South East, United Kingdom
Natures Way Foods
our department lead you will safeguard the organisation's computer networks and systems. Plan and carry out security measures to monitor and protect sensitive data and systems from infiltration and cyber-attacks. Ideally you will have worked within a large company environment previously as within an IT Security Engineer … functions of the IT department to design security into the system and drive security reviews. Develop tools to assist in modelling, analysis, detection, and prevention of security threats. Secure the system while ensuring ease of use for the user and network operations. Stay current on industry developments affecting security … and E series\Aruba switches. Good understanding of Backup solutions. Good Understanding of a wide range of security products such as; IDS/IPS DLP EDR\XDR NGAV NDR Cloud security solutions. This role will be based at our head office facility, which is modern and spacious and working within more »
supporting and delivering secure architectural design for the group cyber security maturity programme. Identify areas of cyber security improvement to ensure cyber security and data security … by design controls are adopted globally as outlines in the Howden Security and Configuration Standards Document (HSCSD) Support DataLossPrevention (DLP) solutions that protect corporate data seamlessly across platforms, devices and environments globally. Support the integration of new cyber security technologies that meets the next … generation threats and can be adopted by the group globally. You will be required to travel to the local sites, data centre or multiple offices location in order to complete your tasks for off the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme more »
responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity programme. Support DataLossPrevention (DLP) solutions that protect corporate data seamlessly across platforms, devices and environments globally Support the integration of new cyber security technologies that meets the next … generation threats and can be adopted by the group globally You will be required to travel to the local sites, data centre or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identity management solutions. Specific … Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience Azure Entra ID and DUO SSO & MFA gateway Datalossprevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools more »
environment. Working knowledge and/or general understanding of technology methodologies such as ITIL Profound understanding and working experience in the security area (SASE, DLP, CASB, SaaS API and SAAS inline, IDS/IPS, Sandboxing, etc…) Knowledge and working experience in: Routing and switching on various platforms up to engineering more »
security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM, DLP, IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management more »
london, south east england, United Kingdom Hybrid / WFH Options
Ignite Digital Talent
security. Some knowledge of GDPR & PCI-DSS Strong experience of AWS and ideally certified Forensic investigation techniques. Experience with security technologies (e.g., SIEM, DLP, IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management more »
Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS), and endpoint detection and response (EDR) platforms. Ensure that endpoint protection software is up-to-date with the latest definitions … patches, and security updates to defend against emerging threats. Threat Detection and Prevention: Monitor endpoint activities and network traffic for signs of malicious behavior, suspicious activities, or known attack patterns. Implement proactive measures to detect and prevent malware, ransomware, phishing attempts, and other types of cyber threats from compromising … updates, and security fixes to mitigate identified vulnerabilities and strengthen endpoint security. Data Protection and Encryption: Implement datalossprevention (DLP) measures to monitor and control the transfer of sensitive data to and from endpoints, both within the organization's network and over external channels. more »
Exchange Online, SharePoint Online, Teams, and OneDrive. Knowledge in Microsoft Security, Compliance, and Identity including Azure Information Protection, DataLossPrevention (DLP), Security Centre, Compliance Centre, and Retention Policies. Familiar with AvePoint (M365 backup solutions), Windows 10 Lifecycle Management, Modern Endpoint Management, Intune, PowerShell Scripting, managing Multiple more »
monitoring systems Maintain a strong awareness of the current threat landscape Basic Qualifications Excellent teamwork skills Knowledge of and experience with intrusion detection/prevention systems and SIEM software Strong knowledge and understanding of network protocols and devices. Strong experience with Mac OS, Windows, and Unix systems. Ability to … following: SIEM Packet Analysis SSL Decryption Malware Detection HIDS/NIDS Network Monitoring Tools Case Management System Knowledge Base Web Security Gateway Email Security DataLossPrevention Anti-Virus Preferred Qualifications Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetration testing, or related areas … with proven experience in security/network operations will also be considered About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as a force more »
and complex email routing environments Application deployment (not development) System deployments, upgrades or migrations Security system rollout, as an example to; manage privileged access, datalossprevention, MFA Release Management experience beneficial Ability to work within the varied International Compliance and Regulatory requirements. Ability to work within more »