for routine security testing activities. Develop and deploy tools and automation to streamline common IT Security Operations tasks. Identify areas of cyber security improvement to ensure cyber security and data security by design controls. Collaborate closely with IT and Development teams to embed security-by-design principles into development processes. Conduct reviews of existing tools and processes, identifying gaps … vulnerability management, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Support DataLossPrevention (DLP) solutions that protect corporate data across platforms, devices, and environments globally. Monitoring and managing responses to the Security Incidents and Security DLP. Standard, third party and privilege Identity Access … application Firewalls, anti-malware, cloud proxies and CASB. Forcepoint, Palo Alto Firewall, and Cisco NAC experience Good knowledge of MS Defender for Cloud, Storage (SQL) and CSPM. Proficient with Datalossprevention tools experience, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tooling such as Exabeam, QRadar, Splunk and Sentinel. Experience with Azure (security More ❯
Engineer to join the IT team. As the first line of defence in the IT department, the principal purpose of this job mainly focusses on information security, cybersecurity and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices, application … security both development and testing phrase, terminal security, backup security, third party and supply chain security of IT service provider.Liaison with the Head Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline … solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA/CISSP/CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA/CCNP Experience with More ❯
Somerset, United Kingdom Req PURPOSE To work with multidisciplinary teams across Clarks Technology and business areas to identify, design, and build security controls to protect Clarks' applications, networks, and data from security risks. To develop and embed best-practice security processes and knowledge into technical teams aligned to Zero Trust principles and in line with industry standards and frameworks … required to maintain cyber security for I T services, including managing endpoint compliance, system hardening, host firewall settings, endpoint applications, regulatory requirements, audit issues, endpoint security tools such as DLP, AV, EDR, patching etc. Development of monitoring processes and relevant measures/KPIs/metrics to support ongoing assessment of Clarks' security posture Support business continuity and disaster recovery processes … environments Good understanding of security controls and best practices across a number of the following areas/domains: Network and infrastructure (networking protocol knowledge is an advantage Endpoint (e.g. DLP, Endpoint Detection and Response, File Integrity, SIEM) Database technologies (SQL, Oracle) General cryptography practices (e.g. PKI) Cloud environments (Azure, AWS) Fundamental understanding of privacy and data protection laws and More ❯
of security technologies and controls, including but not limited to, firewalls, intrusion detection/prevention systems, security information and event management (SIEM), datalossprevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC): Integrate security best practices into the software development lifecycle. Work closely with development teams to ensure secure More ❯
of security technologies and controls, including but not limited to, firewalls, intrusion detection/prevention systems, security information and event management (SIEM), datalossprevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC): Integrate security best practices into the software development lifecycle. Work closely with development teams to ensure secure More ❯
systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works … closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to … required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze More ❯
supporting the engineering lead in configuring, implementing, and maintaining the tools that support all SOC functions. You will assess, implement, configure, and optimise our technical security controls, tools, and data feeds to maintain and continuously improve the visibility across our environments. You will also lead initiatives to improve the security posture and respond to incidents, problems and change requests … a cyber security focused role - Ideally 1- 2 years working as an engineer. Knowledge of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
networks, MFA, SSO, Identity management and subscription governance. In-depth experience administering Exchange Online, SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP … VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on More ❯
Proofpoint to protect their organizations. We're driven by a mission to stay ahead of bad actors and safeguard the digital world. Join us in our pursuit to defend data and protect people. How We Work: At Proofpoint, you'll be part of a global team that breaks barriers to redefine cybersecurity, guided by our BRAVE core values: Bold … help support and enable our Distributors and Resellers You will become an expert in Email Security, Advanced Persistent Threats, Attack Protection, Threat Response, DataLossPrevention (DLP), and the threat landscape Occasional travel required. What You Bring To The Team Proven hands-on experience, either as a Sales/Systems Engineer, Technical Account Manager, Security Engineer, or … O365, G-Suite, Lotus Dominoorworking knowledge of SMTP IT security related areas such as Vulnerability and Risk Management, Security Operations or Incident Response DataLossPrevention (DLP), compliance and data privacy Cloud security and shadow IT monitoring Cloud computing Infrastructure (e.g. AWS/Azure) Nice to have Hands on experience with the following: Directory Services and More ❯
teams, making the most of a SecOps approach. Mentoring: You'll provide guidance and support to less experienced team members, helping them grow. DataLossPrevention (DLP): You'll monitor, maintain, and enhance our DLP controls across email, endpoints, and cloud services. Data-Centric Security: You'll champion a data-centric security approach, making sure … data classification, handling, and protection are embedded from design to deployment. Zero Trust: You'll promote and support Zero Trust Architecture principles, continuously verifying identities, devices, and access requests. Security Awareness: You'll develop and maintain internal security awareness materials to educate our staff on evolving threats. Attack Simulation: You'll contribute to planning and delivering attack simulation training More ❯
teams, making the most of a SecOps approach. Mentoring: You'll provide guidance and support to less experienced team members, helping them grow. DataLossPrevention (DLP): You'll monitor, maintain, and enhance our DLP controls across email, endpoints, and cloud services. Data-Centric Security: You'll champion a data-centric security approach, making sure … data classification, handling, and protection are embedded from design to deployment. Zero Trust: You'll promote and support Zero Trust Architecture principles, continuously verifying identities, devices, and access requests. Security Awareness: You'll develop and maintain internal security awareness materials to educate our staff on evolving threats. Attack Simulation: You'll contribute to planning and delivering attack simulation training More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
team Leads and management on use case development by suggesting enhancement or tuning of use cases to improve the security posture of Experian About Experian Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain … deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people to accomplish their financial goals and help them save time and money. We operate across a range of markets, from financial services to healthcare, automotive, agribusiness, insurance, and many more industry segments. We invest in people and … knowledge of network and host security technologies and products (such as firewalls, network IDS, scanners) and improve these skills Security monitoring technologies, such as SIEM, IPS/IDS, UEBA, DLP, among others Scripting and automation Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great compensation package and discretionary bonus plan Core More ❯
data. The ideal candidate will have a deep understanding of cybersecurity threats, risk management frameworks, regulatory compliance, and modern security technologies. This role also includes responsibilities typical of a Data Protection Officer, ensuring that data privacy and governance meet the high regulatory standards of the financial sector. Responsibilities: Strategic Management and Security Operations Develop, implement, and maintain information … with business objectives. Lead risk assessments and threat modelling exercises for internal systems and third-party services. Manage the deployment and maintenance of security solutions (SIEM, firewalls, endpoint protection, DLP, etc.). Oversee the organization's incident response and business continuity plans, including simulations and real-time responses. Conduct regular security audits and work with internal/external auditors to … secure systems development and operations. Compliance & Risk Management Ensure compliance with regulatory and legal security requirements (e.g., ISO 27001, NIST, HIPAA, GDPR, SOX, etc.). Ensure compliance with applicable data protection laws (e.g., GDPR, CCPA, GLBA). Guide Data Protection Impact Assessments (DPIAs) for high-risk financial data processing activities. Work closely with Legal, Risk, and Compliance More ❯
Workplace, IT Compliance, Information Security, Business Resilience, Procurement, Finance and other cross-functions What you bring Required Hands-on experience implementing, managing, and improving security platforms, such as SIEM, DLP, IPS/IDS, WAF, EDR, etc., experience with the Microsoft Security Suite is ideal Deep technical expertise and relevant experience in security operations (threat intelligence, security monitoring, incident/crisis More ❯
within a national institution. This is a hands-on, strategic role with a focus on Microsoft Entra ID Governance and Microsoft Purview - including lifecycle management, RBAC, data classification, DLP and compliance tooling. You'll play a key part in designing and maintaining secure practices across Microsoft 365, Azure, and broader security operations. Working within a small, agile security team … all levels. Experience of Interest: * Practical experience implementing Microsoft Entra ID Governance (or similar Okta) * Hands-on and demonstrable use of Microsoft Purview for compliance, data classification, and DLP * Strong security operations knowledge across M365 and Azure environments * Awareness of regulatory frameworks such as ISO 27001, GDPR, NIST, Cyber Essentials+ * Comfortable working with senior IT, Compliance and Risk stakeholders More ❯
within a national institution. This is a hands-on, strategic role with a focus on Microsoft Entra ID Governance and Microsoft Purview – including lifecycle management, RBAC, data classification, DLP and compliance tooling. You’ll play a key part in designing and maintaining secure practices across Microsoft 365, Azure, and broader security operations. Working within a small, agile security team … all levels. Experience of Interest: Practical experience implementing Microsoft Entra ID Governance (or similar Okta) Hands-on and demonstrable use of Microsoft Purview for compliance, data classification, and DLP Strong security operations knowledge across M365 and Azure environments Awareness of regulatory frameworks such as ISO 27001, GDPR, NIST, Cyber Essentials+ Comfortable working with senior IT, Compliance and Risk stakeholders More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
SThree
and implement security controls across Microsoft 365, Azure, Dynamics 365, Kubernetes (AKS), and AI/ML workloads. Lead the design and deployment of conditional access, Defender for Cloud, Purview DLP, Azure Firewall, and related services. Integrate security into DevOps pipelines, CI/CD, infrastructure-as-code, and container workflows. Automate threat detection and response using Microsoft Sentinel SOAR, custom playbooks … through Intune, ensuring device compliance and integration with Zero Trust. Harden AKS clusters and cloud-native apps through role-based access control (RBAC), secrets management, and runtime protection. Secure data pipelines and models in AI workloads, implementing guardrails for model integrity and prompt injection defence. Cloud & Network Security Engineer secure access and posture for Cisco Meraki infrastructure and Umbrella … security problems through systems thinking and automation. Strategic, yet pragmatic: balances best practice with business context. Proactive, communicative, and passionate about elevating security posture through innovation. MS Engineer & MS Data Scientist Associate Ability to exercise independent judgment and act on it. Benefits for our U.K. teams include: The choice to work flexibly from home and the office, in line More ❯
and motivated Security Engineer with expertise in Proofpoint solutions to join our team. In this role, you will be responsible for ensuring the security, privacy, and integrity of our data across the organization. You will play a critical role in implementing, managing, and optimizing security measures … to protect our systems, networks, and data from unauthorized access, cyber threats, and data breaches. The ideal candidate should have a strong background in cybersecurity, particularly in DLP of email security, cloud applications, endpoints and threat prevention with a proven ability to respond to evolving security challenges. Responsibilities: Proofpoint Management: Configure, deploy, integrate, and manage Proofpoint security … solutions, including email security, datalossprevention (DLP), threat protection, and information protection. Monitor and analyse Proofpoint alerts and logs to detect and respond to security incidents and threats. Regularly update and optimise Proofpoint configurations to adapt to evolving threat landscapes and organisational needs. Develop and maintain custom filters and rules within Proofpoint to enhance security measures More ❯
are looking for: A passionate technology focused individual, with an honest and empathic approach to customer conversations. You will have hands on experience with a variety of technologies in datalossprevention and a keen interest in emerging security technologies. You will be excited to join a growing team of consultants focused on helping our customers achieve … a range of industries, whilst also collaborating closely with internal teams across Bridewell. Your core focus will be leading the delivery of Microsoft Purview solutions - helping clients navigate complex data governance, compliance, and risk management requirements. From auditing and optimising existing deployments to designing and implementing scalable compliance architectures, you will provide strategic and technical oversight across projects, acting … need to have all the following: A people-first approach to team management. Demonstrable experience with Microsoft Purview across core compliance areas, including: DataLossPrevention (DLP) Information Protection (Sensitivity Labels, encryption, etc.) Insider Risk Management eDiscovery & Communication Compliance Data Lifecycle Management & Records Management Information Barriers Demonstrable experience with Azure and Microsoft cloud services. A passion More ❯
and Cyber Essentials compliance. Ensure adherence to security standards, policies, and procedures, including external audits. Key Technologies: Strong knowledge of M365 security tools (Defender, Azure) Vulnerability Management, Web Filtering, DLP, Cloudflare, Firewalls, VPN, PKI, DNS, Email Gateways, Security Audits, ISO27001, Azure DevOps, Mitre Attack Framework, ITIL, Microsoft OS, Exchange Online To succeed, you should have a passion for IT Security … clients, communities, and the environment. We value diversity, innovation, and independent thinking, fostering a collaborative and inclusive culture. We offer a range of services in pensions, investments, benefits, risk, data, and technology, with over 1000 employees and numerous industry awards. We are committed to developing our people and supporting diverse talent. We welcome applications from all backgrounds and provide More ❯
SLA standards. Incident Response: Lead and manage IT security incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security policies and More ❯
DataLossPrevention/DLP/Insider Threat Analyst required by Harrington Starr’s global client to play a key role in their Cyber Security Engineering team. The role will play a key role in protecting the organisation from exposure to dataloss/theft. Key accountabilities will include: Developing and administering DLP policies Perform … analysis and triage of DLP violations Play an integral role in any cyber incidents with a DLP focus Working with the Security Operations and Engineering teams on DLP strategy Provide reporting on DLP incidents Developing Firmwide strategy for DataLossPrevention Regular usage of DLP tools such as Microsoft Purview In order to be suitable, you will … need: Experience in a dedicated DLP role or a cyber security role with a heavy DLP focus. Hands-on experience of DLP policy, incident management, data protection and reporting Experience of Microsoft Purview, M365, and Proofpoint technologies Practical experience End-User Behaviour Analytics (EUBA) and Insider Risk Management A good overall understanding of cyber and information security Certifications such More ❯
access control for all Microsoft 365 applications. Security administration : Implement security best practices such as conditional access policies, multi-factor authentication (MFA), and DataLossPrevention (DLP). Implement and manage device policies using Microsoft Endpoint Manager (Intune) for Windows and mobile devices. Support Teams and SharePoint for collaboration, including setting up communication channels, file sharing permissions More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
Job description We are recruiting for aSecurity Architecture and Engineering Senior Managerto join the A&O Shearman London office. About the team The firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Information security is not an afterthought; it … is core to all that we do, to protect not only our data but that of our clients, and has the unwavering support of the Board. Led by our new CISO, the in-house Information Security team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber … Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the firms platforms, including M365, legal and risk platforms, legal tech systems, data platforms, AI, infrastructure, and knowledge management. Ensure that platform-specific security standards, patterns, and design principles which suitably support secure business operations and digital transformation have been defined and More ❯