Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring DataLossPrevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture … needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and security audits. Define data protection, backup, and retention policies aligned with Microsoft 365 compliance tools. 5. Network Security & Infrastructure Protection (Plus Skills) Experience with Layer 7 firewalls (Cisco More ❯
security policies; monitor threats and respond to incidents Maintain cybersecurity best practices, including endpoint and network security Oversee DataLossPrevention (DLP) policies and secure data workflows Ensure compliance with legal, regulatory, and industry standards Manage user identities and implement Single Sign-On (SSO) integrations Infrastructure More ❯
implement a comprehensive IT security roadmap that aligns with ZOE's business goals, covering everything from endpoint security and identity/access management to DLP (DataLossPrevention) and logging/monitoring . Drive security programs around OS and application patch management , disk encryption , and local admin … SIEM setup, and endpoint protection rollouts. Develop and enforce security policies and frameworks , covering identity and access management, incident response , vendor security reviews, and data handling. Drive automation and adopt Infrastructure-as-Code (IaC) patterns to ensure security controls and configurations are repeatable, consistent, and easily deployed across our … technical stakeholders, and work autonomously on big initiatives. A proactive, problem-solving mindset : comfortable tackling complex issues like domain migrations, privileged access reviews, and DLP rollout in a single role. Experience working in a remote, international team is a plus. The experience, skills, and attributes listed above reflect what we More ❯
applications. Security administration : Implement security best practices such as conditional access policies, multi-factor authentication (MFA), and DataLossPrevention (DLP). Implement and manage device policies using Microsoft Endpoint Manager (Intune) for Windows and mobile devices. Support Teams and SharePoint for collaboration, including setting up communication More ❯
a fantastic opportunity for a passionate security professional to work at the heart of an advanced information security operation, helping to protect critical systems, data, and users in an increasingly complex threat landscape. The Role As a SOC Analyst, you will be a key player in the frontline defence … SIEM platforms and security monitoring technologies. Good understanding of security tools and concepts, especially Endpoint Detection & Response (EDR), DataLossPrevention (DLP), and antivirus solutions. Strong working knowledge of Microsoft Windows operating systems and core networking technologies. High attention to detail and the ability to produce clear More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
Power Automate, Power BI) · Azure Active Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · DataLossPrevention (DLP) · Information Protection · Identity and Access Management · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly More ❯
a permanent position. Your responsibilities will include: Office 365 Compliance Features: Implement and manage compliance features such as datalossprevention (DLP), eDiscovery, and retention policies. Ensure compliance with legal and regulatory standards. SharePoint Online Administration: Administer SharePoint Online, including site creation, configuration, and management. Facilitate collaboration More ❯
a permanent position. Your responsibilities will include: Office 365 Compliance Features: Implement and manage compliance features such as datalossprevention (DLP), eDiscovery, and retention policies. Ensure compliance with legal and regulatory standards. SharePoint Online Administration: Administer SharePoint Online, including site creation, configuration, and management. Facilitate collaboration More ❯
Dynamics 365 CRM, Power Platform, and Azure services. Ensure security compliance through Azure Active Directory (AAD), conditional access, datalossprevention (DLP), and information protection policies. Drive cost optimisation and vendor management, working closely with Microsoft and key technology partners. Lead and mentor a team of six More ❯
london, south east england, united kingdom Hybrid / WFH Options
Cloud2 Consult
Dynamics 365 CRM, Power Platform, and Azure services. Ensure security compliance through Azure Active Directory (AAD), conditional access, datalossprevention (DLP), and information protection policies. Drive cost optimisation and vendor management, working closely with Microsoft and key technology partners. Lead and mentor a team of six More ❯
in a SOC with knowledge of enterprise-grade security tools such as Splunk, MDE, and Sentinel. The triage and investigation of security incidents. Large data analysis, data manipulation, and providing insights into disparate data sets. Additional valued skills include: Knowledge of current security trends and risk areas … like cybercrime, fraud, and financial crime. Experience with data analysis using ELK stack. Experience with Cloud technologies. You may be assessed on key skills such as risk and controls, change and transformation, business acumen, strategic thinking, digital and technology, alongside technical skills. This role is based in either our … manage security controls, and learn from lessons to protect the bank from cyber-attacks and respond to threats. Accountabilities Manage security monitoring systems, including prevention and detection tools, to alert, detect, and block potential cyber incidents, and respond promptly to restore operations. Identify emerging threats, attack techniques, and technologies More ❯
strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, datalossprevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS Control More ❯
Office 365, Teams, SharePoint, and Active Directory, including SSO and access controls. Maintain and monitor IT security tools including anti-virus, patch management, and datalossprevention solutions, working in collaboration with information security teams. Configure and maintain network infrastructure including Wi-Fi access points, VPNs, and … disability, sexual orientation, gender reassignment, religion or belief, marital/civil partnership status, or pregnancy and maternity. At GB Bank, we value privacy and data protection rights. We have longstanding data protection culture and promote robust ethical standards in data management. Please read our Privacy Notice in More ❯
Office 365, Teams, SharePoint, and Active Directory, including SSO and access controls. Maintain and monitor IT security tools including anti-virus, patch management, and datalossprevention solutions, working in collaboration with information security teams. Configure and maintain network infrastructure including Wi-Fi access points, VPNs, and … disability, sexual orientation, gender reassignment, religion or belief, marital/civil partnership status, or pregnancy and maternity. At GB Bank, we value privacy and data protection rights. We have longstanding data protection culture and promote robust ethical standards in data management. Please read our Privacy Notice in More ❯
field parsers, models and automated playbooks, and integrate new log sources where appropriate. Threat Intelligence & Threat Hunting - provide, develop and integrate external threat intelligence data into the team's detection capabilities; perform proactive threat hunts based on working hypotheses, and implement subsequent SIEM alerts where required. Purple Team & Scenario … capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat - maintain and develop the DataLossPrevention policies in line with the company's data classification requirements, and implement exceptions for business-approved procedures where required. … the role, benefits/downsides, and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerability scanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
Develop Use Cases - Develop use case and facilitation, threat modelling and translation of operational requirements into SOC SIEM tool. Focus on insider threat and DataLossPrevention use case to demonstrate the process used by SOC analysts. Cyber Security Incident Management Plan (SIMP) - Develop the Cyber Incident … range of different stakeholders. Network and application security and architecture, incident response, forensic investigation, and business continuity management. Knowledge of various Cyber Security Frameworks, Data Protection, and bulk data controls. Hands-on experience with security tooling such as SIEM and EDR solutions. Technical ability to operate them from More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JobHeron
Security Engineer: Develop and implement comprehensive security strategies, policies, and procedures. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, datalossprevention and encryption. Design and manage security in the cloud, including AWS Control Tower, Azure, and More ❯
rail, and defense organizations with the most comprehensive product portfolio to elevate operational excellence, and transform safety management and training, with closer integration of data across these domains. Comply365 ensures our customers' teams and assets are always geared for peak operational performance and unlocks unparalleled financial and operational gains … As a person, you'll be proactive rather than reactive, able to build cross functional relationships and be able to articulate value and represent data in a way that can be consumed at all levels. Key Duties and Responsibilities Conducting security assessments and prioritising findings for remediation. Designing and … business. Logging and Auditing Ensuring standards are updated and clearly understood across the business. Ensure collected data is useful and actionable. Office 365, DLP and Endpoint Security Policy changes to secure devices are in place and suitable. Security updates are applied to protect the business. DatalossMore ❯
have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymising technology, datalossprevention, Endpoint Detection and Response (EDR) You have experience of More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Client Server
have a strong knowledge of SIEM and deep Splunk experience You have a good understanding of various security infrastructure tools such as firewalls, intrusion prevention/detection systems, proxy servers, email controls, anonymising technology, datalossprevention, Endpoint Detection and Response (EDR) You have experience of More ❯
cyber adversaries targeting the financial sector, including eBanking Trojans, POS/ATM malware, mobile malware, webinjects, and phishing kits. Experience with fraud detection and prevention systems. Strong stakeholder management skills. Additional valued skills include: Knowledge of social engineering tactics used by cybercriminals. Proficiency with Microsoft PowerPoint, Confluence, JIRA, and … cyber threats and attack techniques, collaborating with industry conferences and networks for knowledge sharing. Analyze security logs and alerts to identify potential threats. Triage datalossprevention alerts to prevent sensitive data exfiltration. Manage cyber security incidents, including remediation and closure. Assistant Vice President Expectations Provide … mitigate risks and support governance. Manage risk and strengthen controls related to your work. Collaborate across teams to align with business strategies. Conduct complex data analysis from multiple sources to solve problems creatively. Communicate complex or sensitive information effectively. Influence stakeholders to achieve desired outcomes. All colleagues are expected More ❯
industry-standard SIEM tools for security monitoring and analysis. Familiarity with security technologies and an understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of Threat Intelligence , Digital Forensics , and DataLossPrevention . Relevant certifications such as CISSP , CEH , or Splunk certifications More ❯
and organisation resilience to improve cyber defences and attack preparedness. Manage and maintain the suite of Cyber Security tools and platforms to enable effective prevention and detection of cyber threats. Drive security orchestration, automation, and response (SOAR) solutions for systems and operational playbooks to enable efficient discovery of security … IEC 27001/27002, GDPR. Working knowledge of security technologies including but not limited to SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics. Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (Mitre ATT&CK). Practical experience of incident … and Response (SOAR), running red-team exercises and tabletop crisis war games. Working knowledge of SIEM and SOAR solutions, Identity and Access Management and DataLossPrevention tools and technologies preferably including FortiSIEM, Q-Radar, Sentinel, Darktrace, Microsoft Defender. Log correlation and analysis, including chain of custody More ❯
to: Security engineering, designing IT and security architecture, implementing IAM/PAM technologies, building robust backup and recovery capabilities, delivering vulnerability management solutions, implementing datalossprevention controls. Experience in delivering cyber security risk assessments against industry standards (NIST CSF, 800-53 and ISO27001) within an established … non-technical terms to senior executives. You might have some of these Strong understanding of operational technology cyber security best practices. An understanding of data privacy requirements and cyber security regulations in the EU and wider European region. A deep understanding of governance, standards, and compliance as they pertain More ❯
Computacenters rapidly expanding Consultancy Practice as a Microsoft 365 Purview Consultant, and become part of a high-performing, forward-thinking team thats delivering transformative data protection and compliance solutions across industries. You'll collaborate with experts in an environment that values innovation, knowledge sharing, and continuous development. With exposure … advisor, providing technical insight and leadership while working on both standalone and collaborative projects Delivering end-to-end solutions across Microsoft Purview technologies, including DataLossPrevention, Information Protection, eDiscovery, Information Barriers, Insider Risk Management, and Data Lifecycle Management Supporting customer engagements by analysing requirements, designing More ❯