South East London, London, United Kingdom Hybrid/Remote Options
COMPUTACENTER (UK) LIMITED
working at the forefront of digitalisation. What you'll do Design and deliver Microsoft 365 solutions across Entra ID, Teams, Exchange, SharePoint, OneDrive, and associated security tools (Conditional Access, DLP, Data Labelling) Analyse customer requirements, recommend solutions, and guide stakeholders to achieve their business goals Take on medium to complex solution design and implementation, independently or as part of … and emerging technologies What you'll need Substantial hands-on experience with Microsoft 365 technologies and real-world solution delivery Strong understanding of security components such as Conditional Access, DLP, and Data Labelling Relevant qualifications or accreditations in Microsoft 365 or related technologies Proven ability to design technical solutions and contribute to project and bid documentation Strong communication, documentation More ❯
technologies Strong security professional skilled in Security Information and Event Management (SIEM), Vulnerability Management and Security Intelligence, IDAM, Digital Rights Management (DRM), Anti-APT, Data Leak Prevention (DLP), Phishing simulation tools etc Experience in managing P1 incidents Experience in managing shift roster Experience in managing day to day SOC operations activity Experience in ISO 27001, SOC 1 and More ❯
and prioritizing multiple project work streams in response to rapidly developing and changing portfolios. Broad knowledge of computer, networking and IT security systems including operating systems, databases, firewalls, SIEM, DLP etc. Good presentation, documentation and reporting skillsPreferred: Experience in project management Experience in providing assurance for cybersecurity technologies, policies, standards and procedures Ability to maintain a working knowledge of cybersecurity More ❯
and prioritising features, epics, and user stories aligned with strategy and roadmaps. Develop and review security architectures and toolsets across cloud, infrastructure, and application domains (e.g. SIEM, IAM, PAM, DLP, endpoint protection). Provide security assurance and governance across projects, ensuring alignment with frameworks such as ISO 27001, NIST, GDPR, and PCI DSS. Collaborate with enterprise, technology, and business stakeholders More ❯
attacks, through timely detection, investigation and remediation of potential threats. Role summary The Cyber Security Incident Response Manager plays a pivotal role in identifying, investigating, and managing cyber and data handling incidents within KPMG’s Global Information Security Services (ISS) function. ISS delivers and oversees critical cybersecurity capabilities—including Security Monitoring & Response (SMR), Vulnerability Assessment & Secure Development (VASD), and … security posture. Key Accountabilities Incident Detection & Response Triage alerts reported by GSOC, Global functions and KPMGs network of member firms, including clients, supply chain and from Security tooling like DLP, CASB, XDR and SIEM. Contribute to the investigation and response to cyber and data handling incidents, including misdirected emails, unauthorized data access, and policy violations. Support containment, eradication … functionally to mitigate risks and enhance our data security posture. Technical Expertise in Cybersecurity & Incident Response Experience with email security, cloud platforms, and endpoint protection. Strong understanding of DLP, CASB, SIEM, XDR and other security monitoring tools. Proven ability to manage and/or support response to complex security incidents and data breaches. Strong troubleshooting and problem-solving More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
IT security controls, frameworks and processes Overseeing BAU security operations, ensuring services are delivered efficiently and in line with SLAs Leading activity across Threat & Vulnerability Management (TVM), PAM, IAM, DLP, Network Security and Penetration Testing Managing outsourced security providers and holding them to account on performance Acting as SME for security improvement projects, aligned to ISO27001/NIST Managing security More ❯
Architect secure and scalable workplace solutions integrating cloud services (Azure, AWS). Implement endpoint management, patching, and device lifecycle strategies. 3. Security & Compliance Configure and manage security features like DLP, Safe Links, and Defender for Office 365. Enforce Zero Trust principles and privileged access management. 4. Administer email protection systems (e.g., Proofpoint) and ensure compliance with DKIM, SPF, DMARC. 5. More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid/Remote Options
Context Recruitment Limited
engineering * Some exposure to, or a growing focus on, cybersecurity and vulnerability management * Understanding of network devices, configurations and security principles * Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) * Confidence to identify issues, suggest improvements and work collaboratively across teams * A genuine passion for cyber security * Certifications such as CISSP, SC More ❯
engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest improvements and work collaboratively across teams A genuine passion for cyber security Certifications such as CISSP, SC More ❯
engineering Some exposure to, or a growing focus on, cybersecurity and vulnerability management Understanding of network devices, configurations and security principles Familiarity with common tools and concepts (e.g. SIEM, DLP, endpoint protection, firewalls, Cisco Secure Connect, etc.) Confidence to identify issues, suggest improvements and work collaboratively across teams A genuine passion for cyber security Certifications such as CISSP, SC More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Circle Recruitment
years' experience in IT support or infrastructure roles, ideally within an MSP. Strong hands-on experience with Microsoft 365 administration (essential). Familiarity with security best practices (e.g., CAP, DLP, tenancy hardening, policy management). Bonus: Experience with compliance frameworks (ISO audits, certification, policy management). Good understanding of networking principles and troubleshooting. Excellent communication skills and a proactive, team More ❯
telephony providers. Good knowledge of networking - Layer2/3, dynamic routing, MPLS and firewall management. Good knowledge of IT security practices and the implementation of tools that provide MFA, DLP, proxy services, encryption, event logging and alerting. Able to provide input to, and technical solutions to business requirements. Worked within project delivery frameworks, able to demonstrate time management and labour More ❯
telephony providers. Good knowledge of networking - Layer2/3, dynamic routing, MPLS and firewall management. Good knowledge of IT security practices and the implementation of tools that provide MFA, DLP, proxy services, encryption, event logging and alerting. Able to provide input to, and technical solutions to business requirements. Worked within project delivery frameworks, able to demonstrate time management and labour More ❯
telephony providers. Good knowledge of networking - Layer2/3, dynamic routing, MPLS and firewall management. Good knowledge of IT security practices and the implementation of tools that provide MFA, DLP, proxy services, encryption, event logging and alerting. Able to provide input to, and technical solutions to business requirements. Worked within project delivery frameworks, able to demonstrate time management and labour More ❯
cloud environments. Administer and optimise Microsoft 365 services, including Exchange Online, Teams, SharePoint Online, OneDrive , and the Compliance Centre . Implement and maintain email security controls (SPF, DKIM, DMARC, DLP, ATP). Ensure service reliability, scalability, and compliance across messaging and collaboration platforms. Provide Tier-3 technical support and act as the escalation point for complex issues. Deliver engineering-level More ❯
cloud environments. Administer and optimise Microsoft 365 services, including Exchange Online, Teams, SharePoint Online, OneDrive , and the Compliance Centre . Implement and maintain email security controls (SPF, DKIM, DMARC, DLP, ATP). Ensure service reliability, scalability, and compliance across messaging and collaboration platforms. Provide Tier-3 technical support and act as the escalation point for complex issues. Deliver engineering-level More ❯
Review estate and help plan DLP with best practice deployment Identify the types of data needed to protect (e.g., personal data, financial records, intellectual property) and determine the environments where DLP will be applied (e.g., endpoints, cloud, email, network). Conduct a thorough audit of the assets. Locate where sensitive data resides, how it is used, and … with monitoring and alerting to minimise disruption, and gradually move to blocking or quarantining actions. Test policies in a controlled environment to refine them and reduce false positives Implement DLP in phases, beginning with the most critical areas or departments. Monitor performance, gather feedback, and make adjustments. Work with the IT teams to educate employees on the importance of data protection, how DLP works, and their responsibilities. Regular training reduces accidental violations and encourages reporting of suspicious activities Support in AI Copilot readiness for protecting data in SharePoint (Linked to Data Classification rules) Randstad Technologies is acting as an Employment Business in relation to this vacancy. More ❯
Review estate and help plan DLP with best practice deployment Identify the types of data needed to protect (e.g., personal data, financial records, intellectual property) and determine the environments where DLP will be applied (e.g., endpoints, cloud, email, network). Conduct a thorough audit of the assets. Locate where sensitive data resides, how it is used, and … with monitoring and alerting to minimise disruption, and gradually move to blocking or quarantining actions. Test policies in a controlled environment to refine them and reduce false positives Implement DLP in phases, beginning with the most critical areas or departments. Monitor performance, gather feedback, and make adjustments. Work with the IT teams to educate employees on the importance of data protection, how DLP works, and their responsibilities. Regular training reduces accidental violations and encourages reporting of suspicious activities Support in AI Copilot readiness for protecting data in SharePoint (Linked to Data Classification rules) Randstad Technologies is acting as an Employment Business in relation to this vacancy. More ❯
Manchester Area, United Kingdom Hybrid/Remote Options
Gravitas Recruitment Group (Global) Ltd
hybrid cloud, and DevSecOps. Familiarity with NIST, ISO 27001, OWASP, and CIS frameworks. Experience working in a payments environment (PCI compliant) Proficiency in tools like SIEM, IDS/IPS, DLP, IAM, and encryption. Strong communication and stakeholder influence skills. Certifications such as CISSP, CCSP, CISM, or TOGAF are a plus. 🎁 What You’ll Get Salary up to £100,000 DOE More ❯
Manchester Area, United Kingdom Hybrid/Remote Options
Gravitas Recruitment Group (Global) Ltd
hybrid cloud, and DevSecOps. Familiarity with NIST, ISO 27001, OWASP, and CIS frameworks. Experience working in a payments environment (PCI compliant) Proficiency in tools like SIEM, IDS/IPS, DLP, IAM, and encryption. Strong communication and stakeholder influence skills. Certifications such as CISSP, CCSP, CISM, or TOGAF are a plus. What You’ll Get Salary up to £100,000 DOE More ❯
assessments aligned with frameworks such as Cyber Essentials, ISO27001, NIST, and CIS . Identify and Mitigate Risks: Conduct vulnerability assessments and support the implementation of MDR, Penetration Testing, and DLP services. Guide and Advise: Provide practical advice on governance, incident response, and awareness training — becoming a trusted advisor to your clients. Collaborate and Deliver: Work closely with colleagues across the More ❯