The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity … analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is essential. Responsibilities: Collaborate with IT teams for input … as NIST, etc., implementing and auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience with HIDS and NIDS The More ❯
Implement security hardening for critical Azure applications and access controls. Redesign Azure network security architecture with tools like Azure Firewall and NSGs. Implement Microsoft Purview for data governance, DLP, and compliance policies. Conduct security assessments to address vulnerabilities and misconfigurations. Oversee Azure IAM, including Azure AD and Conditional Access. Automate security tasks using IaC tools and scripting. Provide training More ❯
Intune for endpoint security, compliance, and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring DataLossPrevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture by managing security configurations across … and conduct forensic investigations when needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and security audits. Define data protection, backup, and retention policies aligned with Microsoft 365 compliance tools. 5. Network Security & Infrastructure Protection (Plus Skills) Experience with Layer 7 firewalls (Cisco, Fortinet, Palo Alto, Sophos), VPNs More ❯
United, Pennsylvania, United States Hybrid / WFH Options
Optiv
customers with developing technical requirements, evaluating SSE solutions, and developing architecture & design. Understand System integration with SSO/IAM, EDR, SIEM, SOAR, MDM. Create evaluation test plans and implement DLP solutions Working closely with customers and their Technical Team User Acceptance Testing and bug-related engineering efforts. Design, implement and educate on specific technology build processes, policy migration, and third … . Technical Skills & Knowledge Security Technologies: Proficient with CASB, SWG, Next-Gen Firewalls (NGFW), IPsec/GRE tunneling, Reverse Proxies, SSO/SAML, DataLossPrevention (DLP), and Zero Trust Network Access (ZTNA). Networking & Operating Systems: Strong grasp of networking fundamentals (TCP/IP, OSI model). Experience administering Windows, macOS/iOS, and UNIX/… Scripting: Proficiency in at least one scripting language (e.g., Python, Perl, Bash, Java). Security Principles, Compliance & Frameworks Security Fundamentals: Solid understanding of general security principles including vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures, and governance. Regulatory Compliance: Strong grasp of requirements impacting clients (e.g., PCI DSS, GLBA, GDPR, CCPA, state More ❯
Phoenix, Arizona, United States Hybrid / WFH Options
Optiv
customers with developing technical requirements, evaluating SSE solutions, and developing architecture & design. Understand System integration with SSO/IAM, EDR, SIEM, SOAR, MDM. Create evaluation test plans and implement DLP solutions Working closely with customers and their Technical Team User Acceptance Testing and bug-related engineering efforts. Design, implement and educate on specific technology build processes, policy migration, and third … . Technical Skills & Knowledge Security Technologies: Proficient with CASB, SWG, Next-Gen Firewalls (NGFW), IPsec/GRE tunneling, Reverse Proxies, SSO/SAML, DataLossPrevention (DLP), and Zero Trust Network Access (ZTNA). Networking & Operating Systems: Strong grasp of networking fundamentals (TCP/IP, OSI model). Experience administering Windows, macOS/iOS, and UNIX/… Scripting: Proficiency in at least one scripting language (e.g., Python, Perl, Bash, Java). Security Principles, Compliance & Frameworks Security Fundamentals: Solid understanding of general security principles including vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures, and governance. Regulatory Compliance: Strong grasp of requirements impacting clients (e.g., PCI DSS, GLBA, GDPR, CCPA, state More ❯
systems, ensuring an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works … closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to … required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions such as SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze More ❯
teams, making the most of a SecOps approach. Mentoring: You'll provide guidance and support to less experienced team members, helping them grow. DataLossPrevention (DLP): You'll monitor, maintain, and enhance our DLP controls across email, endpoints, and cloud services. Data-Centric Security: You'll champion a data-centric security approach, making sure … data classification, handling, and protection are embedded from design to deployment. Zero Trust: You'll promote and support Zero Trust Architecture principles, continuously verifying identities, devices, and access requests. Security Awareness: You'll develop and maintain internal security awareness materials to educate our staff on evolving threats. Attack Simulation: You'll contribute to planning and delivering attack simulation training More ❯
New York City (Manhattan), New York, United States Hybrid / WFH Options
Early Warning Services
Staff Engineer - Network Security plays a pivotal role in designing, implementing, and maintaining enterprise network security infrastructure, with a focus on proxy and datalossprevention (DLP) solutions. This role leads control testing to ensure adherence to industry standards while working with audit and compliance teams to meet regulatory requirements. Essential Functions: Develops, implements, and optimizes proxy … and DLP solutions to protect sensitive data and ensure secure network access. Serves as the subject matter expert (SME) for proxy and DLP solutions, providing strategic and technical guidance to engineering teams, stakeholders, and leadership. Deploys and integrates security solutions from vendors such as Microsoft, Palo Alto, and Netskope into existing and new network environments. Proactively collaborates with audit … and compliance teams to ensure all proxy and DLP solutions comply with regulatory requirements (e.g., PCI DSS, SOX, NYDFS). Designs, implements, and tests security controls to meet compliance standards, ensuring alignment with governance policies. Oversees the health, performance, and reliability of proxy and DLP systems, proactively identifying and resolving issues. Consults with security and governance teams to define, implement More ❯
Los Angeles (Downtown), California, United States Hybrid / WFH Options
Early Warning Services
Staff Engineer - Network Security plays a pivotal role in designing, implementing, and maintaining enterprise network security infrastructure, with a focus on proxy and datalossprevention (DLP) solutions. This role leads control testing to ensure adherence to industry standards while working with audit and compliance teams to meet regulatory requirements. Essential Functions: Develops, implements, and optimizes proxy … and DLP solutions to protect sensitive data and ensure secure network access. Serves as the subject matter expert (SME) for proxy and DLP solutions, providing strategic and technical guidance to engineering teams, stakeholders, and leadership. Deploys and integrates security solutions from vendors such as Microsoft, Palo Alto, and Netskope into existing and new network environments. Proactively collaborates with audit … and compliance teams to ensure all proxy and DLP solutions comply with regulatory requirements (e.g., PCI DSS, SOX, NYDFS). Designs, implements, and tests security controls to meet compliance standards, ensuring alignment with governance policies. Oversees the health, performance, and reliability of proxy and DLP systems, proactively identifying and resolving issues. Consults with security and governance teams to define, implement More ❯
San Francisco, California, United States Hybrid / WFH Options
Early Warning Services
employment Visa sponsorship. The Staff Engineer - Network Security plays a pivotal role in designing, implementing, and maintaining enterprise network security infrastructure, with a focus onproxyanddata lossprevention (DLP)solutions. This role leads control testing to ensure adherence to industry standards while working withaudit and compliance teamsto meet regulatory requirements. Essential Functions: Develops, implements, and optimizes proxy and DLP … solutions to protect sensitive data and ensure secure network access. Serves as the subject matter expert (SME) for proxy and DLP solutions, providing strategic and technical guidance to engineering teams, stakeholders, and leadership. Deploys and integrates security solutions from vendors such asMicrosoft,Palo Alto, andNetskopeinto existing and new network environments. Proactively collaborates withaudit and compliance teamsto ensure all proxy … and DLP solutions comply with regulatory requirements (e.g., PCI DSS, SOX, NYDFS). Designs, implements, and tests security controls to meet compliance standards, ensuring alignment with governance policies. Oversees the health, performance, and reliability of proxy and DLP systems, proactively identifying and resolving issues. Consults with security and governance teams to define, implement, and enforce security policies and configurations. Advises More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aerospace Corporation
solvers, thought leaders, and innovators. Join us and take your place in space. Job Summary The Chief Information Security Office (CISO) is chartered with securing enterprise information systems and data to deliver mission success. We are looking for an experienced Senior Cybersecurity Engineer to utilize threat intelligence to defend against cyber threat and increase the overall security of the … Be Doing Work with cross-functional internal and external teams to secure the corporation from Advanced Persistent Threats (APT's), nation-state actors and protect against insider threat and data leakages Participate in strategic security relationships between internal resources and external entities including government, customers, vendors and partner organizations to gather threat intelligence, perform risk-based analysis and oversee … highly motivated cyber threat actors Hands-on experience working with Network & Cloud Security technologies to protect enterprise environments, such as: Firewalls, protective DNS, DataLossPrevention (DLP), Intrusion detection/intrusion prevention systems, Security Information & Event Management (SIEM) platforms, log aggregation, anomaly detection, privileged access management, Endpoint Device Management Working knowledge of NIST SP More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
Company Description Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, create marketing solutions, and gain deeper insights into the automotive market, all using our unique combination of data, analytics and software. We also assist millions of people … common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs), and common industry recommendations to prevent and respond to threats such as phishing, malware, network attacks, suspicious activity, data security incidents. Exposure to technical elements of common Operating Systems (Windows, Linux, Mac OS), Networking (Firewalls, Proxies, NetFlow), Cloud Infrastructure (AWS, Azure, GCP), and Security Technologies (Anti-Virus, Intrusion … knowledge of network and host security technologies and products (such as firewalls, network IDS, scanners) and improve these skills Security monitoring technologies, such as SIEM, IPS/IDS, UEBA, DLP, among others Scripting and automation Additional Information Benefits package includes: Flexible work environment, working hybrid or in the office if you prefer. Great compensation package and discretionary bonus plan Core More ❯
data. The ideal candidate will have a deep understanding of cybersecurity threats, risk management frameworks, regulatory compliance, and modern security technologies. This role also includes responsibilities typical of a Data Protection Officer, ensuring that data privacy and governance meet the high regulatory standards of the financial sector. Responsibilities: Strategic Management and Security Operations Develop, implement, and maintain information … with business objectives. Lead risk assessments and threat modelling exercises for internal systems and third-party services. Manage the deployment and maintenance of security solutions (SIEM, firewalls, endpoint protection, DLP, etc.). Oversee the organization's incident response and business continuity plans, including simulations and real-time responses. Conduct regular security audits and work with internal/external auditors to … secure systems development and operations. Compliance & Risk Management Ensure compliance with regulatory and legal security requirements (e.g., ISO 27001, NIST, HIPAA, GDPR, SOX, etc.). Ensure compliance with applicable data protection laws (e.g., GDPR, CCPA, GLBA). Guide Data Protection Impact Assessments (DPIAs) for high-risk financial data processing activities. Work closely with Legal, Risk, and Compliance More ❯
and implement security controls across Microsoft 365, Azure, Dynamics 365, Kubernetes (AKS), and AI/ML workloads. Lead the design and deployment of conditional access, Defender for Cloud, Purview DLP, Azure Firewall, and related services. Integrate security into DevOps pipelines, CI/CD, infrastructure-as-code, and container work flows. Automate threat detection and response using Microsoft Sentinel SOAR, custom … through Intune, ensuring device compliance and integration with Zero Trust. Harden AKS clusters and cloud-native apps through role-based access control (RBAC), secrets management, and runtime protection. Secure data pipelines and models in AI workloads, implementing guardrails for model integrity and prompt injection defence. Cloud & Network Security Engineer secure access and posture for Cisco Meraki infrastructure and Umbrella … security problems through systems thinking and automation. Strategic, yet pragmatic: balances best practice with business context. Proactive, communicative, and passionate about elevating security posture through innovation. MS Engineer & MS Data Scientist Associate Ability to exercise independent judgment and act on it. Benefits for our U.K. teams include: The choice to work flexibly from home and the office, in line More ❯
are looking for: A passionate technology focused individual, with an honest and empathic approach to customer conversations. You will have hands on experience with a variety of technologies in datalossprevention and a keen interest in emerging security technologies. You will be excited to join a growing team of consultants focused on helping our customers achieve … a range of industries, whilst also collaborating closely with internal teams across Bridewell. Your core focus will be leading the delivery of Microsoft Purview solutions - helping clients navigate complex data governance, compliance, and risk management requirements. From auditing and optimising existing deployments to designing and implementing scalable compliance architectures, you will provide strategic and technical oversight across projects, acting … need to have all the following: A people-first approach to team management. Demonstrable experience with Microsoft Purview across core compliance areas, including: DataLossPrevention (DLP) Information Protection (Sensitivity Labels, encryption, etc.) Insider Risk Management eDiscovery & Communication Compliance Data Lifecycle Management & Records Management Information Barriers Demonstrable experience with Azure and Microsoft cloud services. A passion More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
NST Recruitment Limited
Cloud Security Engineer – M365, Azure, E5, CIS , Investigations, Zscaler, DLP, EntraID, Purview, Best Practices, Email, Darktrace, Network, Server Hardening, SecOps, Best Practice, Risk, Financial Services, Infrastructure, InfoSec, MFA, MDM, Encryption, Firewalls, Governance, Microsoft, Windows, O365, Defender, Hybrid (2d/week Liverpool) Outside IR35 This is a fantastic Cloud Security Engineer contract opportunity to join a leading tech organisation. The Cloud … all things InfoSec related regarding Windows, Microsoft 365, Office 365, Azure, SharePoint environments, firewalls etc is essential as Cloud Security Engineer including Networking and Server Hardening etc. Experience with DLP (DataLossPrevention) is essential as Cloud Security Engineer with knowledge of Zscaler being essential, Darktrace is a bonus. Knowledge of best practices and procedures in relation … Microsoft Certifications Azure Certifications InfoSec Certifications This is an exceptional Cloud Security Engineer opportunity with exciting projects and longevity on offer. Key skills: M365, Azure, E5, CIS, Investigations, Zscaler, DLP, EntraID, Purview, Best Practices, Email, Darktrace, Network, Server Hardening, SecOps, Best Practice, Risk, Financial Services, Infrastructure, InfoSec, MFA, MDM, Encryption, Firewalls, Governance, Microsoft, Windows, O365, Defender, Hybrid (2d/week More ❯
in advisory capacity, to external audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) Vulnerability Management Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure DevOps (Scrum principles, Release Pipelines) Knowledge of Mitre Attack Framework ITIL (Supervising … independent thinking and want everyone to share their ideas. Working alongside employers, trustees and financial services institutions, we offer pensions, investments, benefits and risk consulting services, as well as data and technology solutions. With over 1000 employees and counting, we're one of the leading consultancies in our field and are proud to be recognised by numerous industry awards. More ❯
OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, DataLossPrevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. More ❯
London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
OPA/Gatekeeper, Kubernetes Admission Controllers. Background in red teaming or adversary simulation (MITRE Caldera, Atomic Red Team). Experience working with BigQuery, DataLossPrevention (DLP) tools, and Key Management Systems (KMS). Why This Role? Work directly with engineering, DevSecOps, and compliance leadership. Lead cybersecurity strategy and execution in a cloud-native, greenfield fintech platform. More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
Job summary Join our dynamic Digital, Data and Technology (DDaT) team at NHSBSA as a Cyber Security Operations Team Lead. You'll lead a team of specialists, manage security operations, and support various projects and initiatives. Your role involves ensuring compliance with security standards, managing incidents, and collaborating with internal and external stakeholders. Key Responsibilities : Lead and manage the … with Information Security Standards ISO27001, NHS DSPT, NCSC CAF 4.Experience of managing security technologies including; firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP 5.Designing and recommending appropriate controls to enable the achievement of Cyber security and wider business goals. Desirable 1.Evaluation of threat intelligence data from multiple sources to inform decision making. More ❯
Preferred Qualifications: Zscaler Certified Cloud Administrator (ZCCA) or Zscaler Certified Cloud Professional (ZCCP) preferred. Experience with scripting and automation (Python, PowerShell, etc.). Knowledge of other security technologies (CASB, DLP, Zero Trust frameworks, etc.). Experience in a managed services or enterprise IT support environment. Other information Why Join Us? Work with cutting-edge cloud security technologies. Collaborative and dynamic More ❯
manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cyber … industry knowledge and expertise. * Management and analysis of security information and event management systems to collect, correlate and analyse security logs, events and alerts/potential threats. * Triage of datalossprevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. * Management of cyber security incidents including remediation & driving to closure. … function. * Collaborate with other areas of work, for business aligned support areas to keep up to speed with business activity and the business strategy. * Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc).to solve problems creatively and effectively. * Communicate complex information. More ❯
a pioneer in providing reliable, secure, quality connections for machine to Machine (M2M) and Internet of Things (IoT) systems worldwide. The company has a strong track record of delivering data, remote diagnostics, and improving services while reducing maintenance costs. Mobius Networks offers a select range of networks known for their security, reliability, and availability, setting them apart in the … and Response Web & email filtering Firewalls (Cisco ASA, Firepower preferred others beneficial) Managed Wi-Fi solutions (Cisco Meraki) Two-factor authentication (RSA, Authenticator apps) Data Leakage Prevention (DLP) Desirable skills: CCNA or CCNP certification RADIUS: Experience with Steel-Belted RADIUS, FreeRADIUS, or nuRADIUS Database Management: Basic knowledge of MS SQL Security Appliances: Experience with filtering solutions, RSA authentication … and Data Leakage Prevention (DLP) SIEM solution exposure What Will Make You Shine at Mobius Strong multitasking with capability to manage and prioritise workloads effectively and efficiently. Excellent communication skills, especially in customer relations when designing or troubleshooting. Strong analytical and problem-solving skills with a methodical approach to identifying root causes. Self-motivated with a continuous desire More ❯
Coalville, England, United Kingdom Hybrid / WFH Options
Mobius Networks Limited
a pioneer in providing reliable, secure, quality connections for machine to Machine (M2M) and Internet of Things (IoT) systems worldwide. The company has a strong track record of delivering data, remote diagnostics, and improving services while reducing maintenance costs. Mobius Networks offers a select range of networks known for their security, reliability, and availability, setting them apart in the … and Response Web & email filtering Firewalls (Cisco ASA, Firepower preferred others beneficial) Managed Wi-Fi solutions (Cisco Meraki) Two-factor authentication (RSA, Authenticator apps) Data Leakage Prevention (DLP) Desirable skills: CCNA or CCNP certification RADIUS: Experience with Steel-Belted RADIUS, FreeRADIUS, or nuRADIUS Database Management: Basic knowledge of MS SQL Security Appliances: Experience with filtering solutions, RSA authentication … and Data Leakage Prevention (DLP) SIEM solution exposure What Will Make You Shine at Mobius Strong multitasking with capability to manage and prioritise workloads effectively and efficiently. Excellent communication skills, especially in customer relations when designing or troubleshooting. Strong analytical and problem-solving skills with a methodical approach to identifying root causes. Self-motivated with a continuous desire More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
detect and mitigate malicious activities using tools like Sysinternals, Wireshark, and TCPDump. Log analysis across OS, web applications, network devices, and security tools (e.g., Anti-malware, EDR, IDS, WAF, DLP). Research and Intelligence Gathering: Proficiency in OSINT tools like Shodan and VirusTotal. Cloud Security Knowledge Knowledge of cloud technologies and security (e.g., AWS, Azure, Alibaba, Google Cloud), with skills … essential OS Security Knowledge Knowledge of operating systems, OS-level exploits, and cybersecurity for Windows and Linux, including OS hardening techniques. Application Security Knowledge Familiarity with application-level attacks, prevention methods, hardening configurations, and log analysis for applications like web applications and databases is desirable An understanding of malware behaviour, persistence mechanisms, and the ability to perform static and More ❯