Worcestershire, West Midlands, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
business change elements excellent stakeholder management abilities at all levels of business user and management of third party resource Cyber Security, Business Continuity Management, DataLossPrevention are all highly advantageous but not essential. Hybrid role with 2/3 days a week on site. 6 month More ❯
is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and … internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience … auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirus/antimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
DGH Recruitment
coach and mentor the Cyber Security and Infrastructure teams. Ownership of the strategies and roadmaps for cyber security capabilities. This includes email security/DLP, SASE/SWG/CASB, SIEM, etc. Ownership of the strategies and roadmaps for infrastructure, including LANs, WANs, PAAS/SAAS and other cloud services More ❯
City of London, London, United Kingdom Hybrid / WFH Options
DGH Recruitment
coach and mentor the Cyber Security and Infrastructure teams. Ownership of the strategies and roadmaps for cyber security capabilities. This includes email security/DLP, SASE/SWG/CASB, SIEM, etc. - Ownership of the strategies and roadmaps for infrastructure, including LANs, WANs, PAAS/SAAS and other cloud services More ❯
City of London, Greater London, United Kingdom Hybrid / WFH Options
Deltra Group
or related technical role Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering, and vulnerability management Proficient in cloud services, especially in environments using virtual machines, identity management, web apps, and networking components (e.g., virtual networks More ❯
Shepherdswell, Kent, United Kingdom Hybrid / WFH Options
Migrant Help
the organisational objectives Skills and experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and Vulnerability Management Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security More ❯
Dover, Kent, South East, United Kingdom Hybrid / WFH Options
Migrant Help
the organisational objectives Skills and experience we are looking for in our Information Security Officer: Proficiency in security domains, tools and technologies such as DLP, SIEM, SOAR and Vulnerability Management Good working knowledge of network security, firewalls, threat management, endpoint detection and response Ability to identify, assess, and mitigate security More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Dark Wolf Solutions
to: Designing, testing, and implementing secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, lossprevention, and eDiscovery actions. Conducting risk and vulnerability assessment at the network, system and application level. Conducting threat modeling exercises. Developing and implementing … and formulating operational risk mitigations along with assisting in security awareness programs. Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Researching, evaluating and recommending new security tools, techniques, and technologies and introducing them to the enterprise in alignment with IT More ❯
in working with customers, demonstrating problem-solving skills and a can-do attitude. Solid understanding of NGFW, Network Security, SASE, SD-WAN, CASB, Proxy, DLP and BYOD Solutions. Advanced knowledge of On-Premise and Cloud-Delivered Network Security Technologies. Proficient in English. The Team Our Domain Consultant team members work More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Accenture
/cyber security role focused on security monitoring and analysis. Knowledge of IT security solutions (Security Information and Event Management, Cloud Access Security Broker, Data Leakage Prevention, Web Application Firewall, Multi Factor Authentication, Data Rights Management, Identity Access/Privileged Access Management, etc.). At least More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
La International
and execute data scanning and labelling (AIP labelling, auto-labelling, and client-side labelling strategies to enhance data protection. * Develop and implement DLP policies and controls to prevent data exfiltration and ensure compliance. * Provide technical leadership and mentorship to junior architects and engineers. * Collaborate with security, compliance … or data governance. * Good experience working with Microsoft Purview (formerly Microsoft Compliance & Security solutions). * Strong expertise in data classification, labelling, and DLP solutions. * Hands-on experience with Microsoft 365 Compliance Center, Information Protection, and Endpoint DLP. * Expertise with SharePoint Online, Teams, OneDrive, and other Microsoft applications. * Deep … understanding of data scanning and discovery across structured and unstructured environments. * Strong proficiency in Microsoft Defender for Cloud, Microsoft 365 Security & Compliance, and Azure Information Protection (AIP). * Experience with PowerShell scripting and automation for Purview configurations. * Strong knowledge of cloud security, Zero Trust principles, and Microsoft Security solutions. More ❯
and best practice Required Skills & Experience: 3+ years of experience in a cybersecurity engineering or related technical role Solid understanding of information security regulations, data … protection, and cyber law Strong troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerability management Proficient in cloud services , especially in environments using virtual machines, identity management, web apps , and networking components (e.g., virtual networks More ❯
right technology for the job so we're always interested in considering other solutions. macOS and ChromeOS Google Workspace, including security elements such as DLP and device management Jamf Pro (including Protect, Connect, and Security Cloud) Make for automation tooling Slack 1Password Atlassian (Jira & Confluence) About You This is an More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
network. You'll also help manage endpoint security, check system health, and work with our infrastructure team to keep everything running smoothly. Incident Response & Prevention - When security incidents happen, you’ll investigate, assess the impact, and take action to contain threats. You'll also work on automating routine tasks … Microsoft Azure, Entra ID, Defender XDR, Azure Sentinel, Cloudflare, and Mimecast. You should also be comfortable working with security tools like firewalls, IDS, WAF, DLP, IAM, and MFA across platforms such as Windows, Linux, VMware, and AKS. Strong communication skills, problem-solving abilities, and a proactive mindset are key. If More ❯
welwyn garden city, east anglia, united kingdom Hybrid / WFH Options
PayPoint plc
network. You'll also help manage endpoint security, check system health, and work with our infrastructure team to keep everything running smoothly. Incident Response & Prevention - When security incidents happen, you’ll investigate, assess the impact, and take action to contain threats. You'll also work on automating routine tasks … Microsoft Azure, Entra ID, Defender XDR, Azure Sentinel, Cloudflare, and Mimecast. You should also be comfortable working with security tools like firewalls, IDS, WAF, DLP, IAM, and MFA across platforms such as Windows, Linux, VMware, and AKS. Strong communication skills, problem-solving abilities, and a proactive mindset are key. If More ❯
City, Aberdeen, United Kingdom Hybrid / WFH Options
Baker Hughes Gruppe
management, proxy server management, security ingress/egress management, domain trusts posture, SSL/IPsec, security incident and event management (SIEM), data protection (DLP, encryption), and password/key management, vulnerability/threat assessment. Collaborating with security team members to develop all M&A security requirements for all hardware … services, European Cybersecurity act). Keeping up to date with changing European and other regional regulations, directives, and standards that impact IT operations, including data privacy, cybersecurity, and technology governance. Monitoring regulatory developments, assessing their impact on the company's IT practices, and ensuring proactive compliance. Working closely with More ❯
Glasgow, Renfrewshire, United Kingdom Hybrid / WFH Options
Hymans Robertson LLP
audits and due diligence questionnaires. Key Technologies: Strong practical knowledge of M365 stack from a security perspective (Defender, Azure) Vulnerability Management Web Application Filtering DLP Cloudflare Secure File Transfer Firewalls Remote Access/VPN PKI Infrastructure DNS Email Gateways Security Audits ISO27001 Azure DevOps (Scrum principles, Release Pipelines) Knowledge of … to share their ideas. Working alongside employers, trustees and financial services institutions, we offer pensions, investments, benefits and risk consulting services, as well as data and technology solutions. With over 1000 employees and counting, we're one of the leading consultancies in our field and are proud to be More ❯
San Diego, California, United States Hybrid / WFH Options
Rigid Tactical
policy. Compute and document students' grades at grading period intervals applicable to each program of instruction per the Test Plan. Maintain test item analysis data in accordance with current directives. Serve as subject matter expert for test construction, test item analysis, and test review boards. Maintain test security; ensure … assigned to a particular classroom/lab and submits shortage list to the COR's designated representative. Instructors shall comply with physical security and lossprevention policies to ensure their students do not remove any unauthorized materials from restricted areas. Contractors shall be assigned collateral duties as Inert More ❯
Two Circles is a global sports agency. We drive growth for sports properties by delivering deeper connections with fans, through the intelligent use of data and technology. We work with some of the world's biggest sports organisations - including the NFL, Premier League, Formula 1, AFL, Wimbledon and UEFA … have a team of over 950 Two Circlers working from 14 cities across APAC, North America, and EMEA, serving our expanding international client base. Data is at the centre of our approach - helping clients to get a better understanding of their customers and deliver insights that influence top-level … UK GDPR, EU GDPR, and PECR Experience with ISO 27XXX frameworks Risk Management and governance Understanding of technical implementations of data protection practices (DLP, backups, MS Purview, MS Endpoint Manager/Intune) Tailoring advice through the lens of risk management to the particular audience Understanding Security by Design and More ❯
position within a large, complex, and technologically diverse organization. Proficiency in deploying, maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. More ❯
certification and manage the ISMS lifecycle. Governance, Risk & Compliance: Perform regular risk assessments, manage remediation plans, and conduct internal audits. Ensure compliance with data protection laws (e.g., GDPR) and customer security requirements. Policies, Processes & Training: Create and manage information security policies, standards, and procedures. Deliver internal training, onboarding, and … and experience maintaining or achieving certification. Understanding of cloud environments (AWS preferred) and common SaaS security risks. Hands-on knowledge of endpoint protection, SIEMs, DLP, IAM, and SSO. Clear understanding of data privacy laws (especially GDPR). Familiarity with security tools (e.g., endpoint protection, SSO/IAM, monitoring/ More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
Engineer to play a key role in strengthening their global security posture. As a subject matter expert, you’ll lead initiatives across network, cloud, data, and system security guiding critical IT projects, running threat models for complex systems, and building automation to validate controls and resilience. You'll act … ready to take the lead in a cutting-edge fintech environment. Key Responsibilities Enhance security across critical domains including network, system, cloud, email, and data security. Act as a trusted security advisor on IT projects, embedding security from the ground up and mitigating risks. Lead the design and development … validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
Compliance & Identity Engineer). You will have a proven track record in supporting and managing Microsoft's Compliance & Identity products including Entra ID and DLP and enjoy working with a variety of technologies and people. This is a great role for someone who wishes to further their career by helping … and ServiceNow (preferable) Technologies Entra ID Azure AD Connect Enterprise Applications/App Registrations (essential) Azure RBAC SSO Integrations Conditional Access Compliance (Purview) AIP DLP E-Discovery Interview process This will be a one stage interview process consisting of competency and technical questions. Working Schedule We are based in Bristol More ❯
is no time to sponsor or wait for clearance to be obtained. What You'll Be Doing: Deploying and supporting Prisma Access, CASB, and DLP across enterprise networks Designing and implementing secure SASE architectures aligned to client roadmaps Partnering with internal and external teams to ensure successful solution delivery Configuring … implementation and BAU engineering (GlobalProtect/SD-WAN) Ideally PCNSE certified 5+ years in network/security engineering with SASE technologies Experience with CASB, DLP, and enterprise-scale rollouts Expertise in Palo Alto firewalls, VPN tuning, LAN/WAN technologies Excellent understanding of internet protocols and enterprise applications Strong stakeholder More ❯