Our client is looking for a DLP Consultant to support with deploying and implementing cutting-edge DLP solutions. As a specialist, you will navigate complex data environments, ensuring the integrity and security of critical information assets. Your expertise will be crucial in the development of strategies that not only … protect data but also comply with regulatory standards. Responsibilities: - Analyse and understand client data protection needs - Design and implement DLP systems tailored to specific business requirements - Monitor and manage DLP solutions to ensure operational effectiveness - Provide technical leadership and guidance in DLP best practices - Collaborate with cross-functional … teams to integrate DLP technologies - Conduct training sessions for stakeholders on DLP policies and procedures - Stay abreast of the latest trends and advancements in data protection Skills & Experience: - Proven experience in deploying and implementing DLP solutions - Strong understanding of data protection regulations and compliance requirements - Proficiency in DLPmore »
to promote secure by design and carry out Information Security Risk Assessments (ISRA) to better manage Aviva risks against reputational damage, system outage and dataloss potentially leading to regulatory fines, as data security becomes an ever greater focus across the globe. The role will require someone … a financial services environment. Good working knowledge of one or more security technologies and domains, including, but not limited to network security, cyber security, data security, identity … and access management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerability assessment, control effectiveness review and risk assessment of more »
deploying, maintaining, and configuring various security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.). Knowledge of TCP/IP and related network protocols, including standard protocols like TCP, ARP, ICMP, DHCP, DNS, HTTP, SNMP more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
Risk functions and other colleagues. Experience 🌳Minimum 5+ years commercial experience with the following technologies/systems: o Check Point Firewall/NIDS/DLP/Anti-Virus/Identity Awareness/URL Filtering o SIEM/Splunk o Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection more »
the Information Security Risk functions and other colleagues. Experience Minimum 5+ years commercial experience with the following technologies/systems: Firewall/NIDS/DLP/Anti-Virus/Identity Awareness/URL Filtering SIEM Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection technologies Vulnerability Security Scanning more »
of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerability management, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent communication skills Exceptional prioritisation more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial experience with the following technologies/systems: Check Point Firewall/NIDS/DLP/Anti-Virus/Identity Awareness/URL Filtering SIEM/Splunk Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection technologies Vulnerability more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
of the SEIM and SOC Partners. Experience Minimum 5+ years commercial experience with the following technologies/systems: Check Point Firewall/NIDS/DLP/Anti-Virus/Identity Awareness/URL Filtering SIEM/Splunk Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection technologies Vulnerability more »
/IEC 62443, ISO/IEC 27001/27002, GDPR.Working knowledge of security technologies including SIEM, SOAR, EDR, AV, IDS/IPS, NAC, AD, DLP, Web Filtering, Email Filtering, Behavioural Analytics.Knowledge of adversarial tactics, techniques, procedures (TTPs) and industry standard frameworks (Mitre ATT&CK). Experience working within a regulated more »
control any risks identified (KRI/KPI reporting Extensive technical working knowledge of the following systems including: o Network and Endpoint UTM (FW, AV, DLP, etc) o Authentication technologies (AD, IDP, Cisco, MFA/2FA etc) o Network Access Management o Privilege/Role Based Access Management. o Vulnerability and more »
is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and … internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience … auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware, IDS/IPS, SIEM, SMTP, Email security, AD, Group Policy, DNS, DHCP, and VLANs. Experience with identity access management solutions, such as SAMLOATH Experience more »
Experience of infrastructure management within a cloud-based environment. o Experience of modern Information Security Operations, from backup & patching through to identify management and dataloss prevention. more »
monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work more »
AWS, MS Sentinel and Defender Good understanding of Security Operations and related security tools such as Firewalls, VPN Gateway, SIEM, SOAR, EDR, MDR, UEBA, DLP Good understanding and practical experience of Cyber Security Frameworks and standards such as NCSC security principles, NIST Framework, ISO 27001, ISO27005, IEC62443 etc. Experience and more »
suite, including Word, PowerPoint, Excel, OneNote, MS Teams, OneDrive, SharePoint Online. Knowledge of Microsoft security, compliance, and identity tools such as Azure Information Protection, DLP, Security Centre, Compliance Centre, Retention Policies. Familiarity with AvePoint (M365 backup), Windows 10 Lifecycle Management, Modern Endpoint Management, Intune, PowerShell Scripting, Multiple Domain AD Environments more »
escalations, as well as ensuring processes are documented in line with ISO27001 Manage technical risks via vulnerability management oversight & gap analysis, whilst also overseeing DLP alerts and creating reports What skills do you need as an Information Security Analyst? ISO27001 NIST Supplier onboarding Generating metrics & dashboards The ability to work more »
environment. Working knowledge and/or general understanding of technology methodologies such as ITIL Profound understanding and working experience in the security area (SASE, DLP, CASB, SaaS API and SAAS inline, IDS/IPS, Sandboxing, etc…) Knowledge and working experience in: Routing and switching on various platforms up to engineering more »
party Software Systems including Glovia G2 (or experience with another ERP system), Rubrik Backup, Citrix, Windows RDS, Ivanti management suite and Service desk, and DLP solutions. Hardware solutions including SAN, Servers, Desktops, and Laptops. Experience with VOIP and Microsoft Teams Phone Systems. The Package The salary offered for this position more »
party Software Systems including Glovia G2 (or experience with another ERP system), Rubrik Backup, Citrix, Windows RDS, Ivanti management suite and Service desk, and DLP solutions. Hardware solutions including SAN, Servers, Desktops, and Laptops. Experience with VOIP and Microsoft Teams Phone Systems. The Package The salary offered for this position more »
experience. Business Knowledge: Knowledge of Retail and eCommerce is of great advantage but is not essential. Working knowledge of the Information Security elements of Data Protection regulations (e.g. GDPR, The Data Protection Act 2018) is essential. Knowledge of the NIST Cyber Security Framework is of advantage. Awareness of more »
policies and standards to ensure adherence to regulatory requirements and industry best practices. Design, implement, and maintain security architectures that protect our systems and data from cybersecurity threats and vulnerabilities. Lead threat detection and response efforts, including monitoring and analyzing security events, investigating incidents, and implementing remediation measures. Develop … security architectures for complex IT environments, including cloud-based and hybrid infrastructures. Experience with security technologies and tools such as SIEM, IDS/IPS, DLP, WAF, MFA, etc. Excellent analytical, problem-solving, and decision-making skills, with the ability to prioritize and manage multiple tasks and projects effectively. Strong communication more »
similarly regulated industry sector Strong understanding of impending Cyber threats and how to defend against them Detailed understanding of Cyber Security compliance Experience in Data Leakage prevention Background in working closely with 1st line of defence teams whilst being a 2nd line of defence Cyber Security expert Security more »