experience and is a SME in this area Background skills required. • Policy Enforcement: Implement Conditional Access, MFA, and DLP policies. Maintain security posture using Secure Score and Compliance Manager • ZeroTrust Network: Contribute to AD and security-related configurations supporting ZeroTrust principles and related BAU work. • ServiceNow Ticketing: Handle incidents, service requests, and mini projects. More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud Firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯
integration, threat intelligence, and monitoring to continuously improve detection and response capabilities. Manage hybrid environments, including Azure, AWS, Nutanix, and on-premise infrastructure. Support SD-WAN, cloud Firewalls, CASB, ZeroTrust, and SASE architectures. Own enterprise security risk assessments, track key risk indicators (KRIs), and report on cyber maturity to executive leadership. Drive security culture through training, phishing … programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in ZeroTrust security models. Experienced in security tooling selection and implementation. Deep understanding of data protection legislation, risk management frameworks, and compliance requirements. Exceptional leadership, stakeholder engagement, and influencing More ❯
Azure, AWS). Implement endpoint management, patching, and device lifecycle strategies. 3. Security & Compliance Configure and manage security features like DLP, Safe Links, and Defender for Office 365. Enforce ZeroTrust principles and privileged access management. 4. Administer email protection systems (e.g., Proofpoint) and ensure compliance with DKIM, SPF, DMARC. 5. Automation & Optimization Automate onboarding/offboarding workflows More ❯