Purview DLP Specialist/Threat Engineering Lead L3 Insider Threat Engineering Lead £750 Per Day Inside IR35 6 Months Hybrid (3 Days In London Per Week) We are seeking an experienced and dynamic leader to drive our Insider Threat Engineering team with a strong focus on DataLossPrevention (DLP). This is a pivotal role within our Cyber Defence team, responsible for leading and enhancing our DLP platform across a globally distributed and culturally diverse engineering team. The ideal candidate will have extensive hands-on experience with DLP platforms, insider risk management (IRM), and a … proven track record in managing high-performing teams in large enterprise environments. As the L3 Insider Threat Engineering Lead - DLP, you will be at the forefront of shaping and executing our data protection strategy, with a particular emphasis on Microsoft Security technologies, including Purview DLP , Defender , IRM , and Microsoft More ❯
Insider Threat Engineering Lead - DLP Fully Remote The Client: A leading insurance firm is looking for an DLP-Insider Threat Engineering Lead Day Rate : Up to £850 Inside Duration: 6 Months Rolling Contract Role: We are seeking passionate people to grow the Cyber Security team and provide an excellent service … As part of the Cyber Defence department, this role will manage the Insider Threat engineering team aligned to DataLossPrevention (DLP) and will manage a geographically and culturally diverse team of engineers to ensure the effective operation of our DLP platform. Reporting to the Global Head … of Insider Threat, the L3 Insider Threat Engineering Lead - DLP role is critical to the success of the DLP capability within the company. Key Responsibilities: Accountability for the technical management, troubleshooting and administration of the DLP platform. Lead and manage the Insider Threat Engineering team aligned to DLP - a geographically More ❯
PBEE). PensionBee is growing at scale and we are seeking a highly skilled Information Security Officer to support our global Information Security and data compliance initiatives. This role will be integral to our Information Security and IT Operations Team, ensuring adherence to cybersecurity frameworks, data protection regulations … Information Security Officer who not only understands security frameworks, standards and best practices but can also simplify and unify complex IT, Information Security, and Data Privacy processes to enhance adoption across the business. The ideal candidate will work closely with various teams to implement security measures that are both … IT risk management and security control implementation. Knowledge of network security, cloud security, and security operations. Experience with DataLossPrevention (DLP) controls to protect sensitive information. Strong analytical, problem-solving, and communication skills, with the ability to explain security concepts to both technical and non-technical More ❯
pioneer of the Connected Operations Cloud, which is a platform that enables organizations that depend on physical operations to harness Internet of Things (IoT) data to develop actionable insights and improve their operations. At Samsara, we are helping improve the safety, efficiency and sustainability of the physical operations that … will: Contribute to the development, deployment, and management of Samsara's enterprise security program, including endpoint detection and response, vulnerability management, zero trust workflows, datalossprevention, and more. Be a key contributor for one or more security systems or processes, working both independently and collaboratively with … knowledge within enterprise security workflows, such as managing endpoint security toolsets, device trust efforts, email security tooling, secure access service edge delivery, or modern datalossprevention programs. Functional knowledge of one or more programming or scripting languages such as Python or Go. Proven history of planning More ❯
on the design, implementation and adoption of information security policies, procedures. Understand relevant frameworks for managing different areas of Information security, risk management and data protection. Evaluate the security of third-party service providers and advise on the appropriate selection of suppliers and implementation of procured services. Be proficient … in the use of Microsoft Purview for data labelling, datalossprevention, data lifecycle management, data governance, compliance management, and risk mitigation, with the ability to implement information protection strategies. Create reports on risk and compliance for Senior stakeholders, including risk mitigation strategies and … designations, we partner with clients across a range of commercial sectors, enabling digital transformation, innovation and robust cyber security. We navigate the complexities of data sensitivity, confidentiality, governance and compliance. We blend strategic insight, depth of technical expertise, delivery and operational excellence to meet the specific requirements outlined. We More ❯
on the design, implementation and adoption of information security policies, procedures. Understand relevant frameworks for managing different areas of Information security, risk management and data protection. Evaluate the security of third-party service providers and advise on the appropriate selection of suppliers and implementation of procured services. Be proficient … in the use of Microsoft Purview for data labelling, datalossprevention, data lifecycle management, data governance, compliance management, and risk mitigation, with the ability to implement information protection strategies. Create reports on risk and compliance for Senior stakeholders, including risk mitigation strategies and … designations, we partner with clients across a range of commercial sectors, enabling digital transformation, innovation and robust cyber security. We navigate the complexities of data sensitivity, confidentiality, governance and compliance. We blend strategic insight, depth of technical expertise, delivery and operational excellence to meet the specific requirements outlined. We More ❯
Dundee, Angus, United Kingdom Hybrid / WFH Options
DC Thomson
team which forms a core component of our commercial driven revenue operations function. Working alongside expert solution architects in VMware, AWS, Microsoft Cloud and Data Management solutions, you will collaborate directly with customers to understand their business needs and technical requirements. This role involves supporting our sales engagements with … security solutions, including firewalls, intrusion detection/prevention systems, security information and event management (SIEM) tools, and datalossprevention (DLP) solutions Adhere to relevant security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR) Work with our SecOps team to develop and implement vulnerability … management programs, including regular security assessments, penetration testing, and remediation planning Maintain expertise in cloud security best practices including secure configuration, access management, and data protection Work closely with product lead, solution architects and engineering teams to integrate security into all aspects of solution design and implementation Support customers More ❯
team which forms a core component of our commercial driven revenue operations function. Working alongside expert solution architects in VMware, AWS, Microsoft Cloud and Data Management solutions, you will collaborate directly with customers to understand their business needs and technical requirements. This role involves supporting our sales engagements with … security solutions, including firewalls, intrusion detection/prevention systems, security information and event management (SIEM) tools, and datalossprevention (DLP) solutions. Adhere to relevant security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Work with our SecOps team to develop and implement … management programs, including regular security assessments, penetration testing, and remediation planning. Maintain expertise in cloud security best practices including secure configuration, access management, and data protection. Work closely with product lead, solution architects and engineering teams to integrate security into all aspects of solution design and implementation. Support customers More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Action For Humanity
and mobile device management (MDM). 2. Cloud & SaaS Security Secure Microsoft 365, SharePoint, Teams, and OneDrive, ensuring DataLossPrevention (DLP) and encryption. Implement Microsoft Defender Suite (Defender for Office 365, Defender for Endpoint, Defender for Cloud Apps) for advanced threat protection. Strengthen cloud security posture … needed. 4. Compliance & Risk Management Ensure adherence to ISO 27001, NIST, GDPR, and CIS Benchmarks. Conduct risk assessments, vulnerability scans, and security audits. Define data protection, backup, and retention policies aligned with Microsoft 365 compliance tools. 5. Network Security & Infrastructure Protection (Plus Skills) Experience with Layer 7 firewalls (Cisco More ❯
security policies; monitor threats and respond to incidents Maintain cybersecurity best practices, including endpoint and network security Oversee DataLossPrevention (DLP) policies and secure data workflows Ensure compliance with legal, regulatory, and industry standards Manage user identities and implement Single Sign-On (SSO) integrations Infrastructure More ❯
Program, ensuring effective use across platform engineering teams. Develop and maintain a Cloud Security Posture Management (CSPM) Program. DataLossPrevention (DLP) program Develop and support a company-wide adoption of a DLP program. Implement components of it as well as collaborate with other teams on their … of cloud concepts and cloud resource use cases. Experience in cyber security domains or a strong interest in learning, such as: Vulnerability management Securing data at rest/in transit Risk management and compliance Programming experience (e.g., Java, Golang, Python). Ability to showcase previous projects is a plus. More ❯
Office 365 cloud-based services. Key Responsibilities Office 365 Compliance Features: Implement and manage compliance features such as datalossprevention (DLP), eDiscovery, and retention policies to ensure adherence to legal and regulatory standards. SharePoint Online Administration: Manage SharePoint Online, including site creation, configuration, and maintenance to More ❯
Warwickshire, Birmingham, West Midlands Hybrid / WFH Options
Jumar Solutions
Office 365 cloud-based services. Key Responsibilities Office 365 Compliance Features: Implement and manage compliance features such as datalossprevention (DLP), eDiscovery, and retention policies to ensure adherence to legal and regulatory standards. SharePoint Online Administration: Manage SharePoint Online, including site creation, configuration, and maintenance to More ❯
Borehamwood, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Interaction - Letchworth
Power Automate, Power BI) · Azure Active Directory · Intune and Endpoint Manager · Conditional Access Policies · Advanced Threat Protection (ATP) · DataLossPrevention (DLP) · Information Protection · Identity and Access Management · Firewalls · Network routing and switching · Additional 3rd party security stack technology Personal Attributes Can express ideas and information clearly More ❯
Dynamics 365 CRM, Power Platform, and Azure services. Ensure security compliance through Azure Active Directory (AAD), conditional access, datalossprevention (DLP), and information protection policies. Drive cost optimisation and vendor management, working closely with Microsoft and key technology partners. Lead and mentor a team of six More ❯
london, south east england, united kingdom Hybrid / WFH Options
Cloud2 Consult
Dynamics 365 CRM, Power Platform, and Azure services. Ensure security compliance through Azure Active Directory (AAD), conditional access, datalossprevention (DLP), and information protection policies. Drive cost optimisation and vendor management, working closely with Microsoft and key technology partners. Lead and mentor a team of six More ❯
England, Coleman Street, United Kingdom Hybrid / WFH Options
Morson Talent
to London. We are looking for an experienced Cyber Security Project Manager to lead key initiatives such as DataLossPrevention (DLP) programs and Security Operations Centre (SOC) Maturity programs (amongst others) within a large, complex enterprise environment. This role requires strong project management skills and the … foster a security-aware culture. Required Qualifications & Experience: Strong background in project management, with proven experience leading large-scale cyber security projects. Experience with DLP systems and SOC Maturity programs and other cyber projects. Solid understanding of cyber security principles and technologies. Experience in complex, global enterprise environments. Familiarity with More ❯
Kirchdorf an der Iller, Baden-Württemberg, Germany Hybrid / WFH Options
Liebherr-IT Services GmbH
The Data Security Architect is responsible for designing the overall data security strategy and ensuring that data protection measures align with business and regulatory requirements. They work with IT, compliance, and security teams to define policies and … frameworks for securing sensitive data against evolving cyber threats. Creating passion: your responsibilities Design and deploy data security architectures using encryption, PKI, DLP, and access control mechanisms Define data security frameworks for on-premise, cloud, hybrid environments, and SaaS Applications Oversee the selection and deployment of encryption … tokenization, and data masking tools Develop Zero Trust data security models and define data segmentation policies Implement security controls for big data, AI/ML models, and IoT environments Define data classification and security policies aligned with GDPR, ISO, NIST and further gloabal regulations Define More ❯
premise and cloud-hosted solutions, including: Secure configuration of endpoints, OS, applications, containers and PaaS services, aligning to best practice for certifications (i.e., ISO27001) Data classification and datalossprevention Log collection and SIEM/SOAR monitoring and automated response Security testing, including automated testing and More ❯
field parsers, models and automated playbooks, and integrate new log sources where appropriate. Threat Intelligence & Threat Hunting – provide, develop and integrate external threat intelligence data into the team’s detection capabilities; perform proactive threat hunts based on working hypotheses, and implement subsequent SIEM alerts where required. Purple Team & Scenario … capabilities, develop scenario-based training, and organise purple team exercises, both in-house and with third-party providers. Insider Threat – maintain and develop the DataLossPrevention policies in line with the company’s data classification requirements, and implement exceptions for business-approved procedures where required. … the role, benefits/downsides, and standard use cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerability scanning and penetration testing tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
慨正橡扯
architecture and its security concerns, along with a strong understanding of security protocols, encryption, and authentication methods/excellent troubleshooting skills. Essential Experience: SIEM DataLossPrevention Cloud Security IDS/IPS Email Threat Prevention Endpoint Detection and Response Identity Protection Privileged Password Management Identity Access More ❯
architecture and its security concerns, along with a strong understanding of security protocols, encryption, and authentication methods/excellent troubleshooting skills. Essential Experience: SIEM DataLossPrevention Cloud Security IDS/IPS Email Threat Prevention Endpoint Detection and Response Identity Protection Privileged Password Management Identity Access More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
TieTalent
architecture and its security concerns, along with a strong understanding of security protocols, encryption, and authentication methods/excellent troubleshooting skills. Essential Experience: SIEM DataLossPrevention Cloud Security IDS/IPS Email Threat Prevention Endpoint Detection and Response Identity Protection Privileged Password Management Identity Access More ❯
to: Security engineering, designing IT and security architecture, implementing IAM/PAM technologies, building robust backup and recovery capabilities, delivering vulnerability management solutions, implementing datalossprevention controls. Experience in delivering cyber security risk assessments against industry standards (NIST CSF, 800-53 and ISO27001) within an established … non-technical terms to senior executives. You might have some of these Strong understanding of operational technology cyber security best practices. An understanding of data privacy requirements and cyber security regulations in the EU and wider European region. A deep understanding of governance, standards, and compliance as they pertain More ❯
and Microsoft Cloud Security offerings. Experience with Microsoft, Google, and Amazon cloud environments. Deployment experience of Microsoft 365 including: Entra ID Microsoft Intune Purview (DataLossPrevention, Sensitivity Labels, Insider Risk) Microsoft Defender XDR (Endpoint, Identity Cloud App, Office, and Microsoft Sentinel) Exchange Online (where migrating from More ❯