CDW require a suitably experienced DataLossPrevention Consultant for our established client based in London This role will be to assist with a gap analysis project within their Cyber Security space. DataLossPrevention Consultant Contract Length: 3 Months Location: Hybrid - Remote Working …/London Day Rate: Negotiable Day Rate - Inside IR35 Key Responsibilities/Skills: Identify data sets and current classification. Identify shadow IT. Review DLP tooling and processes that currently exist, identifying gaps in each. Build a DLP roadmap based off the findings to address and resolve identified risks. Create … a full business case to deliver the DLP roadmap. Netskope Purview/AIP, Varonis Mimecast Exchange Intune Document Classification Egress more »
Knutsford, England, United Kingdom Hybrid / WFH Options
Undisclosed
/d Umbrella Role purpose/summary The Data Security Policy Specialist will be responsible for migrating datalossprevention (DLP) policies and practices from Broadcom DLP-DAR to BigID and Microsoft Purview. This role involves writing and implementing data policies for on-premise file … regex, ServiceNow, and stakeholder engagement. An understanding of Isilon filers is also desired. Key Skills/requirements Policy Migration and Implementation Transition existing Symantec DLPdata-at-rest policies to BigID and Microsoft Purview. Develop and configure BigID policies for on-premise file-share scanning. Implement and manage Purview … solving skills. Excellent communication and documentation skills. Preferred Qualifications: • Certification in data security or information protection (e.g., CISM, CISSP). • Experience with other DLP tools or data classification systems. • Background in financial services or regulated industries. All profiles will be reviewed against the required skills and experience. Due more »
Knutsford, England, United Kingdom Hybrid / WFH Options
eTeam
/25 Contract Inside IR35 Role Description: The Data Security Policy Specialist will be responsible for migrating datalossprevention (DLP) policies and practices from Broadcom DLP-DAR to BigID and Microsoft Purview. This role involves writing and implementing data policies for on-premise file … in regex, ServiceNow, and stakeholder engagement. An understanding of Isilon filers is also desired. Key Responsibilities: • Policy Migration and Implementation: o Transition existing Symantec DLPdata-at-rest policies to BigID and Microsoft Purview. o Develop and configure BigID policies for on-premise file-share scanning. o Implement and … solving skills. • Excellent communication and documentation skills. Preferred Qualifications: • Certification in data security or information protection (e.g., CISM, CISSP). • Experience with other DLP tools or data classification systems. • Background in financial services or regulated industries. more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Adria Solutions
security controls, including File Integrity Monitoring (FIM), Web Application Firewalls (WAF), Distributed Denial of Service (DDoS) protection, and DataLossPrevention (DLP) Continuously assess and improve security controls to address evolving threats Skills and Experience: Expertise with security tools, such as Threat Intelligence (e.g., Rapid7) and vulnerability … management (e.g., Tenable.io) In-depth knowledge of SOC operations and incident response Experience with security controls, including FIM, WAF (Cloudflare), DDoS protection, and DLP Excellent communication, reporting, and documentation skills A proactive, detail-oriented approach with strong leadership capabilities Strategic thinking with a forward-looking mindset to drive security initiatives more »
Responsibilities: Develop and deploy tools and automation to simplify common IT security tasks. Identify areas for cyber security improvement to ensure cyber security and data security by designing controls. Work closely with IT and development teams to integrate security principles into development processes. Review existing tools and processes, identify … reduce operational risk. Monitor security alerts and implement security measures to protect against threats and attacks. Monitor and manage responses to security incidents with DLP security. Manage standard, third party and authorized identity access Implement, manage and enhance HSM key management infrastructure. External vulnerability patching, internal vulnerability patching, web application … CASB. Experience with Forcepoint, Palo Alto Firewall and Cisco NAC Good knowledge of MS Defender for Cloud, Storage (SQL) and CSPM. Good experience with datalossprevention tools, such as MS Purview Compliance Manager and Tessian Security monitoring, SIEM tools such as Exabeam, QRadar, Splunk and Sentinel. more »
employees who make it happen. This is their biggest achievement! Due to ambitious growth plans for 2024, they are looking to add a Lead Data Security Consultant to their team. This can be a home-based role anywhere in the UK. This will require someone who knows IT Security … and DataLossPrevention while being capable of recommending solutions to a varied client base. The Lead Data Security Consultant is responsible for delivering high-quality professional services engagements across both the Cyber and Information Security realms. They are also here to coach junior consultants within … engagements, to help refine consultancy offerings and to offer current and prospective customers a professional touchpoint. Position Lead and execute consultancy engagements focused on data security and regulatory compliance. Participate in end-to-end client projects, including proof of concepts (POCs), gathering requirements, designing solutions, planning implementation, providing guidance more »
advisories, alerts, and vulnerabilities pertaining to blockchain and the company. Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data, and the company's reputation. Conduct regular security audits, risk assessments, and testing of systems and processes to identify vulnerabilities; recommend and implement appropriate … the cybersecurity risks associated with various technologies and ways to manage them. A solid understanding of information technology and information security including firewalls, VPN, datalossprevention, IDS/IPS, web-proxy, and security audits. Exceptional communication skills, both verbal and written, with the ability to communicate more »
as well as supporting the investigations and improvements. You will be reviewing their current set up and working towards an improved security posture across data and critical systems. This is an opportunity to get in from the ground up and really deliver a meaningful security operations practice. All the … good stuff like, Security Incident and Event Management, Vulnerability and Threat Management, Incident Manager and Response, DataLossPrevention are your bag and you'll need to be brilliant at dealing with people. You'll need to have done this role previously and be certified to CISSP more »
reflect fair market value Develop and maintain SaaS assurance models for vendors within the allocated portfolio, supporting areas such as Information Security, Compliance and Data Governance Ensure any negotiation of commercial terms for strategic IT contracts provides beneficial outcomes for the client and their customers Provide subject matter input … managing SaaS vendors across the Financial Services Market Experience in setting up and maintaining SaaS assurance models, including the understanding of Identity Access Management, DataLossPrevention and Infrastructure Security Understanding of the relevance and application of Compliance and Governance standards, including PRA S2/21 and … Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on more »
Hampshire, South East, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
reflect fair market value Develop and maintain SaaS assurance models for vendors within the allocated portfolio, supporting areas such as Information Security, Compliance and Data Governance Ensure any negotiation of commercial terms for strategic IT contracts provides beneficial outcomes for the client and their customers Provide subject matter input … managing SaaS vendors across the Financial Services Market Experience in setting up and maintaining SaaS assurance models , including the understanding of Identity Access Management, DataLossPrevention and Infrastructure Security Understanding of the relevance and application of Compliance and Governance standards, including PRA S2/21 and … Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on more »
reflect fair market value Develop and maintain SaaS assurance models for vendors within the allocated portfolio, supporting areas such as Information Security, Compliance and Data Governance Ensure any negotiation of commercial terms for strategic IT contracts provides beneficial outcomes for the client and their customers Provide subject matter input … managing SaaS vendors across the Financial Services Market Experience in setting up and maintaining SaaS assurance models , including the understanding of Identity Access Management, DataLossPrevention and Infrastructure Security Understanding of the relevance and application of Compliance and Governance standards, including PRA S2/21 and … Appointments Limited operates as an employment agency and employment business and is an equal opportunities organisation We take our obligations to protect your personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Leeds Building Society
medium/large company involving a broad range of tech including some of the following: Strong knowledge & understanding of security principles surrounding SIEM, Antivirus, DLP, Firewalls, Open-Source Filtering tools, Cloud security (Azure), IdAM (PAM on-prem/cloud), EDR, Scanning/vulnerability tools, etc. Windows Server & Networking Strong experience more »
Sandiacre, England, United Kingdom Hybrid / WFH Options
Air IT
Windows Hyper-V/VMware vSphere and vCentre Microsoft 365 (email migrations, Intune deployment, Azure Information Protection, Azure AD join, AD Connect, SharePoint Online, DLP, MDM) Multi-Factor Authentication and conditional access setup and configuration for Office 365 Microsoft Active Directory, Windows Server, and related server roles (IIS/RDS more »
Cheltenham, England, United Kingdom Hybrid / WFH Options
IOActive, Inc
of the Android platform and its security mechanisms Vulnerability assessment and penetration testing Knowledge of security-related topics, such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure datamore »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
in CI/CD pipelines. Investigate zero-day vulnerability applicability, and remediation or workaround approaches to lessen risk to infrastructure, applications and/or data Regularly review and feedback to relevant teams the best practice hardening standards required for endpoints, applications and services Security Automation and DevSecOps Assist the … relevant to Microsoft Sentinel AWS native security tooling and services Desired Pipeline scanning tooling such as Dastardly, Snyk, Wiz Microsoft E5 tooling such as DLP, Defenders for Endpoint, Cloud, CloudApp and Identity Experience in network security, firewall management, and secure cloud architecture. In-depth experience with IAM, encryption technologies, and … data protection in cloud ecosystems. Familiarity with industry regulations and compliance frameworks (e.g., PCI DSS, GDPR, SOC 2). Hands-on experience with automation tools, CI/CD pipelines, and security integration in DevOps. Proficiency in scripting languages such as Python and PowerShell. Certifications such as CCSP, AWS Certified more »
City Of Bristol, England, United Kingdom Hybrid / WFH Options
Sanderson
Provide advisory and consulting support to help the Company improve its security posture and adhere to security policies, expected controls and regulatory requirements. Maintain data and monitor security access. Perform vulnerability testing, risk analyses and security assessments. Define, implement and maintain corporate security policies. Anticipate security alerts, incidents and … Ecosystem such as Active Directory and MS Entra ID, including GPO, DNS, DHCP. Knowledge of endpoint security solutions (e.g. HIDS, anti-malware, file integrity, DLP). AWS, Azure and other cloud platforms, including hybrid cloud (e.g. SaaS, IaaS, PaaS). System administration, supporting multiple platforms and applications. Skilled in conducting more »
City of London, London, United Kingdom Hybrid / WFH Options
British Business Bank
have previously delivered solutions around security concepts such as, Zero Trust Architecture, Endpoint Device Management, Threat Modelling and DevSecOps, Identity and Access Management, and DataLoss Prevention. You will have experience in policy and internal standards development as well as monitoring and reporting on compliance with security and … data protection policies, as well as the enforcement of policies. You will have developed and maintained written security controls, compliance monitoring, vulnerability management, and defining treatment strategies along with performing risk assessments, IT audits, security planning and systems accreditation. Previous experience of implementation of Information Security Frameworks, HMG Security more »
/XDR endpoint protection solutions Microsoft 365 cyber security and information governance services such as Defender for Office, Defender for Cloud, Purview and Endpoint DLP Microsoft Azure IaaS and PaaS architecture PowerShell and other scripting languages Citrix Virtual Apps, Remote Desktops Services, Virtual Desktop Infrastructure Veeam and Zerto backup and … data resiliency solutions Veeam Backup and Replication and Zerto VMware virtualisation Hyper-V virtualisation Microsoft Azure IaaS and PaaS architecture Azure migration tools Storage technologies (Pure Storage desirable) A good knowledge of cybersecurity principles, including threat detection, incident response, and vulnerability management ITIL v4 Foundation Desirable or some exposure … hygiene, endpoint detection and response, secure cloud gateways, multi-factor authentication and advanced identity management. Monitoring and managing client firewalls, intrusion detection and intrusion prevention tools. Monitoring and administering backup and data resiliency tools to ensure client workloads are protected and within defined SLA. Operating to defined SLA more »
advanced threat protection tools Excellent understanding of security issues, threat actors, risks and the industry Prior experience running penetration testing initiatives Exposure to IPS, DLP, anti-malware, Sandbox, Vulnerability scanners Cyber qualifications such as CEH, OSCP, CISSP Our client offers an excellent hybrid work culture, high-end base salaries and more »
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition IT
business impact analysis to identify potential vulnerabilities and prioritise mitigation strategies. Infrastructure Security: Implement and manage advanced security tools and technologies, such as MFA, DLP, VPN, and cloud-based solutions, to ensure the confidentiality, integrity, and availability of our systems. Policy Development: Contribute to the creation and implementation of information … attacks before they cause significant damage. Incident Response: Investigate and respond to security breaches, ensuring swift containment and remediation of any compromised systems or data Required qualifications/experience: Proven experience in cybersecurity infrastructure engineering with a strong understanding of network security, firewalls, intrusion detection/prevention systems more »
decades. Who we are looking for? The ideal candidate will have a well-rounded security background in: Security Information and Event Monitoring (SIEM) technologies, DLP, Vulnerability Scanning, experience of engineering and administering end point security applications including full disk encryption HIDS, NAC, cloud-based storage, mobile technologies & IDS/IPS … Area Network technologies; system monitoring and event analysis; virtualization concepts and technologies; Group Policy Competencies: Analysis: Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions. Communication: Clearly convey information and ideas through a variety of media to individuals or groups in a manner more »