National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Backup and Security Consultant

Computacenter
england
10 months ago
Applications closed

Related Jobs

View all jobs

Security Specialist

Cyber Security Architect

Cyber Security Architect

Penetration Tester

Cloud Architect

SQL Database Administrator

Location:UK - Mobile England, UK - London, UK - Reading, UK - Nottingham, UK - Hatfield, UK - Birmingham, UK - Edinburgh, UK - Milton Keynes, UK - Maidstone |Job-ID:207938 |Contract type:Standard |Business Unit:IT Consulting

Life on the team


We are seeking a highly skilled and motivated Data Protection Consultant to join our Security & Backup Practice within Computacenter. The role will primarily be based remotely but may involve UK wide travel. 
The successful candidate will report directly to the Practice Leader, joining an already healthy sized team, but due to pipeline we need additional talented individuals.

What you’ll do

The ideal candidate will have a strong background in data protection, disaster recovery, and business continuity, with a particular focus on modern data protection solutions from Rubrik, Veeam, Commvault and Veritas.
This customer centric role involves working with our clients and partners to help develop and implement solutions to their data use cases, defining solutions for the classification and protection of business data and systems, and the creation of disaster recovery solutions to ensure effective business continuity for our customer base.

Consult and deliver on implementation, and optimisation of data protection architectures for a variety of applications and platforms such as virtualisation, containers, physical, SaaS, and Cloud Collaborate with cross-functional teams to integrate data protection capabilities into our solutions and services, contributing to the overall strategy and service development Stay abreast of the latest developments in data protection, data classification, and disaster orchestration technologies, alongside relevant industry legislative impacts Customer facing skills with the ability to propose solutions to improve efficiency and scalability Good presentation and documentation skills

What you’ll need

Strong theoretical and practical knowledge of data protection and disaster recovery solutions such as Rubrik, Veeam, Veritas, and Commvault Knowledge of cloud-fundamentals for Amazon, Microsoft, and Google cloud services Wider knowledge within Networking, Storage, and compute across VMware, Microsoft, and Nutanix virtualisation solutions, plus others Demonstrated experience with SaaS solutions and relevant data protection requirements Edge, Datacenter, and cloud architectural knowledge and use cases relating to Data Strong client facing, communication and interpersonal skills Technical certifications in one or more data protection solutions from Veeam, Rubrik, Commvault, and Veritas. (Inclusive alternative vendor certifications would also be beneficial)

Desirable Skills

Containerisation data protection & recovery experience Experience with Object Storage solutions and sizing Experience with Deduplication Appliance solutions and sizing Data Governance, Health, and Hygiene skills
National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.

The Ultimate Assessment-Centre Survival Guide for Cyber Security Jobs in the UK

Assessment centres for cyber security positions in the UK are designed to mirror real-world threat landscapes and test both your technical acumen and soft skills under pressure. Across multiple stages—psychometric assessments, penetration testing exercises, incident response group tasks, case studies, interviews and even informal networking breaks—employers assess your ability to identify vulnerabilities, collaborate in high-stakes scenarios and communicate effectively. This guide walks you through each component, equipping you to stand out and secure your next role in cyber defence.