M365 Security Design Engineer

Luton
9 months ago
Applications closed

Related Jobs

View all jobs

SecOps Engineer

Senior Infrastructure Architect

Corporate IT Manager

Information Security Manager

Migration Engineer

Penetration Tester | CHECK Team Member

A prominent client within the Defence & Security sector is seeking an experienced and proactive Microsoft 365 Security Design Engineer to architect and deliver robust security solutions across the M365 platform. This role demands deep technical proficiency in M365 security features, alongside a comprehensive understanding of contemporary cyber threats, compliance mandates, and enterprise security architectures.

Key Responsibilities:

Lead the design and deployment of security controls across Microsoft 365 E5 services, including Endpoint Security, Exchange Online, SharePoint Online, OneDrive for Business, and Microsoft Teams.
Provide subject matter expertise in the planning and implementation phases of Windows 11 and Exchange Online projects.
Develop, document, and maintain security configuration baselines in alignment with recognised standards such as NIST, CIS, and ISO/IEC 27001.
Configure and manage Microsoft security technologies, including Defender for Office 365, Defender for Cloud, Defender for Endpoint/Servers, Microsoft Purview (Information Protection, DLP), and Microsoft Entra ID (formerly Azure AD).
Integrate Microsoft Sentinel with existing SOC infrastructure and facilitate adoption of Sentinel capabilities within security operations.
Implement and administer Microsoft Privileged Identity Management (PIM) solutions.
Provide security leadership in areas of identity and access management, conditional access policies, and the implementation of Zero Trust principles.
Conduct security risk assessments, identify control gaps, and perform impact analyses on M365 deployments and integrations.
Collaborate with security operations and compliance stakeholders to detect, investigate, and respond to security threats and incidents.
Produce and maintain technical documentation and deliver knowledge transfer and training sessions to operational and support teams.

Required Skills & Qualifications:

Demonstrable experience in designing and securing Microsoft 365 environments at enterprise scale.
Expert knowledge of Microsoft 365 security tools and services, including the Microsoft Defender suite, Microsoft Purview, and Microsoft Entra ID.
Strong expertise in identity and access management concepts, including role-based access, conditional access, and multifactor authentication.
Solid understanding of regulatory and compliance frameworks such as GDPR, HIPAA, and ISO/IEC 27001.
Proficiency with Microsoft security and compliance centres, PowerShell scripting, and relevant automation techniques.
Industry-recognised certifications highly desirable, particularly: SC-100 (Cybersecurity Architect), SC-300 (Identity and Access Administrator), MS-500 (Security Administrator), and AZ-500 (Security Engineer Associate).Disclaimer:

This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a specialist talent acquisition and management consultancy. We provide technical contingency recruitment and a portfolio of more complex resource solutions. Our specialist recruitment divisions cover the entire technical arena, including some of the most economically and strategically important industries in the UK and the world today. We will never send your CV without your permission. Where the role is marked as Outside IR35 in the advertisement this is subject to receipt of a final Status Determination Statement from the end Client and may be subject to change

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

SOC Analyst Jobs UK 2026: Salaries, Skills & How to Get Hired

Cyber security is one of the UK's fastest-growing career paths — and SOC analyst is where most people begin. It's in high demand, genuinely accessible, and you don't need a degree or years of experience to get started. But knowing what UK employers actually want in 2026 — what they pay, which certs matter, and how to stand out — is a different matter. This guide covers all of it.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .