M365 Security Engineer

Point72
London
10 months ago
Applications closed

Related Jobs

View all jobs

Senior Infrastructure Architect

Information Security Manager

Penetration Tester | CHECK Team Member

Corporate IT Manager

It Manager

Group IT Manager (Infrastructure)

A Career with Point72s Global Information Security Team

Our Global Information Security teams mission is to ensure the development, implementation, and management of a comprehensive program that effectively protects the confidentiality, integrity, and availability of Point72 information assets. Our team is comprised of security professionals with expertise in a diverse portfolio of security disciplines.

What youll do

  1. Implement and maintain comprehensive Microsoft 365 security features across the organization
  2. Design, test and deploy security policies using the Microsoft Defender ATP suite, Cloud App Security, AzureAD/EntraID Identity Protection, InTune Device Management controls, Exchange Online Protection, Purview, Security and Compliance Center, etc.
  3. Operationalize M365 security monitoring, altering and corresponding SecOps playbooks
  4. Drive improvements in our Microsoft Security Score across all core pillars including Device, Identity, Data and Apps via the implementation of available E5 security features and associated best practices
  5. Help to drive modernization of our endpoint security architecture as we transition from on-prem to hybrid-mode and ultimately to cloud native, serverless modern workplace via M365 E5 Enterprise Mobility Suite
  6. Design and implement security controls for CoPilot and associated Microsoft AI products
  7. Evaluate and maintain the security of 3rd-party M365 integrations (ex: Okta, Proofpoint, Varonis, KnowBe4, AvePoint, ShareGate, Zoom, Slack, etc)
  8. Conduct regular M365 security assessments and provide recommendations for improvements
  9. Develop and maintain security documentation, including policies, procedures, and architectural diagrams
  10. Provide technical guidance and training on M365 Security
  11. Collaborate with cross-functional teams to ensure security compliance requirements are met


Whats required

  1. Bachelors degree in Computer Science, Information Security, or related field
  2. 6+ years professional IT experience with a minimum 4+ years of hands-on experience implementing and managing M365 E5 Security
  3. Comprehensive subject matter expertise across the full M365 suite of applications and administration capabilities (SharePoint, OneDrive, Teams, Exchange, Power Platform, Office Apps, Copilot, etc)
  4. Demonstratable subject matter expertise in InTune, AzureAD/EntraID Premium P2, Purview, Defender (for each Endpoint, O365, Cloud Apps, Identity, Attack Surface), etc.
  5. Strong knowledge of M365 Copilot particularly as it relates to data security and compliance
  6. Comprehensive understanding of modern SSO and MFA administration via EntraID, including Conditional Access
  7. Deep understanding of each on-prem, hybrid-mode and fully-cloud architecture models, as it relates to device management (SCCM/GPOs vs. InTune vs. hybrid/co-managed) and Identity (EntraID vs. on-prem Active Directory vs. hybrid)
  8. Familiarity with Data Classification, DLP, Information Barriers, Azure Information Protection and compliance via Purview
  9. General familiarity with common 3rd-party M365 security integrations (ex: Okta, Proofpoint, Varonis, Sharegate, KnowBe4, etc)
  10. Experience with PowerShell scripting and MS Graph API


We take care of our people

We invest in our people, their careers, their health, and their well-being. When you work here, we provide:

  1. Fully-paid health care benefits
  2. Generous parental and family leave policies
  3. Volunteer opportunities
  4. Support for employee-led affinity groups representing women, people of color and the LGBT+ community
  5. Mental and physical wellness programs
  6. Tuition assistance
  7. A 401(k) savings program with an employer match and more


About Point72

Point72 Asset Management is a global firm led by Steven Cohen that invests in multiple asset classes and strategies worldwide. Resting on more than a quarter-century of investing experience, we seek to be the industrys premier asset manager through delivering superior risk-adjusted returns, adhering to the highest ethical standards, and offering the greatest opportunities to the industrys brightest talent. Were inventing the future of finance by revolutionizing how we develop our people and how we use data to shape our thinking. For more information, visit www.Point72.com/working-here.J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.