O365 Security Engineer

Northern Trust Corporation
London
4 days ago
Create job alert

About Northern Trust:

Northern Trust, a Fortune 500 company, is a globally recognized, award-winning financial institution that has been in continuous operation since 1889.

Northern Trust is proud to provide innovative financial services and guidance to the world’s most successful individuals, families, and institutions by remaining true to our enduring principles of service, expertise, and integrity. With more than 130 years of financial experience and over 22,000 partners, we serve the world’s most sophisticated clients using leading technology and exceptional service.

Role/ Department:

Seeking a dynamic engineer who is passionate for cloud and security technologies to be part of a team that develops a product impacting tens of thousands of customers. As an architect in our Data Protection team, you will be responsible for designing, implementing, integrating, testing and deploying features and components in a large-scale system. We expect you to drive improvements to code quality, performance, and team processes while leveraging modern web technologies and tool. Should be able to debug problems arising as a result of implementing data protection technologies and be able to understand the implications of his implementations.

The key responsibilities of the role include:
 

Develops and administers the solutions that meet system expectations relative to scalability, performance, fault tolerance, usability, and data integrity. Delivers solutions that meet end user expectations relative to performance, usability and security for the Data Protection Engineering and Architecture function.

Uses specific knowledge of a discipline to achieve goals through own work. Has specific knowledge or expertise typically gained through formal education or equivalent experience. Uses expertise to provide guidance to others as a project manager or consultant. Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines. Solves complex problems. Works independently; receives minimal guidance. Will lead projects or project steps within a broader project or may have accountability for on-going activities or objectives. Acts as a resource for colleagues with less experience

Administer and support Microsoft Purview and Microsoft Defender for Cloud Apps, ensuring optimal performance and availability of the platforms. Configure and manage security settings, policies, and compliance features within Microsoft Purview and Defender for Cloud Apps. Implement and maintain data governance policies and procedures to ensure compliance with regulatory requirements and organizational standards. Monitor and report on compliance metrics, data classification, and data loss prevention (DLP) policies. Work closely with IT, security, and compliance teams to integrate Microsoft Purview and Defender for Cloud Apps with existing systems and workflows. Communicate effectively with stakeholders to report on security incidents, compliance metrics, and recommendations for improvement. Reviewing documentation, processes or procedures, and recommends where automation or improvements can be implemented Determining operational feasibility by evaluating, analyzing, problem definition, requirements, solution development, and proposing solutions. Operating independently; has in-depth knowledge of business unit/function; Accomplishes engineering and organization mission by completing related results as needed. As subject area expert, provides comprehensive, in-depth consulting and leadership to team and partners

Skills/Qualifications

Proven work experience is required. Proven experience in managing and supporting Microsoft Purview and Microsoft Defender for Cloud Apps. Experience with M365 Services (SPO, Teams, Exchange, Entra ID, etc), Microsoft Sentinel, Zscaler, Symantec DLP a plus Strong understanding of data governance, compliance frameworks, and information security best practices. Excellent problem-solving skills and attention to detail. Strong communication and interpersonal skills. Scripting experience, including PowerShell, Python, Power Automate, etc. Ticket and change management experience in ServiceNow Relevant certifications (e.g., Microsoft Certified: Security, Compliance, and Identity Fundamentals, Microsoft Certified: Information Protection Administrator, CISSP, CISM, CISA, Cisco, SANS, etc) are a plus.

Preferred Skills

Experience with data loss prevention (DLP) technologies and strategies. Familiarity with compliance regulations (e.g., GDPR, HIPAA) and data protection laws. Knowledge of cloud security concepts and technologies.

Working with Us:

As a Northern Trust partner, greater achievements await. You will be part of a flexible and collaborative work culture in an organization where financial strength and stability is an asset that emboldens us to explore new ideas.

Movement within the organization is encouraged, senior leaders are accessible, and you can take pride in working for a company committed to assisting the communities we serve! Join a workplace with a greater purpose.

We’d love to learn more about how your interests and experience could be a fit with one of the world’s most admired and sustainable companies! Build your career with us and apply today. #MadeForGreater

Reasonable accommodation

Northern Trust is committed to working with and providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation for any part of the employment process, please email our HR Service Center at .

We hope you’re excited about the role and the opportunity to work with us. We value an inclusive workplace and understand flexibility means different things to different people.

Apply today and talk to us about your flexible working requirements and together we can achieve greater.

Related Jobs

View all jobs

IT Network Security Engineer

Microsoft 365 Security Consultant

Microsoft 365 Security Consultant

Microsoft 365 Security Consultant

Microsoft 365 Security Consultant

Microsoft 365 Security Consultant

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.