Senior Cloud Security Consultant (Basé à London)

Jobleads
Greater London
4 days ago
Create job alert

Job Purpose: This role is customer-facing, and you will play an active role in transforming our client's Security on their Microsoft platforms through designing and implementing Microsoft Security technologies on-premise and in the cloud. You are comfortable meeting clients and leading workshops with technical and managerial representatives of all levels.

As a member of our Cloud Security Consulting team, you will help advise and deliver cloud security solutions for customers primarily using the Microsoft Security product stack.

As a senior cloud security consultant, you will use hands-on and strategic technical expertise to deliver solutions to customers adhering to cloud security best practices. Working solo or within a team, this role will provide opportunities to work with enterprise-level customers, helping to secure multi-platform cloud security.

Living on the bleeding edge of Microsoft innovation, you will foster relationships with product engineers and facilitate the enablement of preview features for customers.

This position offers exciting opportunities to learn and advance the development of subject matter expertise in a fast-paced and evolving industry.

This role is being advertised on an initial contract basis.

The Role will Involve:

  • Designing and building Microsoft security reference architectures for public, private, and hybrid Cloud-based systems.
  • Leading technical discussions to assist our clients in aligning security strategy with business goals.
  • Acting as an advisor for customers to accelerate Cloud security efforts across the board.
  • Delivering technical reviews of cloud security architecture against strategic cloud security frameworks.
  • Being an inspirational example that can elevate less experienced colleagues to become their best Cloud security professionals.
  • Continuous development of skills and platform research to ensure that the team and business are always providing best practice solutions for our clients.
  • Working with project owners to co-lead multiple parts of the engagement delivery.
  • Supporting clients migrating from non-Microsoft technologies to the Defender XDR solutions (Defender for Endpoint, Defender for Office), including Office 365 changes (Exchange Online) to support their migration.
  • Cloud-based Identity Management with Entra ID.
  • You will be intrinsic to customer engagements throughout the project lifecycle; hence it is important you are comfortable performing discovery, analysis, design, build, test, and deployment of Microsoft Identity Management solutions.
  • You will have a good working knowledge of zero trust and SASE concepts and be able to guide customers to identify a path to implementation and technical gap analysis.
  • This Consultant will develop and deliver user stories and use cases and will work with other interdependent engineers and solution architects to produce technical requirements and identify related business benefits.


We are Looking for Someone With:

  • Proven experience and deep understanding of Microsoft Identity Management / IAM.
  • A strong foundation across the Microsoft Security solution stack, including on-premise, endpoint, and Azure-based solutions.
  • Experience and subject matter expertise in Microsoft Azure scoping and specification.
  • Relevant knowledge and experience or hold some or all of the following certifications, or be willing to achieve them:
    • CISSP
    • CompTIA Security+
    • AZ-900 & AZ-500
    • SC-200
    • SC-300
  • Knowledge of secure development practices.
  • Knowledge of security standards like CIS, NIST, and GDPR.
  • Experience working in an Agile environment.
  • Ability to understand secure API capabilities to help scope multi-vendor integration projects.
  • Degree level qualification or equivalent.
  • Good stakeholder management and interpersonal skills.
  • Ability to manage priorities and multi-task.
  • Certifications in Microsoft Azure and Microsoft Cloud Security offerings.
  • Experience with Microsoft, Google, and Amazon cloud environments.
  • Deployment experience of Microsoft 365 including:
    • Entra ID
    • Microsoft Intune
    • Purview (Data Loss Prevention, Sensitivity Labels, Insider Risk)
    • Microsoft Defender XDR (Endpoint, Identity Cloud App, Office, and Microsoft Sentinel)
    • Exchange Online (where migrating from secure email gateway solutions)
  • Ability to apply structured thinking, simplifying complex problems into component parts, to resolve project challenges.
  • Workshop skills for conveying information to customers, leading meetings, and providing actionable write-ups of tasks/actions.
  • Knowledge of modern application architectures and cloud platforms.
  • Ability to consistently deliver quality within expected timeframes and on budget.


Working Hours: This role is a flexible contract with up to 8 hours per day, dependent on customer engagements.

Working Location: This role is hybrid, with offices in Canary Wharf. Role may require travel to customer sites - therefore must be within easy travel distance from London.

Travel: Occasional travel to customer sites when necessary.

This job description is intended to convey information essential to understanding the scope of the role and is not intended to be an exhaustive list of skills, efforts, duties, responsibilities, or working conditions associated with the position.

#J-18808-Ljbffr

Related Jobs

View all jobs

Senior Cloud Security Consultant

Senior Cloud Security Consultant

Senior Cloud Security Consultant (Basé à London)

Senior Cyber Security Consultant (Secure By Design)

Senior Security Consultant - Security Architecture

Senior or Principal Security Consultant (Risk Management)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.

Cyber Security Jobs in the Public Sector: Protecting the UK’s Digital Future

Cyber threats have grown exponentially in recent years, targeting both private businesses and government institutions. As technology becomes ever more embedded in daily life—managing everything from national security to healthcare records—the risk of cyber attacks also increases. In the UK public sector, where vital services and sensitive citizen data are at stake, cyber security has become a top priority. For professionals looking for a meaningful career at the intersection of technology, national security, and public service, cyber security jobs in the UK public sector present an exciting and fulfilling path. In this blog post, we’ll delve into why cyber security is so critical to government agencies, the most in-demand roles, the skills and qualifications required, and how to navigate the application process. By the end, you’ll have a clearer sense of how you can leverage your technical expertise to protect the nation’s digital infrastructure.