Be at the heart of actionFly remote-controlled drones into enemy territory to gather vital information.

Apply Now

Senior Cloud Security Engineer

Green Professionals
Greater London
3 weeks ago
Create job alert

Job Description
<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">We’re looking for a Senior Cloud Security Engineer for our growing, prestigious client in the data sector, based in London, on a permanent basis paying between £55,000 to £65,000 plus great benefits.


<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">This role offers hybrid working with an expectation to be in the office 2-3 days per week.


<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">You’ll be joining a technical team focused on strengthening cloud security and ensuring compliance across Microsoft Azure environments. This role will involve hands-on security engineering, working closely with infrastructure and DevOps teams, and supporting the adoption of Microsoft’s security toolset across the organisation.


<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">You will need proven experience with:


<ul style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">

Securing Azure environments in line with best practices - essential

Microsoft Defender (Cloud, Endpoint, 365) - essential

Sentinel - essential

Microsoft Purview, Compliance Manager and related compliance tools

Entra ID (Azure AD), Conditional Access and Identity Governance

Data Loss Prevention, sensitivity labels and insider risk management

ISO 27001, SOC 2, GDPR and NIS2 frameworks

PowerShell scripting and use of Microsoft Graph API

Working across cloud, infrastructure and application teams

<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">Certifications required:
<ul style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">

AZ-500

SC-100 (or working towards)

One or more of MS-500 / SC-400 / SC-900

<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">

The following are desired: CISSP, CISM, CCSP

<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">Interested?


<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">Please apply below.


<p style="color:rgb(0, 0, 0); font-family:"Open Sans"; font-size:15px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal">Senior Cloud Security Engineer, Azure Security Engineer, Azure Security Consultant, Cloud Security Consultant, Microsoft Security, Azure Sentinel, Defender, Purview, Compliance, Entra ID, Cloud Security, DLP, Data Sector, London, Hybrid




Requirements
You will need proven experience with: Securing Azure environments in line with best practices - essential Microsoft Defender (Cloud, Endpoint, 365) - essential Sentinel - essentail Microsoft Purview, Compliance Manager and related compliance tools Entra ID (Azure AD), Conditional Access and Identity Governance Data Loss Prevention, sensitivity labels and insider risk management ISO 27001, SOC 2, GDPR and NIS2 frameworks PowerShell scripting and use of Microsoft Graph API Working across cloud, infrastructure and application teams

Related Jobs

View all jobs

Senior Cloud Security Engineer

Senior Cloud Security Engineer

Senior Cloud Security Engineer

Senior Cloud Security Engineer

Senior Cloud Security Engineer

Senior Cloud Security Engineer (Vice President)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Skills in Cyber sScurity According to LinkedIn & Indeed Job Postings

In today’s digital age, cyber security is no longer optional—it’s mission-critical. From financial institutions to healthcare providers, government departments to tech startups, every sector in the UK is under rising cyber threats. As a result, employers are constantly on the hunt for skilled professionals who can defend, detect, and respond effectively. But with cyber threats evolving at pace, what exactly are employers seeking? By analysing job postings on LinkedIn and Indeed, this article reveals the Top 10 cyber security skills UK organisations are demanding in 2025. Read on to discover how to present these skills effectively on your CV, in interviews, and through practical proof of experience.

The Future of Cybersecurity Jobs: Careers That Don’t Exist Yet

Cyber security has become one of the most critical issues of our age. Once regarded as a technical problem confined to IT departments, it is now a board-level priority, a government mandate, and a daily necessity for individuals. The shift towards cloud services, remote working, connected devices, and artificial intelligence has dramatically increased the risks of digital attacks. In the UK, cyber security is central to national resilience. The government has identified cyber as a “tier one” threat to national security, alongside terrorism and pandemics. The private sector, from banks to retailers, now sees data breaches and ransomware as existential risks. Global spending on cyber security is projected to exceed $250 billion by 2030, with the UK already home to a thriving cyber industry employing tens of thousands. Yet, as powerful as the industry already is, we are only at the beginning. The technologies shaping the next two decades—AI, quantum computing, edge computing, extended reality, and biotechnology—will radically reshape cyber security. Many of the most vital cyber security jobs of the future don’t exist yet. This article explores why new roles will emerge, the careers likely to appear, how today’s jobs will evolve, why the UK is well-positioned, and how professionals can prepare now.

Seasonal Hiring Peaks for Cybersecurity Jobs: The Best Months to Apply & Why

The UK's cybersecurity sector has emerged as one of the most critical and lucrative technology markets, with roles spanning from security analysts to penetration testers and chief information security officers. With cybersecurity positions commanding salaries from £28,000 for junior security analysts to £140,000+ for senior security architects, understanding when organisations actively recruit can dramatically impact your career trajectory in this essential field. Unlike traditional IT sectors, cybersecurity hiring follows distinct patterns influenced by threat landscapes, regulatory compliance cycles, and incident response requirements. The sector's unique combination of perpetual threat evolution, regulatory pressures, and skills shortages creates predictable hiring windows that strategic professionals can leverage to advance their careers in protecting Britain's digital infrastructure. This comprehensive guide explores the optimal timing for cybersecurity job applications in the UK, examining how cyber threat cycles, compliance deadlines, and government initiatives influence recruitment patterns, and why strategic timing can determine whether you join a cutting-edge security consultancy or miss the opportunity to defend against tomorrow's cyber threats.