Senior Security Consultant (Data Loss Prevention)

Rackspace
London
1 month ago
Applications closed

Related Jobs

View all jobs

Senior Security Consultant - Security Architecture

Senior Security Consultant, ProServe (ASEAN), Security, Risk & Compliance

Senior Security Consultant (Architecture - IDAM Engineer )

Senior OT Cyber Security Consultant

Security Consultant – PCNSE, Firewalls, Hybrid (3d/w London) Outside IR35 - £600/day

Senior Application Security Consultant

Rackspace Technology is a leading provider of expertise and managed services across all the major public and private cloud technologies. We've evolved Fanatical Support to encompass the entire customer journey - providing Fanatical Experience from first consultation to daily operations. Our passionate experts combine the power of proactive, always-on service and expertise with best-in-class tools and automation to deliver technology when and how our customers need it.

Any additional information you require for this job can be found in the below text Make sure to read thoroughly, then apply.

We are looking for an experienced Security Consultant with Data Loss Prevention expertise, to support and drive our 'Virtual DPO' (DPO-as-a-service) offerings. You will align to the needs of the customer, which may include helping to architect the technical aspect of data protection, as well as helping to define the governance framework for data information security and work with technical teams to help implement DLP solutions for our customers.

The ideal candidate will have a proven track record in Data Classification and Handling, Data Discovery, enabling DLP policies and Monitoring, as well as reviewing Structured and Unstructured Data. We are looking for hands-on experience in the technical implementation of DLP solutions e.g. Microsoft Purview, Symantec, Forcepoint, Trellix, McAfee, Digital Guardian, Trend Micro, etc.

Location : This role will be based 3 days p/week on-site with the customer (Central London).

Job Description

Serve as the primary contact and customer liaison for the technical side of all data protection related matters.Identify risky data elements and deploy data loss prevention measures.Review data architecture and make recommendations for data discovery capabilities (both structured and unstructured data).Enable data classification and handling capabilities for unstructured data, likely using native Microsoft 365 tools.Align technical data protection measures with corporate risk appetite.Build use cases for Data Access Management (DAM) and Data Access Governance (DAG), and deploy suitable measures, ideally leveraging existing cloud-native capabilities.Participate in the Data and Information Technology Governance Committees.Preparing and implementing various appropriate GDPR/Data Protection guidelines, policies and notices;Assisting in proactively designing risk mitigation strategies, procedures and guidelines adapted to emerging privacy, cloud, AI and cybersecurity threats, market industry developments and regulatory changes.As the Security business continues to grow its Virtual DPO footprint, you may be required to lead a team of Security Consultants.You will be responsible for developing new services, and improving existing ones, and communicating these services to stakeholders.You should be comfortable liaising with internal key stakeholders at all levels (up to CxO level), influencing complex decisions.

About Rackspace Technology

We are the multicloud solutions experts. We combine our expertise with the world's leading technologies - across applications, data and security - to deliver end-to-end solutions. We have a proven record of advising customers based on their business challenges, designing solutions that scale, building and managing those solutions, and optimizing returns into the future. Named a best place to work, year after year according to Fortune, Forbes and Glassdoor, we attract and develop world-class talent. Join us on our mission to embrace technology, empower customers and deliver the future.

More on Rackspace Technology

Though we're all different, Rackers thrive through our connection to a central goal: to be a valued member of a winning team on an inspiring mission. We bring our whole selves to work every day. And we embrace the notion that unique perspectives fuel innovation and enable us to best serve our customers and communities around the globe. We welcome you to apply today and want you to know that we are committed to offering equal employment opportunity without regard to age, color, disability, gender reassignment or identity or expression, genetic information, marital or civil partner status, pregnancy or maternity status, military or veteran status, nationality, ethnic or national origin, race, religion or belief, sexual orientation, or any legally protected characteristic. If you have a disability or special need that requires accommodation, please let us know.#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.