Microsoft purview and Entra SME
Listed on 2026-02-17
-
IT/Tech
Cybersecurity
Location: Greater London
If you need support in completing the application or if you require a different format of this document, please get in touch with at or call TCS London Office number with the subject line: “Application Support Request”.
Role: MS Purview and M365 Defender XDR SME
Job Type: Permanent
Location: London
Are you looking to utilize your skills in Microsoft?
Make a meaningful impact as a MS Purview and M365 Defender XDR SME!
Careers at TCS:
It means more
TCS is a purpose‑led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.
- Gain exposure to innovative technology.
- Work with customers and identify opportunities to support their strategy and improve various processes across functions.
- Gain access to endless learning opportunities.
As an MS Purview and M365 Defender XDR SME
, you will be a proactive and skilled Microsoft Security Engineer or Analyst tasked with safeguarding digital assets by leveraging a comprehensive suite of Microsoft security technologies. The ideal candidate will have experience using Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response.
All of these will be based on collaborating with other teams to maintain and improve the organization’s overall security posture.
Key responsibilities:
- Design, implement, and manage Data Loss Prevention (DLP) policies to prevent unauthorized data sharing including deploying and maintaining Information Protection policies (AIP/MPIP), such as sensitivity labels.
- Configure and monitor policies to detect, investigate, and act on malicious or unintentional activities that could lead to data leakage or security incidents.
- Monitor and investigate communications within the organization to detect and address potential violations of corporate policy or regulatory standards.
- Manage and secure user, group, and workload identities including administering App & Enterprise App registrations and managing guest access for B2B (business‑to‑business) and B2C (business‑to‑consumer) scenarios.
- Develop and manage Conditional Access (CA) policies to enforce granular access controls, including Multi‑Factor Authentication (MFA), based on user, device, and location.
- Implement and manage Self‑Service Password Reset (SSPR) and Password Writeback to ensure seamless and secure user experience.
- Act as a subject matter expert for the core components of the Defender XDR suite.
- Manage endpoint protection, detection, and response across our device fleet.
- Protect against email‑based threats, including phishing, malicious attachments, and compromised links.
- Monitor on‑premises Active Directory signals to identify and investigate threats related to compromised identities.
- Enforce security policies and provide threat protection across our cloud applications.
- Prioritize and address critical vulnerabilities and misconfigurations based on a risk‑based assessment.
- Work with internal IT and other security teams to ensure the effectiveness of the platform.
- Serve as a point of contact for external services like Microsoft Defender Experts for proactive hunting and expert guidance.
- Document incident response procedures, create reports on security posture, and provide regular briefings to leadership.
- Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed.
- Utilize DSPM capabilities to understand data risk, identify sensitive data across the environment, and implement controls to mitigate including managing data security posture related to AI applications and…
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search: