×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Microsoft purview and Entra SME

Job in Greater London, London, Greater London, W1B, England, UK
Listing for: Tata Consultancy Services
Full Time position
Listed on 2026-02-17
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below
Position: Microsoft purview and Entra ID SME
Location: Greater London

If you need support in completing the application or if you require a different format of this document, please get in touch with at or call TCS London Office number with the subject line: “Application Support Request”.

Role: MS Purview and M365 Defender XDR SME

Job Type: Permanent

Location: London

Are you looking to utilize your skills in Microsoft?

Make a meaningful impact as a MS Purview and M365 Defender XDR SME!

Careers at TCS:
It means more

TCS is a purpose‑led transformation company, built on belief. We do not just help businesses to transform through technology. We support them in making a meaningful difference to the people and communities they serve - our clients include some of the biggest brands in the UK and worldwide. For you, it means more to make an impact that matters, through challenging projects which demand ambitious innovation and thought leadership.

  • Gain exposure to innovative technology.
  • Work with customers and identify opportunities to support their strategy and improve various processes across functions.
  • Gain access to endless learning opportunities.
The Role

As an MS Purview and M365 Defender XDR SME
, you will be a proactive and skilled Microsoft Security Engineer or Analyst tasked with safeguarding digital assets by leveraging a comprehensive suite of Microsoft security technologies. The ideal candidate will have experience using Microsoft Defender XDR for managing and responding to threats, implement Microsoft Purview to ensure data compliance, and secure identities and access through Microsoft Entra  responsibilities will include threat management, proactive hunting for vulnerabilities, data protection, security posture management, and incident response.

All of these will be based on collaborating with other teams to maintain and improve the organization’s overall security posture.

Key responsibilities:

  • Design, implement, and manage Data Loss Prevention (DLP) policies to prevent unauthorized data sharing including deploying and maintaining Information Protection policies (AIP/MPIP), such as sensitivity labels.
  • Configure and monitor policies to detect, investigate, and act on malicious or unintentional activities that could lead to data leakage or security incidents.
  • Monitor and investigate communications within the organization to detect and address potential violations of corporate policy or regulatory standards.
  • Manage and secure user, group, and workload identities including administering App & Enterprise App registrations and managing guest access for B2B (business‑to‑business) and B2C (business‑to‑consumer) scenarios.
  • Develop and manage Conditional Access (CA) policies to enforce granular access controls, including Multi‑Factor Authentication (MFA), based on user, device, and location.
  • Implement and manage Self‑Service Password Reset (SSPR) and Password Writeback to ensure seamless and secure user experience.
  • Act as a subject matter expert for the core components of the Defender XDR suite.
  • Manage endpoint protection, detection, and response across our device fleet.
  • Protect against email‑based threats, including phishing, malicious attachments, and compromised links.
  • Monitor on‑premises Active Directory signals to identify and investigate threats related to compromised identities.
  • Enforce security policies and provide threat protection across our cloud applications.
  • Prioritize and address critical vulnerabilities and misconfigurations based on a risk‑based assessment.
  • Work with internal IT and other security teams to ensure the effectiveness of the platform.
  • Serve as a point of contact for external services like Microsoft Defender Experts for proactive hunting and expert guidance.
  • Document incident response procedures, create reports on security posture, and provide regular briefings to leadership.
  • Implement policies for records management and retention to ensure that data is retained according to legal and business requirements and securely disposed of when no longer needed.
  • Utilize DSPM capabilities to understand data risk, identify sensitive data across the environment, and implement controls to mitigate including managing data security posture related to AI applications and…
Note that applications are not being accepted from your jurisdiction for this job currently via this jobsite. Candidate preferences are the decision of the Employer or Recruiting Agent, and are controlled by them alone.
To Search, View & Apply for jobs on this site that accept applications from your location or country, tap here to make a Search:
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary