At a Glance
- Tasks: Manage security and compliance for Microsoft 365 environments, ensuring data protection and governance.
- Company: Join a leading tech firm focused on innovative security solutions.
- Benefits: Flexible freelance role with competitive pay and opportunities for skill development.
- Other info: Dynamic work environment with potential for career advancement.
- Why this job: Be at the forefront of cybersecurity, making a real difference in data protection.
- Qualifications: Experience in Microsoft security tools and a passion for data governance.
The predicted salary is between 60000 - 80000 ÂŁ per year.
Purpose of the Role: The M365 / Entra Security & Governance Specialist owns the security posture, data governance, and compliance alignment of the customer's Microsoft estate. The role designs and operates Zero Trust controls, threat protection, information protection, insider risk management, and the audit / evidence machinery required to demonstrate alignment with ISO 27001, GDPR, NIST CSF and Microsoft's Secure Score baselines. The customer processes personal and special‑category data for public‑sector programmes. The role therefore carries direct accountability for protecting beneficiary data, ensuring lawful processing within the EEA, and providing evidence of control effectiveness to the customer's Cyber Security team and external auditors. This is a senior, hands‑on technical role – not a paper‑only governance position.
Key Technical Responsibilities
- Operate Microsoft Defender XDR across Defender for Endpoint, Defender for Office 365 (Plan 2), Defender for Identity, Defender for Cloud Apps, and Defender Vulnerability Management.
- Manage Defender for Endpoint deployment, onboarding via Intune, GPO or script, attack surface reduction rules, EDR in block mode, automated investigation and response, tamper protection, and live response.
- Tune Defender for Office 365 anti‑phishing, Safe Links, Safe Attachments, anti‑spoofing, impersonation protection, attack simulation training, and Threat Explorer queries.
- Operate Defender for Identity sensors on domain controllers and ADFS servers; investigate identity‑based attack paths (DCSync, Golden Ticket, Pass‑the‑Hash) and remediate exposures.
- Operate Defender for Cloud Apps for SaaS discovery, OAuth app governance, conditional access app control, session policies, and shadow‑IT reporting.
- Investigate alerts and incidents in the Defender XDR portal using KQL advanced hunting; build custom detections, suppression rules, and automated playbooks.
SIEM and SOAR – Microsoft Sentinel
- Operate Microsoft Sentinel for the estate: data connectors (M365, Entra, Defender XDR, Azure Activity, Office 365, Threat Intelligence, Syslog/CEF), workspace architecture, retention, and cost optimisation.
- Author analytics rules (scheduled, NRT, Fusion, Microsoft Security), build watchlists, threat intelligence integrations (TAXII / MISP), and User Entity Behaviour Analytics.
- Develop KQL detection content aligned to MITRE ATT&CK; operate hunting queries, bookmarks, and incident investigation graphs.
- Build SOAR automation using Azure Logic Apps playbooks for incident enrichment, containment (e.g., disable user, force password reset, isolate device), and notification.
- Operate the 24/7 Sentinel‑based monitoring stack in collaboration with the NOC analyst function.
Information Protection and Data Governance – Microsoft Purview
- Design and operate Microsoft Purview Information Protection: sensitivity labels, label policies, auto‑labelling, encryption with rights management, and co‑authoring on encrypted documents.
- Build and tune Data Loss Prevention policies for Exchange, SharePoint, OneDrive, Teams chat, Endpoint DLP, and Power Platform; manage policy tips, overrides, and incident review.
- Operate Insider Risk Management policies, content explorer, activity explorer, and communication compliance where in scope.
- Design retention policies and labels, and records management aligned to the customer's records retention schedules and applicable public‑sector records management frameworks.
- Operate eDiscovery (Standard and Premium): cases, holds, collections, reviews, custodian management, and chain‑of‑custody documentation.
- Operate Microsoft Purview Data Map, Data Catalog, and Data Estate Insights for the Microsoft Fabric / Power BI estate, including lineage, classification scans, and Data Loss Prevention for Fabric.
- Maintain audit and reporting using Purview Audit, Compliance Manager templates (ISO 27001, GDPR, NIS2), and customer‑managed Compliance Manager assessments.
Identity Security and Zero Trust
- Define and maintain the Conditional Access policy baseline using a documented policy framework (Persona‑based or Microsoft Zero Trust deployment guidance), including emergency / break‑glass access, named locations, and report‑only validation.
- Operate Entra ID Protection – sign‑in risk, user risk, risk policies, and risk investigation – including alignment with Defender XDR for unified incident view.
- Govern privileged access via PIM, role‑assignable groups, access reviews, and Just‑In‑Time elevation; co‑own break‑glass account procedures with the AD/Entra Specialist.
- Operate Entra Permissions Management (CIEM) where licensed, providing visibility of multi‑cloud permission risk.
Compliance and Audit
- Maintain ISO 27001 control evidence and align with the customer's certification and surveillance audits; act as the technical lead for any audit observation related to the Microsoft estate.
- Maintain GDPR records of processing, support Data Protection Impact Assessments for new applications, and operate technical and organisational measures (TOMs).
- Map controls to NIST CSF, NIS2, and Microsoft Secure Score / Identity Secure Score; maintain a target posture and quarterly improvement plan.
- Produce monthly security KPIs for the SLA report – Secure Score trend, MFA coverage, DLP incidents, phishing simulation results, vulnerability remediation, patch compliance.
- Prepare quarterly executive risk reports.
Microsoft Copilot and AI Governance
- Operate the security envelope for Microsoft 365 Copilot and Copilot Studio including SharePoint sharing hygiene, sensitivity‑label‑aware grounding, restricted SearchableContent, and Copilot interaction audit log review.
- Define and enforce a Responsible AI policy aligned with Microsoft's Responsible AI Standard – fairness, reliability, safety, privacy, security, inclusiveness, transparency, and accountability.
Mandatory Technical Skills
- Microsoft Defender XDR (full stack) and Microsoft Sentinel – analytics, hunting (KQL), incident management, and SOAR playbook authoring.
- Microsoft Purview – Information Protection, DLP, Insider Risk, Records Management, eDiscovery, Audit, and Compliance Manager.
- Entra ID security – Conditional Access, MFA, PIM, Identity Protection, External Identities, and Permissions Management.
- Zero Trust architecture per Microsoft Zero Trust deployment guidance; ability to lead a Zero Trust roadmap discussion with senior stakeholders.
- ISO 27001:2022 control set; GDPR Articles 5, 6, 9, 25, 28, 30, 32–34; awareness of NIS2 and applicable national cybersecurity guidance.
- KQL (Kusto Query Language) – fluent across Defender Advanced Hunting, Sentinel, and Log Analytics.
- PowerShell automation across Microsoft Graph Security, ExchangeOnlineManagement, and Compliance modules.
Desirable Technical Skills
- Threat hunting using Sigma rules, MITRE ATT&CK navigator, and STIX/TAXII intel feeds.
- Familiarity with on‑premises PAM (CyberArk, BeyondTrust) and hybrid SOC tooling beyond Microsoft.
- Microsoft Fabric / Purview Data Loss Prevention (Fabric DLP) and AI hub for Purview.
- Familiarity with Cyber Essentials Plus, NCSC Cyber Assessment Framework (CAF), and ENISA guidance.
Required Certifications
- Microsoft Certified – Security Operations Analyst Associate (SC‑200) – mandatory.
- Microsoft Certified – Information Protection and Compliance Administrator Associate (SC‑400) – mandatory.
- Microsoft Certified – Identity and Access Administrator Associate (SC‑300) – mandatory.
- Microsoft Certified – Cybersecurity Architect Expert (SC‑100) – preferred.
- ISO/IEC 27001 Lead Implementer or Lead Auditor – preferred.
M365 / Entra Security & Governance Specialist (Freelance/Contract) in Maidenhead employer: Data Controller, VE Ltd
Contact Detail:
Data Controller, VE Ltd Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land M365 / Entra Security & Governance Specialist (Freelance/Contract) in Maidenhead
✨Tip Number 1
Network like a pro! Attend industry meetups, webinars, or local tech events. It's all about making connections and getting your name out there. You never know who might have the inside scoop on job openings!
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects and expertise in M365 and Entra Security. This gives potential employers a taste of what you can do beyond just a CV.
✨Tip Number 3
Prepare for interviews like a champ! Research the company and its security posture, and be ready to discuss how you can enhance their compliance and governance strategies. Tailor your answers to reflect their needs.
✨Tip Number 4
Apply through our website! We make it easy for you to find roles that match your skills. Plus, it shows you're genuinely interested in working with us. Don't miss out on the chance to land that dream job!
We think you need these skills to ace M365 / Entra Security & Governance Specialist (Freelance/Contract) in Maidenhead
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the M365 / Entra Security & Governance Specialist role. Highlight relevant experience and skills that match the job description, especially around Microsoft Defender and compliance frameworks.
Craft a Compelling Cover Letter: Your cover letter should tell us why you're the perfect fit for this role. Share specific examples of your past work with security posture and data governance, and how you’ve tackled similar challenges in the past.
Show Off Your Technical Skills: Don’t hold back on showcasing your technical skills! Mention your experience with KQL, Microsoft Sentinel, and any relevant certifications. We want to see how you can contribute to our team right from the start.
Apply Through Our Website: We encourage you to apply through our website for a smoother application process. It helps us keep track of your application and ensures you don’t miss out on any important updates!
How to prepare for a job interview at Data Controller, VE Ltd
✨Know Your Stuff
Make sure you’re well-versed in Microsoft Defender XDR, Sentinel, and Purview. Brush up on your KQL skills and be ready to discuss how you've used these tools in real-world scenarios. The more specific examples you can provide, the better!
✨Understand Zero Trust
Since this role revolves around Zero Trust architecture, ensure you can explain its principles clearly. Be prepared to discuss how you would implement a Zero Trust strategy and what challenges you might face. This shows you’re not just familiar with the concept but can apply it practically.
✨Compliance is Key
Familiarise yourself with ISO 27001, GDPR, and NIST CSF. Be ready to talk about how you’ve ensured compliance in past roles, including any audits you’ve managed. This will demonstrate your understanding of the regulatory landscape and your ability to navigate it.
✨Ask Insightful Questions
Prepare some thoughtful questions about the company’s current security posture and future plans. This shows your genuine interest in the role and helps you gauge if the company aligns with your career goals. Plus, it gives you a chance to showcase your knowledge!