M365 / Entra Security & Governance Specialist in Maidenhead
M365 / Entra Security & Governance Specialist

M365 / Entra Security & Governance Specialist in Maidenhead

Maidenhead Full-Time 60000 - 80000 £ / year (est.) No home office possible
VE3

At a Glance

  • Tasks: Manage security and compliance for Microsoft 365 environments, ensuring data protection and governance.
  • Company: Join a leading tech firm focused on innovative security solutions.
  • Benefits: Attractive salary, flexible working options, and opportunities for professional growth.
  • Other info: Dynamic role with potential for career advancement in a fast-paced environment.
  • Why this job: Be at the forefront of cybersecurity, protecting vital data and making a real difference.
  • Qualifications: Experience in Microsoft security tools and a passion for data governance.

The predicted salary is between 60000 - 80000 £ per year.

The M365 / Entra Security & Governance Specialist owns the security posture, data governance, and compliance alignment of the customer's Microsoft estate. The role designs and operates Zero Trust controls, threat protection, information protection, insider risk management, and the audit / evidence machinery required to demonstrate alignment with ISO 27001, GDPR, NIST CSF and Microsoft's Secure Score baselines.

The customer processes personal and special-category data on behalf of public-sector programmes. The role therefore carries direct accountability for protecting beneficiary data, ensuring lawful processing within the EEA, and providing evidence of control effectiveness to the customer's Cyber Security team and external auditors. This is a senior, hands-on technical role — not a paper-only governance position.

Key Technical Responsibilities:

  • Threat Protection — Microsoft Defender XDR
    • Operate Microsoft Defender XDR across Defender for Endpoint, Defender for Office 365 (Plan 2), Defender for Identity, Defender for Cloud Apps, and Defender Vulnerability Management.
    • Manage Defender for Endpoint deployment, onboarding (via Intune / GPO / script), attack surface reduction (ASR) rules, EDR in block mode, automated investigation and response (AIR), tamper protection, and live response.
    • Tune Defender for Office 365 anti-phishing, Safe Links, Safe Attachments, anti-spoofing, impersonation protection, attack simulation training, and Threat Explorer queries.
    • Operate Defender for Identity sensors on domain controllers and ADFS servers; investigate identity-based attack paths (DCSync, Golden Ticket, Pass-the-Hash) and remediate exposures.
    • Operate Defender for Cloud Apps for SaaS discovery, OAuth app governance, conditional access app control (reverse proxy), session policies, and shadow IT reporting.
    • Investigate alerts and incidents in the Defender XDR portal using KQL advanced hunting; build custom detections, suppression rules, and automated playbooks.
  • SIEM and SOAR — Microsoft Sentinel
    • Operate Microsoft Sentinel for the estate: data connectors (M365, Entra, Defender XDR, Azure Activity, Office 365, Threat Intelligence, Syslog/CEF), workspace architecture, retention, and cost optimisation.
    • Author analytics rules (scheduled, NRT, Fusion, Microsoft Security), build watchlists, threat intelligence integrations (TAXII / MISP), and User Entity Behaviour Analytics (UEBA).
    • Develop KQL detection content aligned to MITRE ATT&CK; operate hunting queries, bookmarks, and incident investigation graphs.
    • Build SOAR automation using Azure Logic Apps playbooks for incident enrichment, containment (e.g., disable user, force password reset, isolate device), and notification.
    • Operate the 24/7 Sentinel-based monitoring stack in collaboration with the NOC analyst function.
  • Information Protection and Data Governance — Microsoft Purview
    • Design and operate Microsoft Purview Information Protection: sensitivity labels, label policies, auto-labelling (client and service-side), encryption with rights management, and co-authoring on encrypted documents.
    • Build and tune Data Loss Prevention (DLP) policies for Exchange, SharePoint, OneDrive, Teams chat, Endpoint DLP and Power Platform; manage policy tips, overrides, and incident review.
    • Operate Insider Risk Management policies, content explorer, activity explorer, and communication compliance where in scope.
    • Design retention policies, retention labels, and records management aligned to the customer's records retention schedules and applicable public-sector records management frameworks.
    • Operate eDiscovery (Standard and Premium): cases, holds, collections, reviews, custodian management, and chain-of-custody documentation.
    • Operate Microsoft Purview Data Map, Data Catalog, and Data Estate Insights for the Microsoft Fabric / Power BI estate, including lineage, classification scans, and Data Loss Prevention for Fabric.
    • Maintain audit and reporting using Purview Audit (Standard / Premium), Compliance Manager templates (ISO 27001, GDPR, NIS2), and customer-managed Compliance Manager assessments.
  • Identity Security and Zero Trust
    • Define and maintain the Conditional Access policy baseline using a documented policy framework (Persona-based or Microsoft Zero Trust deployment guidance), including emergency / break-glass access, named locations, and report-only validation.
    • Operate Entra ID Protection — sign-in risk, user risk, risk policies, and risk investigation — including alignment with Defender XDR for unified incident view.
    • Govern privileged access via PIM, role-assignable groups, access reviews, and Just-In-Time elevation; co-own break-glass account procedures with the AD/Entra Specialist.
    • Operate Entra Permissions Management (CIEM) where licensed, providing visibility of multi-cloud permission risk.
  • Compliance and Audit
    • Maintain ISO 27001 control evidence and align with the customer's certification and surveillance audits; act as the technical lead for any audit observation related to the Microsoft estate.
    • Maintain GDPR records of processing, support Data Protection Impact Assessments for new applications, and operate technical and organisational measures (TOMs).
    • Map controls to NIST CSF, NIS2 (where applicable as an essential / important entity), and Microsoft Secure Score / Identity Secure Score; maintain a target posture and quarterly improvement plan.
    • Produce monthly security KPIs for the SLA report — Secure Score trend, MFA coverage, DLP incidents, phishing simulation results, vulnerability remediation, patch compliance — and quarterly executive risk reports.
  • Microsoft Copilot and AI Governance
    • Operate the security envelope for Microsoft 365 Copilot and Copilot Studio including SharePoint sharing hygiene ('oversharing'), sensitivity-label-aware grounding, restricted SearchableContent, and Copilot interaction audit log review.
    • Define and enforce a Responsible AI policy aligned with Microsoft's Responsible AI Standard — fairness, reliability, safety, privacy, security, inclusiveness, transparency, and accountability.

Mandatory Technical Skills

  • Microsoft Defender XDR (full stack) and Microsoft Sentinel — analytics, hunting (KQL), incident management, and SOAR playbook authoring.
  • Microsoft Purview — Information Protection, DLP, Insider Risk, Records Management, eDiscovery, Audit, and Compliance Manager.
  • Entra ID security: Conditional Access, MFA, PIM, Identity Protection, External Identities, and Permissions Management.
  • Zero Trust architecture knowledge per Microsoft Zero Trust deployment guidance; ability to lead a Zero Trust roadmap discussion with senior stakeholders.
  • ISO 27001:2022 control set; GDPR Articles 5, 6, 9, 25, 28, 30, 32–34; awareness of NIS2 and applicable national cyber-security guidance.
  • KQL (Kusto Query Language) — fluent across Defender Advanced Hunting, Sentinel, and Log Analytics.
  • PowerShell automation across Microsoft Graph Security, ExchangeOnlineManagement, and Compliance modules.

Desirable Technical Skills

  • Threat hunting using Sigma rules, MITRE ATT&CK navigator, and STIX/TAXII intel feeds.
  • SOC operations experience — shift handover, evidence preservation, incident lifecycle (NIST SP 800-61).
  • Familiarity with on-premises PAM (CyberArk, BeyondTrust) and hybrid SOC tooling beyond Microsoft.
  • Microsoft Fabric / Purview Data Loss Prevention (Fabric DLP) and AI hub for Purview.
  • Familiarity with Cyber Essentials Plus, NCSC Cyber Assessment Framework (CAF), and ENISA guidance.

Required Certifications

  • Microsoft Certified: Security Operations Analyst Associate (SC-200) — mandatory.
  • Microsoft Certified: Information Protection and Compliance Administrator Associate (SC-400) — mandatory.
  • Microsoft Certified: Identity and Access Administrator Associate (SC-300) — mandatory.
  • Microsoft Certified: Cybersecurity Architect Expert (SC-100) — preferred.
  • ISO/IEC 27001 Lead Implementer or Lead Auditor — preferred.
  • CISSP, CISM, or equivalent — desirable.

M365 / Entra Security & Governance Specialist in Maidenhead employer: VE3

As an M365 / Entra Security & Governance Specialist, you will thrive in a dynamic work environment that prioritises innovation and collaboration. Our company offers competitive benefits, a strong commitment to employee development, and a culture that values diversity and inclusion, making it an ideal place for professionals seeking to make a meaningful impact in the public sector. Located in a vibrant area, we provide unique opportunities for networking and professional growth while ensuring a healthy work-life balance.
VE3

Contact Detail:

VE3 Recruiting Team

StudySmarter Expert Advice 🤫

We think this is how you could land M365 / Entra Security & Governance Specialist in Maidenhead

✨Tip Number 1

Network, network, network! Get out there and connect with folks in the industry. Attend meetups, webinars, or even just grab a coffee with someone who’s already in the M365 space. You never know who might have a lead on your dream job!

✨Tip Number 2

Show off your skills! Create a portfolio or a personal project that highlights your expertise in Microsoft Defender XDR or Sentinel. This not only demonstrates your capabilities but also gives you something tangible to discuss during interviews.

✨Tip Number 3

Prepare for those interviews like a pro! Research common questions for M365 roles and practice your answers. Be ready to discuss how you’ve handled security challenges in the past, especially around compliance and data governance.

✨Tip Number 4

Don’t forget to apply through our website! We’re always on the lookout for talented individuals who can help us enhance our security posture. Your next big opportunity could be just a click away!

We think you need these skills to ace M365 / Entra Security & Governance Specialist in Maidenhead

Microsoft Defender XDR
Microsoft Sentinel
KQL (Kusto Query Language)
PowerShell automation
Microsoft Purview
Data Loss Prevention (DLP)
Insider Risk Management
eDiscovery
ISO 27001
GDPR compliance
Zero Trust architecture
Conditional Access
Multi-Factor Authentication (MFA)
Identity Protection
Permissions Management

Some tips for your application 🫡

Tailor Your CV: Make sure your CV is tailored to the M365 / Entra Security & Governance Specialist role. Highlight your relevant experience with Microsoft Defender, Sentinel, and Purview, and don’t forget to mention any certifications you hold!

Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about security and governance in the Microsoft ecosystem. Share specific examples of how you've tackled similar challenges in the past.

Showcase Your Technical Skills: Be sure to list all your technical skills that align with the job description. Mention your experience with KQL, PowerShell automation, and Zero Trust architecture. We want to see how you can contribute to our team!

Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensure it gets the attention it deserves. We can’t wait to see what you bring to the table!

How to prepare for a job interview at VE3

✨Know Your Stuff

Make sure you’re well-versed in Microsoft Defender XDR, Sentinel, and Purview. Brush up on your KQL skills and be ready to discuss how you've used these tools in real-world scenarios. The more specific examples you can provide, the better!

✨Understand Zero Trust

Since this role revolves around Zero Trust architecture, ensure you can explain its principles clearly. Be prepared to discuss how you would implement Zero Trust controls and why they are essential for data protection and compliance.

✨Showcase Your Compliance Knowledge

Familiarise yourself with ISO 27001, GDPR, and NIST CSF. Be ready to talk about how you’ve ensured compliance in previous roles and what strategies you would employ to maintain compliance in this position.

✨Ask Insightful Questions

Prepare thoughtful questions that show your interest in the company’s security posture and governance strategies. This not only demonstrates your enthusiasm but also helps you gauge if the company aligns with your values and career goals.

M365 / Entra Security & Governance Specialist in Maidenhead
VE3
Location: Maidenhead

Land your dream job quicker with Premium

You’re marked as a top applicant with our partner companies
Individual CV and cover letter feedback including tailoring to specific job roles
Be among the first applications for new jobs with our AI application
1:1 support and career advice from our career coaches
Go Premium

Money-back if you don't land a job in 6-months

>