At a Glance
- Tasks: Own the security and compliance of Microsoft environments while designing Zero Trust controls.
- Company: Join a leading tech firm focused on innovative security solutions.
- Benefits: Enjoy competitive pay, flexible working options, and opportunities for professional growth.
- Other info: Be part of a dynamic team with excellent career advancement potential.
- Why this job: Make a real difference in data protection and governance for public-sector programmes.
- Qualifications: Experience in Microsoft security tools and a passion for data governance.
The predicted salary is between 60000 - 80000 € per year.
The M365 / Entra Security & Governance Specialist owns the security posture, data governance, and compliance alignment of the customer's Microsoft estate. The role designs and operates Zero Trust controls, threat protection, information protection, insider risk management, and the audit / evidence machinery required to demonstrate alignment with ISO 27001, GDPR, NIST CSF and Microsoft's Secure Score baselines. The customer processes personal and special-category data on behalf of public‑sector programmes. The role therefore carries direct accountability for protecting beneficiary data, ensuring lawful processing within the EEA, and providing evidence of control effectiveness to the customer's Cyber Security team and external auditors. This is a senior, hands‑on technical role – not a paper‑only governance position.
Key Technical Responsibilities
- Threat Protection - Microsoft Defender XDR: Operate Microsoft Defender XDR across Defender for Endpoint, Defender for Office 365 (Plan 2), Defender for Identity, Defender for Cloud Apps, and Defender Vulnerability Management. Manage Defender for Endpoint deployment, onboarding (via Intune / GPO / script), attack surface reduction (ASR) rules, EDR in block mode, automated investigation and response (AIR), tamper protection, and live response. Tune Defender for Office 365 anti‑phishing, Safe Links, Safe Attachments, anti‑spoofing, impersonation protection, attack simulation training, and Threat Explorer queries. Operate Defender for Identity sensors on domain controllers and ADFS servers; investigate identity‑based attack paths (DCSync, Golden Ticket, Pass‑the‑Hash) and remediate exposures. Operate Defender for Cloud Apps for SaaS discovery, OAuth app governance, conditional access app control (reverse proxy), session policies, and shadow IT reporting. Investigate alerts and incidents in the Defender XDR portal using KQL advanced hunting; build custom detections, suppression rules, and automated playbooks.
- SIEM and SOAR - Microsoft Sentinel: Operate Microsoft Sentinel for the estate: data connectors (M365, Entra, Defender XDR, Azure Activity, Office 365, Threat Intelligence, Syslog/CEF), workspace architecture, retention, and cost optimisation. Author analytics rules (scheduled, NRT, Fusion, Microsoft Security), build watchlists, threat intelligence integrations (TAXII / MISP), and User Entity Behaviour Analytics (UEBA). Develop KQL detection content aligned to MITRE ATT&CK; operate hunting queries, bookmarks, and incident investigation graphs. Build SOAR automation using Azure Logic Apps playbooks for incident enrichment, containment (e.g., disable user, force password reset, isolate device), and notification. Operate the 24/7 Sentinel‑based monitoring stack in collaboration with the NOC analyst function.
- Information Protection and Data Governance - Microsoft Purview: Design and operate Microsoft Purview Information Protection: sensitivity labels, label policies, auto‑labelling (client and service‑side), encryption with rights management, and co‑authoring on encrypted documents. Build and tune Data Loss Prevention (DLP) policies for Exchange, SharePoint, OneDrive, Teams chat, Endpoint DLP and Power Platform; manage policy tips, overrides, and incident review. Operate Insider Risk Management policies, content explorer, activity explorer, and communication compliance where in scope. Design retention policies, retention labels, and records management aligned to the customer's records retention schedules and applicable public‑sector records management frameworks. Operate eDiscovery (Standard and Premium): cases, holds, collections, reviews, custodian management, and chain‑of‑custody documentation. Operate Microsoft Purview Data Map, Data Catalog, and Data Estate Insights for the Microsoft Fabric / Power BI estate, including lineage, classification scans, and Data Loss Prevention for Fabric. Maintain audit and reporting using Purview Audit (Standard / Premium), Compliance Manager templates (ISO 27001, GDPR, NIS2), and customer‑managed Compliance Manager assessments.
- Identity Security and Zero Trust: Define and maintain the Conditional Access policy baseline using a documented policy framework (Persona‑based or Microsoft Zero Trust deployment guidance), including emergency / break‑glass access, named locations, and report‑only validation. Operate Entra ID Protection - sign‑in risk, user risk, risk policies, and risk investigation - including alignment with Defender XDR for unified incident view. Govern privileged access via PIM, role‑assignable groups, access reviews, and Just‑In‑Time elevation; co‑own break‑glass account procedures with the AD/Entra Specialist. Operate Entra Permissions Management (CIEM) where licensed, providing visibility of multi‑cloud permission risk.
- Compliance and Audit: Maintain ISO 27001 control evidence and align with the customer's certification and surveillance audits; act as the technical lead for any audit observation related to the Microsoft estate. Maintain GDPR records of processing, support Data Protection Impact Assessments for new applications, and operate technical and organisational measures (TOMs). Map controls to NIST CSF, NIS2 (where applicable as an essential / important entity), and Microsoft Secure Score / Identity Secure Score; maintain a target posture and quarterly improvement plan. Produce monthly security KPIs for the SLA report - Secure Score trend, MFA coverage, DLP incidents, phishing simulation results, vulnerability remediation, patch compliance - and quarterly executive risk reports.
- Microsoft Copilot and AI Governance: Operate the security envelope for Microsoft 365 Copilot and Copilot Studio including SharePoint sharing hygiene ('oversharing'), sensitivity‑label‑aware grounding, restricted SearchableContent, and Copilot interaction audit log review. Define and enforce a Responsible AI policy aligned with Microsoft's Responsible AI Standard - fairness, reliability, safety, privacy, security, inclusiveness, transparency, and accountability.
Mandatory Technical Skills
- Microsoft Defender XDR (full stack) and Microsoft Sentinel - analytics, hunting (KQL), incident management, and SOAR playbook authoring.
- Microsoft Purview - Information Protection, DLP, Insider Risk, Records Management, eDiscovery, Audit, and Compliance Manager.
- Entra ID security: Conditional Access, MFA, PIM, Identity Protection, External Identities, and Permissions Management.
- Zero Trust architecture knowledge per Microsoft Zero Trust deployment guidance; ability to lead a Zero Trust roadmap discussion with senior stakeholders.
- ISO 27001:2022 control set; GDPR Articles 5, 6, 9, 25, 28, 30, 32‑34; awareness of NIS2 and applicable national cyber‑security guidance.
- KQL (Kusto Query Language) - fluent across Defender Advanced Hunting, Sentinel, and Log Analytics.
- PowerShell automation across Microsoft Graph Security, ExchangeOnlineManagement, and Compliance modules.
Desirable Technical Skills
- Threat hunting using Sigma rules, MITRE ATT&CK navigator, and STIX/TAXII intel feeds.
- SOC operations experience - shift handover, evidence preservation, incident lifecycle (NIST SP 800‑61).
- Familiarity with on‑premises PAM (CyberArk, BeyondTrust) and hybrid SOC tooling beyond Microsoft.
- Microsoft Fabric / Purview Data Loss Prevention (Fabric DLP) and AI hub for Purview.
- Familiarity with Cyber Essentials Plus, NCSC Cyber Assessment Framework (CAF), and ENISA guidance.
Required Certifications
- Microsoft Certified: Security Operations Analyst Associate (SC‑200) - mandatory.
- Microsoft Certified: Information Protection and Compliance Administrator Associate (SC‑400) - mandatory.
- Microsoft Certified: Identity and Access Administrator Associate (SC‑300) - mandatory.
- Microsoft Certified: Cybersecurity Architect Expert (SC‑100) - preferred.
- ISO/IEC 27001 Lead Implementer or Lead Auditor - preferred.
- CISSP, CISM, or equivalent - desirable.
M365 / Entra Security & Governance Specialist in Thatcham employer: VE3
As a leading employer in the cybersecurity sector, we offer our M365 / Entra Security & Governance Specialists a dynamic work environment that prioritises innovation and collaboration. Our commitment to employee growth is evident through continuous training opportunities and a culture that values diversity and inclusion, ensuring that every team member can thrive while contributing to the protection of critical public-sector data. Located in a vibrant area, we provide competitive benefits and a supportive atmosphere that fosters both personal and professional development.
StudySmarter Expert Advice🤫
We think this is how you could land M365 / Entra Security & Governance Specialist in Thatcham
✨Tip Number 1
Network, network, network! Get out there and connect with folks in the industry. Attend meetups, webinars, or even online forums related to M365 and security. You never know who might have a lead on your dream job!
✨Tip Number 2
Show off your skills! Create a portfolio or GitHub repository showcasing your projects, especially those involving Microsoft Defender XDR or Sentinel. This gives potential employers a taste of what you can do beyond just a CV.
✨Tip Number 3
Prepare for interviews like a pro. Research common questions for M365 Security roles and practice your answers. Be ready to discuss your hands-on experience with tools like Microsoft Purview and KQL – they’ll want to see you know your stuff!
✨Tip Number 4
Don’t forget to apply through our website! We’ve got loads of opportunities waiting for you, and applying directly can sometimes give you an edge. Plus, it’s super easy to keep track of your applications that way!
We think you need these skills to ace M365 / Entra Security & Governance Specialist in Thatcham
Some tips for your application 🫡
Tailor Your CV:Make sure your CV is tailored to the M365 / Entra Security & Governance Specialist role. Highlight your relevant experience with Microsoft Defender, Sentinel, and Purview, and don’t forget to mention any certifications you have that align with the job description.
Craft a Compelling Cover Letter:Your cover letter is your chance to shine! Use it to explain why you're passionate about security and governance in the Microsoft ecosystem. Share specific examples of how you've successfully managed security postures or compliance in previous roles.
Show Off Your Technical Skills:This role is all about technical expertise, so be sure to showcase your skills in KQL, PowerShell, and Zero Trust architecture. Mention any hands-on experience you have with threat protection and data governance tools, as this will set you apart from other candidates.
Apply Through Our Website:We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing applications come directly from our site!
How to prepare for a job interview at VE3
✨Know Your Stuff
Make sure you’re well-versed in Microsoft Defender XDR, Sentinel, and Purview. Brush up on your KQL skills and be ready to discuss how you've used these tools in real-world scenarios. The interviewers will want to see that you can apply your knowledge practically.
✨Showcase Your Experience
Prepare specific examples of how you've managed security postures and compliance in previous roles. Highlight your hands-on experience with Zero Trust controls and data governance, especially in public-sector contexts. This will demonstrate your capability to handle the responsibilities of the role.
✨Understand the Compliance Landscape
Familiarise yourself with ISO 27001, GDPR, and NIST CSF. Be ready to discuss how you’ve ensured compliance in past projects. Showing that you understand the importance of these frameworks will set you apart from other candidates.
✨Ask Insightful Questions
Prepare thoughtful questions about the company's security strategies and challenges they face. This shows your genuine interest in the role and helps you assess if the company aligns with your career goals. Plus, it gives you a chance to engage in a meaningful conversation.