Disclaimer: Hunt UK Visa Sponsors aggregates job listings from publicly available sources, such as search engines, to assist with your job hunting. We do not claim affiliation with Coforge. For the most up-to-date job details, please visit the official website by clicking "Apply Now."
Job Title: Cybersecurity SME
Work Location: Telford, Shropshire
Department: Information Security & Risk Management
Reports To: Chief Information Security Officer (CISO) / Head of Information Assurance, security, ensuring compliance with frameworks such as UK GDPR
We at Coforge are hiring Cybersecurity SME with the following skillset:
Job Summary:
We are looking for a Cybersecurity SME in the UK (based out of Telford, Shropshire) with a strong experience of – Data Protection, Application & Cloud Data Security
Key Responsibilities:
Information Security Governance & Compliance:
• Develop and maintain security policies, standards, and procedures aligned with UK GDPR and other compliance.
• Conduct risk assessments and support DPIAs for systems processing sensitive data (e.g., PII, PHI).
• Ensure security controls are embedded across enterprise platforms including Pega CRM, contact center systems, and cloud data environments
. Data Protection & DLP:
• Design and implement DLP strategies across endpoints, cloud storage, and enterprise applications. • Enforce data classification, encryption, and access control policies for regulated data.
• Collaborate with stakeholders to ensure compliance with data protection regulations and privacy-by-design principles.
Cloud Data Security:
• Define and enforce security controls for structured and unstructured data stored in cloud platforms AWS S3.
• Implement encryption, key management, and access governance for cloud data.
• Monitor data flows between cloud services and on-prem systems to prevent unauthorized access or data leakage.
• Integrate cloud-native security tools ( AWS Macie) for data discovery and classification.
Security Monitoring & SIEM:
• Integrate with SIEM platforms e.g., Splunk for real-time monitoring and threat detection.
• Integrate logs and telemetry from Pega CRM, telephony/contact center platforms, and cloud data services.
• Define correlation rules and alerts for proactive incident detection and response.
Application Security:
• Conduct secure code reviews, threat modelling, and vulnerability assessments.
• Work with development and operations teams to integrate security into the SDLC and CI/CD pipelines.
Copyright © 2025