More jobs:
Data Security Manager
Job in
Raritan, Somerset County, New Jersey, 08869, USA
Listed on 2026-03-08
Listing for:
HCLTech
Part Time
position Listed on 2026-03-08
Job specializations:
-
IT/Tech
IT Consultant, Cybersecurity, Data Analyst, Systems Analyst
Job Description & How to Apply Below
THIS IS A HYBRID ROLE YOU ARE REQUIRED TO BE IN THE OFFICE 3 DAYS A WEEK TOP SKILLS YOU MUST HAVE:
- data access governance
- data classification
- Microsoft purview
- service-now
The Data Security Consultant will support Project Osprey’s Data Protection & Data Governance program to plan and execute the safe data exception migration and Microsoft sensitivity labeling for existing files and email content being transferred to New Co. The consultant will provide hands‑on configuration guidance, cross‑team coordination, documentation, and operational readiness deliverables to ensure controlled, auditable, and compliant transfer and labeling of sensitive assets.
Scopeof Services
The consultant will perform the following activities:
- Review and update the existing SOW, roadmap, and detailed project plan; document and communicate any scope or schedule changes.
- Kick off and coordinate separation and transfer activities related to Microsoft sensitivity labeling and associated enforcement policies.
- Identify, copy, and catalogue Safe Data Program artifacts (SOPs, knowledge articles, ITForMe content) required for New Co operations.
- Work with IAM to create/configure Safe Data exception groups for USB, fileshare, and webmail use cases in New Co.
- Coordinate with Service Now to replicate and automate exception intake (individual and bulk), and integrate the intake process with IAM workflows.
- Produce a Safe Data Exception inventory that identifies in‑scope users and maps migration needs for USB, fileshare, and webmail exceptions.
- Collaborate with Security Engineering and End User Services (EUS) to define the recommended methodology for configuring and migrating Microsoft sensitivity labels and enforcement policies (subject to Microsoft technical decisions).
- Deliver detailed project artifacts: workstream project plans, timelines, storyboards, step‑by‑step runbooks, FAQs, and training materials for operational teams.
- Produce regular status reporting (monthly and quarterly), capture stakeholder feedback, and highlight milestones, risks, issues, and opportunities.
- Provide ongoing Data Security consultation and subject‑matter expert support throughout the engagement.
- Updated SOW, roadmap, and change log.
- Kickoff briefing and separation/transfer plan for sensitivity labeling.
- Catalog of Safe Data Program artifacts (SOPs, knowledge articles, ITForMe).
- Configured IAM exception groups and documented configuration steps.
- Service Now exception intake design and automation specification, with IAM integration.
- Safe Data Exception inventory (CSV/recorded dataset) with migration recommendations.
- Technical approach and recommendation for Microsoft sensitivity label configuration and policy enforcement.
- Workstream project plans, timelines, storyboards, runbooks, training deck, and user FAQs.
- Monthly and quarterly status reports and a final engagement closeout report.
- Consultant: lead technical design, runbooks, documentation, status reporting, and stakeholder coordination.
- Partner with IAM Team: configure exception groups, support integration testing.
- Partner Service Now Team: implement intake automation and bulk intake capabilities.
- Partner with MS, Security Engineering & EUS: define and implement label enforcement and migration approach.
- Project Stakeholders / New Co representatives: provide access to required systems, approve exception inventories, and participate in acceptance testing.
- Microsoft sensitivity label migration approach and enforcement options are available and agreed with Microsoft / Security Engineering prior to execution of large‑scale migrations.
- Necessary access, documentation, and stakeholders from IAM, Service Now, Security Engineering, and EUS will be made available in a timely manner.
- Exception intake and IAM integration can be implemented using existing Service Now and IAM capabilities or with minor configuration/customization.
- Any third‑party licensing, tooling, or Microsoft professional services required are procured separately and are out of scope unless explicitly added.
- Weekly working sessions with core teams during active work streams.
- Monthly steering…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×