projects across the UK and EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical security industry. Training and development … the team. Qualifications For development purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning reports, asset lists, and handover … security systems and technologies. Qualifications & Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new systems. Good organizational skills and More ❯
Security Manager. Responsible for ensuring that all servers and other IT related equipment is hardened against industry security best practices and standards. Performs audits of firewall(s), log management, intrusiondetection systems, and content filtering controls (email, DLP and other technical controls). Conducts internal security audits and reviews as needed, together with appropriate recommendations and conclusions. Identifies … such as firewalls, IDS/IPS, SIEM, DLP, and Endpoint protection solutions. Good understanding and knowledge of security concepts, protocols, processes, architectures, and platforms (authentication and access control technologies, intrusiondetection, network traffic analysis, Web Application Firewalls, Encryption and Key Management, SIEM technology, incident handling, media/malware analysis, etc.) Good knowledge of cloud technologies, architecture, and security More ❯
network systems and proactively identify and resolve network issues to minimize downtime and ensure smooth operations. Implement and maintain network security measures, such as firewalls, switches, routers, load balancers, intrusiondetection systems, and access controls, to protect sensitive company data from unauthorized access and cyber threats. Assess network performance, identify areas for improvement, and plan and implement network … with the ability to effectively collaborate with cross-functional teams and communicate technical concepts to non-technical stakeholders. Solid understanding of network security principles and best practices, including firewalls, intrusiondetection systems, access controls, and encryption techniques. Knowledge of network virtualization technologies, such as SDN (Software-Defined Networking) and virtual private networks (VPNs). Familiarity with network performance More ❯
City of London, London, United Kingdom Hybrid / WFH Options
DGH Recruitment
of unusual or malicious activity. - Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. - Implement and maintain security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection. - Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. - Act as a technical SME and escalation point for … engineering requirements - including new solutions through projects. Required Skills/Experience: - Strong background in IT Security/Cyber Security - Experience building, operating, and maintaining security systems. - Experience with firewalls, intrusiondetection systems, antivirus software, authentication systems, content filtering, and log management. - Experience with network security and networking technologies. - Knowledge of database and operating system security. - Experience managing outsourced More ❯
a thrilling journey as you install, commission, and maintain electronic systems designed to protect people, properties, and assets Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions Hit the road in your own company van, visiting a variety of sites, from residential to commercial and retail locations More ❯
Identification, Containment, Eradication, Recovery, and Lessons Learned - collaborating with a global team of incident responders. You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that … information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), IntrusionDetection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more. You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments. … response process is working smoothly Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements - Evaluate the incident response readiness of different layers - people, process, technology Detection & Analysis: - Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team. - Respond to cyber security incidents in compliance with the local authority More ❯
continuity and disaster recovery plans from an information security perspective, including considerations for application security. Security Monitoring and Incident Response : Establish and maintain processes for continuous security monitoring and detection of security events, including application-specific security events. Lead the investigation and resolution of security incidents, including those related to application vulnerabilities, root cause analysis, and implementation of corrective … risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusiondetection/prevention systems, security information and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate More ❯
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
standard operating procedures (SOPs), playbooks, process flows, and risk reports, using diverse tools and data sources. Develop, refine, and maintain insider threat indicators and use case scenarios to enhance detection capabilities. Design and deliver insider risk awareness initiatives, highlighting emerging trends and fostering a culture of security, accountability, and vigilance. Identify and implement improvements to detection and response … processes based on lessons learned and evolving threat landscapes. Collaborate with internal partners on threat detection and response initiatives to strengthen organizational resilience. Qualifications Bachelor's degree in Information Security, Cybersecurity, Computer Science, or a related field; advanced degree preferred. Experience in insider risk, counterintelligence, cybersecurity, or a related discipline. Hands-on experience with insider threat detection tools … UAM, DLP, and other monitoring technologies. Strong understanding of insider risk frameworks, regulatory and privacy requirements, and relevant laws. Familiarity with SOC or Fusion Centre operations, including threat monitoring, intrusiondetection, incident response, and analysis. In-depth knowledge of the cyber threat landscape, including adversary tactics, campaigns, and the intersection of insider and external threats. Demonstrated ability to More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
remediation of vulnerabilities Configure, customize, tune, manage, troubleshoot, and maintain effective and efficient operation of security technologies, such as SIEM, endpoint security, secure web gateway, CASB, DLP, email security, intrusiondetection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms Define, document, and follow approved processes for all the responsibilities included in More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
and risk assessments to identify and address potential vulnerabilities. - Develop and maintain security policies and procedures in accordance with industry standards. - Configure and manage security tools, such as firewalls, intrusiondetection systems, and encryption technologies. - Monitor network traffic and system logs for suspicious activity and respond to security incidents in a timely manner. - Stay updated on the latest More ❯
with the latest cybersecurity threats and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness More ❯
tools (e.g., Terraform, Helm, ArgoCD). United Kingdom Security Vetting Developed Vetting (DV) clearance. Preferred qualifications: Certifications in Security (e.g., GSEC, CISSP, CISM, OSCP). Experience with Kubernetes threat detection and anomaly detection. Experience with service mesh security concepts (e.g., Istio, Linkerd) and workload identity. Experience in detection engineering, logging pipeline development, or SIEM tuning in containerised environments. … security platforms with a strong emphasis on Kubernetes-based environments. You'll be at the intersection of security and engineering-developing scalable tooling, automating security controls, and enabling robust detection and response capabilities across our cloud infrastructure. This is an engineering-centric role that requires deep technical expertise in cloud environments, Kubernetes security, and platform automation. You'll work … complex needs of local, state and federal government and educational institutions. Responsibilities Deploy, configure, and manage cloud security platform tools and technologies, including Security Information and Event Management (SIEM), IntrusionDetection/Prevention Systems (IDS/IPS), and Cloud Workload Protection Platforms (CWPP). Develop and implement security monitoring and logging strategies. Investigate and analyse security incidents, including More ❯
to your application. You will develop and maintain the cyber security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
Central London, London, United Kingdom Hybrid / WFH Options
STK Recruitment
to explain technical concepts to non-technical stakeholders. Project management skills, with the ability to handle multiple projects simultaneously. Familiarity with other security technologies and solutions, such as firewalls, intrusiondetection systems, and VPNs. More ❯
that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and anomaly detection Incident Management - Detect, document, investigate, and resolve security incidents in an efficient manner Endpoint Forensics - Construct meaningful incident timelines from forensic artifact analysis Counter Measures - Ability to design and … and execute focused plans to discover advanced threats that evade traditional security controls Behavioral Analysis - Develop and implement criteria to identify anomalous user behavior leading indicating insider threat activity IntrusionDetection - Develop and tune network anomaly control capability to produce reliable actionable data Threat Hunting - Proactively search for unknown threats within the environment. Preferred Knowledge and Experience 3+ More ❯
infrastructure, including routers, switches, firewalls, and load balancers. Hands-on experience with cloud networking (AWS, Azure, Google Cloud) and SDN (Software-Defined Networking). Knowledge of network security principles, intrusiondetection systems, and firewall configurations. Familiarity with automation tools (e.g., Ansible, Terraform) for network deployment and management. Experience working with monitoring and performance tools such as Wireshark, Nagios More ❯
TCP/IP networking Knowledge of virtual desktop infrastructure RDS, Citrix, VMware Horizon, Parallels, etc Aruba/HP/Brocade Switch configuration and management Remote access and VPN technologies Intrusiondetection & prevention solutions Knowledge of Database technology such as MariaDB/Postgres Experience of working with Cisco, Sophos, Fortinet, Palo Alto firewalls Hands on experience with log aggregation More ❯
proven experience designing and managing resilient secure and high availability network environments supporting internal and customer services strong grasp of network security best practices and technologies including firewalls, segmentation, intrusiondetection/prevention and encryption. More ❯
exceptionally talented, bright, and driven people. The position is responsible for the design review, installation and integration of security systems equipment including, but not limited to, Access Control/IntrusionDetection and CCTV Surveillance systems. The ideal candidate for the role will be willing and able to work in all related disciplines, at all levels; from technology research More ❯
for security installations Strong knowledge of CCTV & Access Control systems, including installation and configuration techniques Familiarity with hand tools and electrical work relevant to security system installations Experience with intrusiondetection systems (IDS) and their integration into existing infrastructures Solid understanding of computer networking principles as they relate to security systems Mechanical knowledge relevant to the installation of More ❯
for security installations Strong knowledge of CCTV & Access Control systems, including installation and configuration techniques Familiarity with hand tools and electrical work relevant to security system installations Experience with intrusiondetection systems (IDS) and their integration into existing infrastructures Solid understanding of computer networking principles as they relate to security systems Mechanical knowledge relevant to the installation of More ❯