projects across the UK and EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical security industry. Training and development … the team. Qualifications For development purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning reports, asset lists, and handover … security systems and technologies. Qualifications & Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new systems. Good organizational skills and More ❯
audits, penetration testing, and incident investigations, often requiring collaboration with staff at all levels. Monitoring and analysing security events using tools like SIEM is a key duty, ensuring swift detection and response to threats. Additionally, the role includes mentoring cyber security team members, promoting professional development, and fostering a culture of continuous learning. Strong communication and organisational skills are … scanning, incident response, and third-party risk management. Experience in monitoring and configuring warning and security systems. Desirable Cloud Security experience (e.g. Azure, AWS, GCP). Experience with firewalls, intrusiondetection/prevention systems, and network design. Experience with Microsoft Windows Server and IP networking. Experience of working within ITIL-based change management processes. Ability to evaluate and … vulnerability scanning, incident response, and third-party risk management. oExperience in monitoring and configuring warning and security systems. Desirable oCloud Security experience (e.g Azure, AWS, GCP) oExperience with firewalls, intrusiondetection/prevention systems, and network design. oExperience with Microsoft Windows Server and IP networking. oExperience of working within ITIL-based change management processes. oAbility to evaluate and More ❯
the security features provided by device and system vendors Establish strong controls over any medium that is used as a backdoor into the SCADA network Implement internal and external intrusiondetection systems in the SCADA network Perform VAPT & technical audits of SCADA devices and networks, and any other connected networks, to identify security concerns Conduct physical security surveys … with databases and high-availability solutions. Experience with scripting languages and automation technologies. Experience with port-, vulnerability-, and malware scanners, able to digest and communicate the output. Knowledge of intrusiondetection systems, security information event monitoring, application control and other Security-relevant systems is a major plus. DataBase Management/SQL. Experience in SCADA projects will be an More ❯
will provide the technical resources necessary to support business continuity for a 24/7 emergency policing service and its external partners. Responsibilities: Implement network security including firewall configurations, intrusiondetection/prevention systems, and access control lists To maintain the network architecture including Cisco routers and switches and Cisco ASA/Firepower firewalls & troubleshoot any issues that … and managing an on-premise network infrastructure including layer 2 and 3 switching and routing. Must have experience of managing network security hardware and software, including firewalls and network intrusiondetection systems. Experience of network hardware and software including Cisco and Meraki solutions Must demonstrate in-depth understanding of datacentre network architectures, ICT disaster recovery strategies, and LAN More ❯
In this hands-on role, you will be responsible for the full delivery cycle — from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You’ll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification, and to the highest quality … structured cabling, containment, and system installation. Install and terminate structured cabling (Cat6A, fibre optic) to TIA/EIA standards. Install, configure, and commission security systems: Access Control , CCTV , and IntrusionDetection . Test, troubleshoot, and rectify technical issues on-site during delivery. Complete project documentation: test results, commissioning reports, as-builts, and handover packs. Ensure installations comply with More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
platform environments. Relevant certifications (e.g., CISSP, CISM) are a plus. Experience in security architecture, especially in networks and hosting platforms. Strong knowledge of network security protocols, firewalls, VPNs, and intrusiondetection systems. Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical stakeholders. Additional benefits include family leave, women's health support, annual More ❯
vulnerabilities are addressed first. Work with the Customer Business Owners to ensure they fully understand the risks, and can effectively coordinate the recommended remediation Oversee the upkeeping of the intrusiondetection system (IDS) and intrusion prevention system (IPS) signatures for customer's security gateways and Firewalls. What experience you'll bring: What will you bring; It starts More ❯
and regulations. Collaborate with IT teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on to and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
vulnerabilities are addressed first. Work with the Customer Business Owners to ensure they fully understand the risks, and can effectively coordinate the recommended remediation Oversee the upkeeping of the intrusiondetection system (IDS) and intrusion prevention system (IPS) signatures for customer's security gateways and Firewalls. What's important? It starts with amazing people, challenging projects and More ❯
minimise and control damage resulting from cybersecurity incidents, ensuring that the appropriate incident management and response controls are in place and operating as required to enable the identification, protection, detection, response, and recovery of RLG information assets. It outlines how the role contributes to our purpose: Helping build financial resilience Moving fairly to a sustainable world Strengthening the mutual … metrics, and generate reports and analytics to improve future incident response Collect supporting information and relevant artifacts in support of incident response activities Identify and execute projects to improve intrusiondetection and incident response capabilities Conduct technical analysis on impacted systems to determine impact, scope, and recovery from active and potential cyber incidents Leverage cybersecurity tools to identify More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
troubleshooting steps, and resolutions Cyber/Security Ensure IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusiondetection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as needed System Monitoring Monitor system More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
including creating security standards, and procedures. A deep understanding of network security, OT and IT security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusiondetection systems, encryption, and other security technologies and industry standards and frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain More ❯
IT concepts, both infrastructure and software related. A working knowledge of at least 3 of the following areas; Information and Data Management, System Design and Development, Security (firewalls, VPN, intrusiondetection and prevention systems), Application Management, ERP systems, CRM systems, Networking and Microsoft Solutions, Infrastructure. Strong knowledge of network, server, storage, and virtualisation technologies. Understanding of the relevant More ❯
incidents, and evolving defences to meet shifting risks. Key responsibilities include: Monitor Networks and Systems: Continuously monitor the organisation's networks and systems for security breaches or intrusions. Threat Detection and Response: Detect and respond to threats or security incidents by analysing data from various incident reports and alerts. Security Audits: Perform regular audits to ensure that systems and … of 2-3 years of experience in IT Infrastructure including security. Strong understanding of network protocols and security technologies. Proficiency in using security tools such as firewalls, antivirus, and intrusiondetection systems. Excellent analytical and problem-solving skills. Ability to work under pressure and handle multiple tasks simultaneously. Strong communication and interpersonal skills. What you'll get in More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
Requirements A passion for Cyber Security and enjoys solving problems Knowledge of the security threat landscape Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems) Knowledge of TCP/IP Protocols, network analysis, and network/security applications Knowledge of common Internet protocols and applications Ability to multi-task, prioritize, and More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
Framework. Solid grasp of client-server applications, multi-tier web applications, relational databases, firewalls, VPNs, and enterprise AntiVirus products. Deep technical knowledge in the analysis of log data and intrusiondetection systems. Solid understanding of networking principles including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be … great if you had: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure if your skills and experience are exactly what were looking for, please do apply, wed love to hear from More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
technical expertise will be pivotal. You'll also play a critical role in shaping and safeguarding the organisation's cybersecurity posture - designing and implementing robust security protocols, managing threat detection and response, and ensuring compliance with key standards such as GDPR, Cyber Essentials, and ISO 27001. Collaboration is key, as you'll work closely with IT support, application teams … and support. Familiar with VMware for virtualisation and cloud-based UC telephony systems. Solid understanding of DNS, DHCP, VPN access, and administration. Hands-on experience with firewalls (e.g., Fortinet), intrusiondetection/prevention systems, and Cisco networking/routing. Knowledge of security best practices, including EDR/XDR platforms and antivirus solutions (e.g., EPO). Familiar with identity More ❯
and Splunk implementations. Knowledge of the Mitre Att&ck Framework. Understanding of client-server applications, web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusiondetection systems. Strong networking knowledge including TCP/IP, WANs, LANs, and protocols like SMTP, HTTP, FTP, POP, LDAP. If you're interested but unsure if your skills More ❯