projects across the UK and EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical security industry. Training and development … the team. Qualifications For development purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning reports, asset lists, and handover … security systems and technologies. Qualifications & Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new systems. Good organizational skills and More ❯
projects across the UK and EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical security industry. Training and development … the team. Qualifications For development purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning reports, asset lists, and handover … security systems and technologies. Qualifications & Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new systems. Good organizational skills and More ❯
Security Manager. Responsible for ensuring that all servers and other IT related equipment is hardened against industry security best practices and standards. Performs audits of firewall(s), log management, intrusiondetection systems, and content filtering controls (email, DLP and other technical controls). Conducts internal security audits and reviews as needed, together with appropriate recommendations and conclusions. Identifies … such as firewalls, IDS/IPS, SIEM, DLP, and Endpoint protection solutions. Good understanding and knowledge of security concepts, protocols, processes, architectures, and platforms (authentication and access control technologies, intrusiondetection, network traffic analysis, Web Application Firewalls, Encryption and Key Management, SIEM technology, incident handling, media/malware analysis, etc.) Good knowledge of cloud technologies, architecture, and security More ❯
network systems and proactively identify and resolve network issues to minimize downtime and ensure smooth operations. Implement and maintain network security measures, such as firewalls, switches, routers, load balancers, intrusiondetection systems, and access controls, to protect sensitive company data from unauthorized access and cyber threats. Assess network performance, identify areas for improvement, and plan and implement network … with the ability to effectively collaborate with cross-functional teams and communicate technical concepts to non-technical stakeholders. Solid understanding of network security principles and best practices, including firewalls, intrusiondetection systems, access controls, and encryption techniques. Knowledge of network virtualization technologies, such as SDN (Software-Defined Networking) and virtual private networks (VPNs). Familiarity with network performance More ❯
City of London, London, United Kingdom Hybrid / WFH Options
DGH Recruitment
of unusual or malicious activity. - Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. - Implement and maintain security tools and protocols, including firewalls, intrusiondetection systems, and endpoint protection. - Investigate security incidents, respond to potential breaches, and document all relevant findings and actions. - Act as a technical SME and escalation point for … engineering requirements - including new solutions through projects. Required Skills/Experience: - Strong background in IT Security/Cyber Security - Experience building, operating, and maintaining security systems. - Experience with firewalls, intrusiondetection systems, antivirus software, authentication systems, content filtering, and log management. - Experience with network security and networking technologies. - Knowledge of database and operating system security. - Experience managing outsourced More ❯
Key Responsibilities: Help administer the Group's Security Operations Centre. Work across our growing toolset to monitor the entire infrastructure and react to real time threats as they occur. Intrusiondetection and illegal activity monitoring. Assist with penetration and vulnerability testing. Implement network, firewall, patching and other technical security matter. Ensure up to date patch management is undertaken. … and verbal communication skills. A thorough understanding of the network infrastructure fundamentals A good working knowledge of various security technologies such as: active directory, anti-malware protection, vulnerability scanners, intrusiondetection/prevention, system hardening along with some knowledge of MS-Windows server operating systems A willingness and ability to learn about new technologies and solutions and be More ❯
the security features provided by device and system vendors Establish strong controls over any medium that is used as a backdoor into the SCADA network Implement internal and external intrusiondetection systems in the SCADA network Perform VAPT & technical audits of SCADA devices and networks, and any other connected networks, to identify security concerns Conduct physical security surveys … with databases and high-availability solutions. Experience with scripting languages and automation technologies. Experience with port-, vulnerability-, and malware scanners, able to digest and communicate the output. Knowledge of intrusiondetection systems, security information event monitoring, application control and other Security-relevant systems is a major plus. DataBase Management/SQL. Experience in SCADA projects will be an More ❯
will provide the technical resources necessary to support business continuity for a 24/7 emergency policing service and its external partners. Responsibilities: Implement network security including firewall configurations, intrusiondetection/prevention systems, and access control lists To maintain the network architecture including Cisco routers and switches and Cisco ASA/Firepower firewalls & troubleshoot any issues that … and managing an on-premise network infrastructure including layer 2 and 3 switching and routing. Must have experience of managing network security hardware and software, including firewalls and network intrusiondetection systems. Experience of network hardware and software including Cisco and Meraki solutions Must demonstrate in-depth understanding of datacentre network architectures, ICT disaster recovery strategies, and LAN More ❯
will provide the technical resources necessary to support business continuity for a 24/7 emergency policing service and its external partners. Responsibilities: Implement network security including firewall configurations, intrusiondetection/prevention systems, and access control lists To maintain the network architecture including Cisco routers and switches and Cisco ASA/Firepower firewalls & troubleshoot any issues that … and managing an on-premise network infrastructure including layer 2 and 3 switching and routing. Must have experience of managing network security hardware and software, including firewalls and network intrusiondetection systems. Experience of network hardware and software including Cisco and Meraki solutions Must demonstrate in-depth understanding of datacentre network architectures, ICT disaster recovery strategies, and LAN More ❯
many other services to customers all over the world. The role is responsible for overseeing physical security design and the installation of security features and systems including Access Control, IntrusionDetection, Camera Surveillance, Passive and Active Barriers, and other security features and capabilities consistent with AWS security standards and public sector contract requirements. This role will perform security … t achieve in the cloud. BASIC QUALIFICATIONS • 3+ years of experience working with physical security design and/or implementation of electronic security systems such as Access Control System, IntrusionDetection System, and CCTV Surveillance systems. Familiarity with security in depth strategies. • 2+ years of experience in program or project management, working with both technical and non-technical More ❯
a thrilling journey as you install, commission, and maintain electronic systems designed to protect people, properties, and assets Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions Hit the road in your own company van, visiting a variety of sites, from residential to commercial and retail locations More ❯
a thrilling journey as you install, commission, and maintain electronic systems designed to protect people, properties, and assets Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions Hit the road in your own company van, visiting a variety of sites, from residential to commercial and retail locations More ❯
In this hands-on role, you will be responsible for the full delivery cycle — from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You’ll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification, and to the highest quality … structured cabling, containment, and system installation. Install and terminate structured cabling (Cat6A, fibre optic) to TIA/EIA standards. Install, configure, and commission security systems: Access Control , CCTV , and IntrusionDetection . Test, troubleshoot, and rectify technical issues on-site during delivery. Complete project documentation: test results, commissioning reports, as-builts, and handover packs. Ensure installations comply with More ❯
Identification, Containment, Eradication, Recovery, and Lessons Learned - collaborating with a global team of incident responders. You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that … information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), IntrusionDetection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more. You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments. … response process is working smoothly Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements - Evaluate the incident response readiness of different layers - people, process, technology Detection & Analysis: - Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team. - Respond to cyber security incidents in compliance with the local authority More ❯
continuity and disaster recovery plans from an information security perspective, including considerations for application security. Security Monitoring and Incident Response: Establish and maintain processes for continuous security monitoring and detection of security events, including application-specific security events. Lead the investigation and resolution of security incidents, including those related to application vulnerabilities, root cause analysis, and implementation of corrective … risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations: Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusiondetection/prevention systems, security information and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC): Integrate More ❯
continuity and disaster recovery plans from an information security perspective, including considerations for application security. Security Monitoring and Incident Response : Establish and maintain processes for continuous security monitoring and detection of security events, including application-specific security events. Lead the investigation and resolution of security incidents, including those related to application vulnerabilities, root cause analysis, and implementation of corrective … risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusiondetection/prevention systems, security information and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate More ❯
continuity and disaster recovery plans from an information security perspective, including considerations for application security. Security Monitoring and Incident Response : Establish and maintain processes for continuous security monitoring and detection of security events, including application-specific security events. Lead the investigation and resolution of security incidents, including those related to application vulnerabilities, root cause analysis, and implementation of corrective … risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusiondetection/prevention systems, security information and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate More ❯
proactively enhance our security posture. Datacenter Security: Oversee the security of datacenter environments, including physical security, network segmentation, and access controls. Implement and manage security technologies such as firewalls, intrusiondetection/prevention systems (IDS/IPS), and data encryption. Collaborate with datacenter operations teams to ensure the secure deployment and maintenance of infrastructure. Collaboration and Leadership: Work More ❯
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
leakage prevention Direct on-going threat intelligence activities Mentor and develop security analysts Skills: Prior experience working/managing a SOC Demonstrable experience and operational knowledge of SIEM, firewalls, intrusiondetection and vulnerability management systems/solutions Detailed understanding of Security Monitoring, Threat Intelligence, Vulnerability management and Incident Response Experience managing security incidents within a complex environment. Strong More ❯
vulnerabilities are addressed first. Work with the Customer Business Owners to ensure they fully understand the risks, and can effectively coordinate the recommended remediation Oversee the upkeeping of the intrusiondetection system (IDS) and intrusion prevention system (IPS) signatures for customer's security gateways and Firewalls. What experience you'll bring: What will you bring; It starts More ❯
standard operating procedures (SOPs), playbooks, process flows, and risk reports, using diverse tools and data sources. Develop, refine, and maintain insider threat indicators and use case scenarios to enhance detection capabilities. Design and deliver insider risk awareness initiatives, highlighting emerging trends and fostering a culture of security, accountability, and vigilance. Identify and implement improvements to detection and response … processes based on lessons learned and evolving threat landscapes. Collaborate with internal partners on threat detection and response initiatives to strengthen organizational resilience. Qualifications Bachelor's degree in Information Security, Cybersecurity, Computer Science, or a related field; advanced degree preferred. Experience in insider risk, counterintelligence, cybersecurity, or a related discipline. Hands-on experience with insider threat detection tools … UAM, DLP, and other monitoring technologies. Strong understanding of insider risk frameworks, regulatory and privacy requirements, and relevant laws. Familiarity with SOC or Fusion Centre operations, including threat monitoring, intrusiondetection, incident response, and analysis. In-depth knowledge of the cyber threat landscape, including adversary tactics, campaigns, and the intersection of insider and external threats. Demonstrated ability to More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
and regulations. Collaborate with IT teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on to and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats More ❯