Job Title: Sales Development Representative (SDR) Location: Scotland (Hybrid) Reporting to: Sales Director Industry: Cyber security/Network Infrastructure/Zero-trust architecture Package: £25,000 - £32,000 DOE + uncapped commission About FullProxy: FullProxy is a leading Scotland-based cyber security consultancy specialising in protecting both the … identify high-potential use cases for FullProxy’s solutions Qualify prospects using detailed discovery conversations and alignment with use cases (cyber resilience, application delivery, zerotrust architectures, etc) Maintain a deep understanding of FullProxy’s technical value proposition to ensure credible engagement with IT stakeholders Collaborate closely with More ❯
Glasgow City, Scotland, United Kingdom Hybrid / WFH Options
FullProxy
Job Title: Sales Development Representative (SDR) Location: Scotland (Hybrid) Reporting to: Sales Director Industry: Cyber security/Network Infrastructure/Zero-trust architecture Package: £25,000 - £32,000 DOE + uncapped commission About FullProxy: FullProxy is a leading Scotland-based cyber security consultancy specialising in protecting both the … identify high-potential use cases for FullProxy’s solutions Qualify prospects using detailed discovery conversations and alignment with use cases (cyber resilience, application delivery, zerotrust architectures, etc) Maintain a deep understanding of FullProxy’s technical value proposition to ensure credible engagement with IT stakeholders Collaborate closely with More ❯
security. Evaluate and enhance network performance, addressing latency, throughput, and fault tolerance. Work with security teams to enforce compliance with cybersecurity standards, including implementing ZeroTrust architecture. ✅ Technical Leadership & Project Management: Lead infrastructure design discussions, provide technical direction, and guide project teams through implementation. Develop technical documentation, including More ❯
security. Evaluate and enhance network performance, addressing latency, throughput, and fault tolerance. Work with security teams to enforce compliance with cybersecurity standards, including implementing ZeroTrust architecture. ✅ Technical Leadership & Project Management: Lead infrastructure design discussions, provide technical direction, and guide project teams through implementation. Develop technical documentation, including More ❯
security. Evaluate and enhance network performance, addressing latency, throughput, and fault tolerance. Work with security teams to enforce compliance with cybersecurity standards, including implementing ZeroTrust architecture. ✅ Technical Leadership & Project Management: Lead infrastructure design discussions, provide technical direction, and guide project teams through implementation. Develop technical documentation, including More ❯
glasgow, central scotland, United Kingdom Hybrid / WFH Options
Net Talent
security. Evaluate and enhance network performance, addressing latency, throughput, and fault tolerance. Work with security teams to enforce compliance with cybersecurity standards, including implementing ZeroTrust architecture. ✅ Technical Leadership & Project Management: Lead infrastructure design discussions, provide technical direction, and guide project teams through implementation. Develop technical documentation, including More ❯
24x7 support models blending internal and third-party support. Desirable skills and experience Certifications: CCNP, CCIE, PCNSE, NSE4/7 or similar. Knowledge of ZeroTrust , ZTNA , and SASE architectures. Experience in automation/IaC (Ansible, Terraform, Python). Familiarity with GDPR, Cyber Essentials , and ITSM/ITIL More ❯
Glasgow, City of Glasgow, United Kingdom Hybrid / WFH Options
SThree Management Services
Microsoft Sentinel SOAR, custom playbooks, and telemetry pipelines. Platform Security Oversight Own and optimise endpoint security through Intune, ensuring device compliance and integration with Zero Trust. Harden AKS clusters and cloud-native apps through role-based access control (RBAC), secrets management, and runtime protection. Secure data pipelines and models More ❯