EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical … purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning … Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new More ❯
you will be responsible for the full delivery cycle - from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You'll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification … installation. Install and terminate structured cabling (Cat6A, fibre optic) to TIA/EIA standards. Install, configure, and commission security systems: Access Control , CCTV , and IntrusionDetection . Test, troubleshoot, and rectify technical issues on-site during delivery. Complete project documentation: test results, commissioning reports, as-builts, and handover More ❯
stakeholders in London. Conducts real-time and historical analysis using the full security suite owned by the business including Endpoint Protection, SIEM, Firewall, Endpoint Detection & Response, IntrusionDetection Systems, Email Gateway, Web Content Filtering & Identity Management technology. Conducts incident response triage analysis on suspected hosts to determine More ❯
network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusiondetection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR More ❯
modeling, and risk assessments; strong understanding of information security principles, including confidentiality, integrity, and availability. Experience with security tools and technologies, including vulnerability scanners, intrusiondetection systems, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross … Generous PTO, plus company holidays Comprehensive medical and dental insurance Paid parental leave for all parents (12 weeks) Fertility and family planning support Early-detection cancer testing through Galleri Competitive pension scheme and company contribution Annual work-life stipends for: Home office setup, cell phone, internet Wellness stipend for More ❯
followed throughout the cloud infrastructure. Implement and configure cloud security tools and solutions to protect cloud-based data and systems. Collaborate with our Managed Detection Response (MDR) provider to assess and respond to security threats against our customer-facing and staff-facing platforms and services and drive continuous improvement … Azure, Google Cloud, etc.). Knowledge of security standards such as ISO 27001, NIST, and SOC2. Experience with security tools such as vulnerability scanners, intrusiondetection or prevention systems, and SIEM solutions. Experience with Vulnerability Management Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Ability More ❯
knowledge of the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusiondetection/prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II/III level or similar More ❯
are mandatory. You will have a strong understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing … SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) IntrusionDetection/Prevention Systems (IDS/IPS) (Suricata, Snort, Bro, Cisco, Palo Alto) Web Proxies (Bluecoat, Zscaler, Squid, Cisco/OpenDNS Umbrella) Networking More ❯
implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusiondetection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design and manage security in the cloud, including AWS More ❯
depth understanding of physical security infrastructure, including: Access control systems (e.g., Lenel, C•CURE, Genetec). CCTV & surveillance systems (e.g., Axis, Avigilon, Milestone). Intrusiondetection systems and perimeter security. Security hardware (e.g., barriers, gates, biometric readers). Knowledge of cybersecurity considerations related to physical security systems. Leadership More ❯
on-premises networks (hybrid setups). Operations, Monitoring, and Incident Management Monitor the performance of both on-premises and cloud-based systems. Ensure timely detection, escalation, and resolution of incidents and outages. Develop and track key performance indicators (KPIs) such as MTTD and MTTR. Automate repetitive tasks using scripts … and cloud-native tools. Security and Compliance Implement and manage infrastructure security measures, including firewalls, VPNs, and intrusiondetection systems. Ensure compliance with industry standards such as GDPR, ISO 27001 and SOC 2. Perform regular audits and address vulnerabilities in both cloud and traditional systems. Strategic Planning and More ❯
Service Provider organization. Experience with security frameworks such as NIST CSF, ISO 27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusiondetection and prevention systems, vulnerability scanners, and endpoint protection. Strong knowledge of cloud security concepts and technologies , such as Amazon Web Services (AWS More ❯
on-premises networks (hybrid setups). Operations, Monitoring, and Incident Management Monitor the performance of both on-premises and cloud-based systems. Ensure timely detection, escalation, and resolution of incidents and outages. Develop and track key performance indicators (KPIs) such as MTTD and MTTR. Automate repetitive tasks using scripts … and cloud-native tools. Security and Compliance Implement and manage infrastructure security measures, including firewalls, VPNs, and intrusiondetection systems. Ensure compliance with industry standards such as GDPR, ISO 27001 and SOC 2. Perform regular audits and address vulnerabilities in both cloud and traditional systems. Strategic Planning and More ❯
on-premises networks (hybrid setups). Operations, Monitoring, and Incident Management Monitor the performance of both on-premises and cloud-based systems. Ensure timely detection, escalation, and resolution of incidents and outages. Develop and track key performance indicators (KPIs) such as MTTD and MTTR. Automate repetitive tasks using scripts … and cloud-native tools. Security and Compliance Implement and manage infrastructure security measures, including firewalls, VPNs, and intrusiondetection systems. Ensure compliance with industry standards such as GDPR, ISO 27001 and SOC 2. Perform regular audits and address vulnerabilities in both cloud and traditional systems. Strategic Planning and More ❯
Redscan (a trading name of Redscan Cyber Security Limited)
Security and enjoys solving problems. Knowledge of the security threat landscape. Knowledge of various security methodologies and processes, and technical security solutions (firewall and intrusiondetection systems). Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Knowledge of common Internet protocols and applications. More ❯
industry standards but also exceed expectations. Oversee incident response, vulnerability management, and cyber threat hunting. Execute security solutions applying cutting-edge technologies like firewalls, intrusiondetection and prevention systems, antivirus software, and vulnerability scanners. Proactively recommending system tuning, identifying new use cases, and providing additional insight from customer More ❯
needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penertration testing. Investigate security incidents More ❯
needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penertration testing. Investigate security incidents More ❯
needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents More ❯
needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents More ❯
and load balancers. Hands-on experience with cloud networking (AWS, Azure, Google Cloud) and SDN (Software-Defined Networking). Knowledge of network security principles, intrusiondetection systems, and firewall configurations. Familiarity with automation tools (e.g., Ansible, Terraform) for network deployment and management. Experience working with monitoring and performance More ❯
s cybersecurity operations and incident response programs. The ideal candidate should demonstrate leadership in supervising small teams, with expertise in cybersecurity practices, cloud technologies, detection and response frameworks, and incident handling (containment, eradication, recovery, lessons learned). They should adhere to established incident response procedures, possess strong attention to … resolution during security crises Proficiency in networking concepts, protocols, and security methodologies Deep understanding of system and application security threats Knowledge of network attacks, intrusiondetection, and security principles Leadership skills in supervising analysts and guiding team performance Responsibilities: Lead and develop SOC staff and security teams Align More ❯
needs. Monitor and respond to security incidents using tools like SIEM and Sophos MTR and Splunk. Maintain system security by configuring firewalls, VPNs, and intrusiondetection systems, and ensuring timely patching. Manage vulnerability remediation based on penetration test results and risk assessments. Conduct penetration tests. Investigate security incidents More ❯
and long-term strategic plans to ensure IT network Work closely with and monitor logs generated from SIEM & Sophos MTR Configuring, maintaining and implementing intrusiondetection systems and firewalls, virtual private networks, web protocols, and email security Create and update all relevant Jira tickets being worked on regularly More ❯
Employment Type: Permanent
Salary: £70000 - £80000/annum Progression, Training, Company Benef
and long-term strategic plans to ensure IT network Work closely with and monitor logs generated from SIEM & Sophos MTR Configuring, maintaining and implementing intrusiondetection systems and firewalls, virtual private networks, web protocols, and email security Create and update all relevant Jira tickets being worked on regularly More ❯
Employment Type: Permanent
Salary: £80000 - £95000/annum Progression, Training, Company Benef