projects across the UK and EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical security industry. Training and development … the team. Qualifications For development purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning reports, asset lists, and handover … security systems and technologies. Qualifications & Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new systems. Good organizational skills and More ❯
projects across the UK and EMEA. In this role, you will work alongside senior engineers to assist with the configuration, testing, commissioning, and documentation of access control, CCTV, and intrusiondetection systems. This is an ideal opportunity for someone with a technical background who is looking to grow their career in the physical security industry. Training and development … the team. Qualifications For development purposes the following knowledge, skills and experience are required. Key Responsibilities: Assist with the delivery of physical security projects, including access control, CCTV, and intrusiondetection systems. Support the configuration, testing, and commissioning of security systems under the guidance of senior engineers. Prepare project documentation such as commissioning reports, asset lists, and handover … security systems and technologies. Qualifications & Experience: 1-3 years' experience in a technical engineering role (physical security, electrical, or IT fields preferred). Familiarity with access control, CCTV, or intrusiondetection systems is desirable but not essential. Basic understanding of IP networks and structured cabling. Strong technical aptitude and willingness to learn new systems. Good organizational skills and More ❯
Security Manager. Responsible for ensuring that all servers and other IT related equipment is hardened against industry security best practices and standards. Performs audits of firewall(s), log management, intrusiondetection systems, and content filtering controls (email, DLP and other technical controls). Conducts internal security audits and reviews as needed, together with appropriate recommendations and conclusions. Identifies … such as firewalls, IDS/IPS, SIEM, DLP, and Endpoint protection solutions. Good understanding and knowledge of security concepts, protocols, processes, architectures, and platforms (authentication and access control technologies, intrusiondetection, network traffic analysis, Web Application Firewalls, Encryption and Key Management, SIEM technology, incident handling, media/malware analysis, etc.) Good knowledge of cloud technologies, architecture, and security More ❯
network systems and proactively identify and resolve network issues to minimize downtime and ensure smooth operations. Implement and maintain network security measures, such as firewalls, switches, routers, load balancers, intrusiondetection systems, and access controls, to protect sensitive company data from unauthorized access and cyber threats. Assess network performance, identify areas for improvement, and plan and implement network … with the ability to effectively collaborate with cross-functional teams and communicate technical concepts to non-technical stakeholders. Solid understanding of network security principles and best practices, including firewalls, intrusiondetection systems, access controls, and encryption techniques. Knowledge of network virtualization technologies, such as SDN (Software-Defined Networking) and virtual private networks (VPNs). Familiarity with network performance More ❯
Key Responsibilities: Help administer the Group's Security Operations Centre. Work across our growing toolset to monitor the entire infrastructure and react to real time threats as they occur. Intrusiondetection and illegal activity monitoring. Assist with penetration and vulnerability testing. Implement network, firewall, patching and other technical security matter. Ensure up to date patch management is undertaken. … and verbal communication skills. A thorough understanding of the network infrastructure fundamentals A good working knowledge of various security technologies such as: active directory, anti-malware protection, vulnerability scanners, intrusiondetection/prevention, system hardening along with some knowledge of MS-Windows server operating systems A willingness and ability to learn about new technologies and solutions and be More ❯
many other services to customers all over the world. The role is responsible for overseeing physical security design and the installation of security features and systems including Access Control, IntrusionDetection, Camera Surveillance, Passive and Active Barriers, and other security features and capabilities consistent with AWS security standards and public sector contract requirements. This role will perform security … t achieve in the cloud. BASIC QUALIFICATIONS • 3+ years of experience working with physical security design and/or implementation of electronic security systems such as Access Control System, IntrusionDetection System, and CCTV Surveillance systems. Familiarity with security in depth strategies. • 2+ years of experience in program or project management, working with both technical and non-technical More ❯
a thrilling journey as you install, commission, and maintain electronic systems designed to protect people, properties, and assets Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions Hit the road in your own company van, visiting a variety of sites, from residential to commercial and retail locations More ❯
a thrilling journey as you install, commission, and maintain electronic systems designed to protect people, properties, and assets Gain in-depth knowledge about our cutting-edge systems, including fire detection, intrusiondetection, CCTV, and access control solutions Hit the road in your own company van, visiting a variety of sites, from residential to commercial and retail locations More ❯
In this hands-on role, you will be responsible for the full delivery cycle — from infrastructure cabling through to the installation, configuration, and commissioning of access control, CCTV, and intrusiondetection systems. You’ll work across data centres, campuses, and critical infrastructure sites, helping ensure that projects are delivered on time, to specification, and to the highest quality … structured cabling, containment, and system installation. Install and terminate structured cabling (Cat6A, fibre optic) to TIA/EIA standards. Install, configure, and commission security systems: Access Control , CCTV , and IntrusionDetection . Test, troubleshoot, and rectify technical issues on-site during delivery. Complete project documentation: test results, commissioning reports, as-builts, and handover packs. Ensure installations comply with More ❯
Identification, Containment, Eradication, Recovery, and Lessons Learned - collaborating with a global team of incident responders. You will apply your comprehensive skills in cyber defense, digital forensics, log analysis, and intrusion analysis to address security incidents across our endpoints, network, and cloud infrastructure. In this role, you will be responsible for prevention, detection, response, and remediation activities, ensuring that … information assets and technologies are adequately protected by leveraging various technologies such as Next-Generation Firewalls (NGFW), Endpoint Detection and Response (EDR), IntrusionDetection/Prevention Systems (IDS/IPS), Data Loss Prevention (DLP), and more. You will also leverage your collaboration and communication skills to work effectively with all relevant stakeholders in multicultural and global environments. … response process is working smoothly Develop incident response runbooks, playbooks and SOPs with reference to different regulatory requirements - Evaluate the incident response readiness of different layers - people, process, technology Detection & Analysis: - Respond to the cyber security incidents escalated from various channels including the 24/7 SOC team. - Respond to cyber security incidents in compliance with the local authority More ❯
continuity and disaster recovery plans from an information security perspective, including considerations for application security. Security Monitoring and Incident Response : Establish and maintain processes for continuous security monitoring and detection of security events, including application-specific security events. Lead the investigation and resolution of security incidents, including those related to application vulnerabilities, root cause analysis, and implementation of corrective … risks. Conduct regular risk assessments and vulnerability analyses of systems, applications, and infrastructure. Security Operations : Oversee the management of security technologies and controls, including but not limited to, firewalls, intrusiondetection/prevention systems, security information and event management (SIEM), data loss prevention (DLP), vulnerability management tools, and application security testing tools. Secure Software Development Lifecycle (SSDLC) : Integrate More ❯
data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusiondetection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company More ❯
standard operating procedures (SOPs), playbooks, process flows, and risk reports, using diverse tools and data sources. Develop, refine, and maintain insider threat indicators and use case scenarios to enhance detection capabilities. Design and deliver insider risk awareness initiatives, highlighting emerging trends and fostering a culture of security, accountability, and vigilance. Identify and implement improvements to detection and response … processes based on lessons learned and evolving threat landscapes. Collaborate with internal partners on threat detection and response initiatives to strengthen organizational resilience. Qualifications Bachelor's degree in Information Security, Cybersecurity, Computer Science, or a related field; advanced degree preferred. Experience in insider risk, counterintelligence, cybersecurity, or a related discipline. Hands-on experience with insider threat detection tools … UAM, DLP, and other monitoring technologies. Strong understanding of insider risk frameworks, regulatory and privacy requirements, and relevant laws. Familiarity with SOC or Fusion Centre operations, including threat monitoring, intrusiondetection, incident response, and analysis. In-depth knowledge of the cyber threat landscape, including adversary tactics, campaigns, and the intersection of insider and external threats. Demonstrated ability to More ❯
experience as a Security Engineer or in a similar role, with deep understanding of the threat landscape, ideally in fintech environments. Hands-on expertise with security technologies, including firewalls, intrusiondetection/prevention systems (IDS/IPS), SIEM, antivirus solutions, encryption mechanisms, and vulnerability assessment tools. Hands-on experience in security tools (e.g., SAST, DAST, OWASP ZAP). More ❯
and regulations. Collaborate with IT teams to integrate security protocols into network architecture and operations. Be involved in the deployment and maintenance of network security devices such as firewalls, intrusiondetection systems, and VPNs. Act on to and recover from security incidents, including conducting post-event analyses to prevent future incidents. Stay abreast of the latest cybersecurity threats More ❯
remediation of vulnerabilities Configure, customize, tune, manage, troubleshoot, and maintain effective and efficient operation of security technologies, such as SIEM, endpoint security, secure web gateway, CASB, DLP, email security, intrusiondetection/prevention systems, etc. This may also include scripting, automation, and orchestration across various platforms Define, document, and follow approved processes for all the responsibilities included in More ❯
collect evidence, and prepare reports to improve security posture. Incident Response: Lead response efforts, develop plans, and conduct post-incident reviews. Security Tools: Manage security tools like firewalls and intrusiondetection systems. Evaluate new technologies. Documentation: Maintain detailed records and prepare reports for management. Collaboration: Work with IT, Digital teams, and developers to ensure security integration and best … and understanding of secure development lifecycle. Proficiency with security tools, firewalls (Palo Alto preferred), IDS, endpoint security. Strong understanding of network protocols, VPNs, and security architecture. Experience in incident detection, analysis, response, forensic and malware analysis. Skills in scripting and automation (Python, PowerShell). Knowledge of frameworks like ISO 27001, NIST, Cyber Essentials. Understanding of risk management, data protection More ❯
Knowledge of currentmarket and emerging tools in data analytical and SIEM platforms. Knowledgeof network security implementations (e.g., IDS, IPS, EDR), including theirfunction and placement in an enterprise network. Knowledgeof intrusiondetection systems and signature development. Knowledge of front-endcollection systems, including network traffic collection, filtering, andselection. Knowledge of cyber security threats,vulnerabilities, and privacy principles. Working knowledge inconfigurating More ❯
or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and intrusiondetection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform regular threat analysis and act as a subject matter expert More ❯
and risk assessments to identify and address potential vulnerabilities. - Develop and maintain security policies and procedures in accordance with industry standards. - Configure and manage security tools, such as firewalls, intrusiondetection systems, and encryption technologies. - Monitor network traffic and system logs for suspicious activity and respond to security incidents in a timely manner. - Stay updated on the latest More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
with the latest cybersecurity threats and trends and escalate risks promptly. Ensure compliance with relevant industry regulations and standards (e.g., GDPR, ISO 27001). Manage security systems, including firewalls, intrusiondetection/prevention systems, and antivirus software, in collaboration with GT. Develop and test incident response plans and coordinate responses to security incidents and breaches. Raise cybersecurity awareness More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯
and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements Experience using and managing firewalls, intrusiondetection systems, and SIEM solutions Familiarity with secure networking protocols (VPNs, TCP/IP, etc.) and malware analysis Understanding of industry frameworks: ISO27001, Cyber Essentials, NIST800-53 Experience More ❯