enforcing compliance of every connected thing in real-time and at scale. Our unified security platform enables enterprises and government agencies to focus on ZeroTrust segmentation, IT/OT convergence, and OT/ICS innovation, all supporting our mission and vision. Join us as we secure the … all asset types - IT, OT, IoT, IoMT. The Forescout Continuum Platform provides complete asset visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organisations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers More ❯
edge (SASE) frameworks. Proven experience as a Network Security Engineer or similar role within enterprise environments. Strong understanding of network architecture principles, including segmentation, zerotrust, and high availability designs. Some OOH work is expected at weekends/evenings for production migrations For further information about this position More ❯
from all backgrounds and do not discriminate based on any protected characteristic. Keywords: Lead EUC Engineer, Intune, Microsoft 365, PowerShell, Device Management, Endpoint Security, ZeroTrust, SCCM, Windows 365, Horizon Cloud More ❯
knowledge across routing, switching, and cyber security technologies (e.g. Palo Alto, Fortinet, Cisco) A solid grasp of modern security frameworks and concepts such as ZeroTrust, IAM, and SASE Strong problem-solving skills and a collaborative, proactive mindset Relevant certifications (e.g. CISSP, CCNP Security, NSE4, PCNSE) are highly More ❯
London / SE Hybrid, Brighton, East Sussex, United Kingdom Hybrid / WFH Options
Imperative People
knowledge across routing, switching, and cyber security technologies (e.g. Palo Alto, Fortinet, Cisco) A solid grasp of modern security frameworks and concepts such as ZeroTrust, IAM, and SASE Strong problem-solving skills and a collaborative, proactive mindset Relevant certifications (e.g. CISSP, CCNP Security, NSE4, PCNSE) are highly More ❯
Expert Insights, Microsoft Security 20/20 partner award, Homeland Security Award for Best Identity Access Management platform for its agentless secure authentication and zerotrust platform by Astors. As the Partner Operations Manager, you will be responsible for managing the internal processes, policies and tools that enable More ❯
Nuclear Command Control, and Communications (NC3)/Space Security System Analyst HazeGrayCyber, LLC is focused on delivering Cyber Security and ZeroTrust Solutions to the US National Defense community and our allies and partners. We are looking for a full-time Nuclear Command, Control, and Communications (NC3)/ More ❯
know the SASE opportunity is massive. Our solutions are best-in-breed and customers need a trusted cybersecurity partner who can create a truly zerotrust based security architecture. Our customers are looking to us to create critical transformations and our portfolio of solutions will help us do More ❯
know the SASE opportunity is massive. Our solutions are best-in-breed and customers need a trusted cybersecurity partner who can create a truly zerotrust based security architecture. Our customers are looking to us to create critical transformations and our portfolio of solutions will help us do More ❯
know the SASE opportunity is massive. Our solutions are best-in-breed and customers need a trusted cybersecurity partner who can create a truly zerotrust based security architecture. Our customers are looking to us to create critical transformations and our portfolio of solutions will help us do More ❯
know the SASE opportunity is massive. Our solutions are best-in-breed and customers need a trusted cybersecurity partner who can create a truly zerotrust based security architecture. Our customers are looking to us to create critical transformations and our portfolio of solutions will help us do More ❯
know the SASE opportunity is massive. Our solutions are best-in-breed and customers need a trusted cybersecurity partner who can create a truly zerotrust based security architecture. Our customers are looking to us to create critical transformations and our portfolio of solutions will help us do More ❯
ongoing management of process. Support System Integration Testing, User Acceptance Testing, Production Rollout. Applied knowledge of concepts and principles of 'Secure by Design' and 'ZeroTrust'. Willingness to learn new Security skills and build experience from working in different security domains, with evidence of continued personal growth More ❯
among others. Experience in network performance and security, "how the internet works", corporate networking and SD-WAN as well as industry concepts such as ZeroTrust and SASE. Aptitude for learning technical concepts/terms (technical background in engineering, computer science, or IT is a plus). Strong More ❯
Central Government. Experience in network performance and security, "how the internet works," corporate networking and SD-WAN as well as industry concepts such as ZeroTrust and SASE. Aptitude for learning technical concepts/terms (technical background in engineering, computer science, or IT is a plus). Strong More ❯
buying decisions, how to explain ROI. A knowledge of the competitive landscape for one or more of: DDoS, CDN, Performance, DNS, Developer platform or Zero-Trust/SASE service providers. You're OK with some in-region travel ( days per quarter): eg. Being next to our clients means More ❯
partnerships and alliances in new market segments Identify common uses cases, develop and share selling strategies directed at specific market segments (examples: 5G, IOT, ZeroTrust, Critical Infrastructure, Manufacturing) Provide feedback to Business Development leadership and Product Management teams to execute product integrations for incremental growth. Collaborate with More ❯
organizations to more quickly and widely adopt emerging technologies while ensuring the integrity of their intellectual property; information flow during disaster response scenarios, and zero-trust/least-privilege environments for M&A, attorney-client privileged communications, etc. And we've only scratched the surface. At our core More ❯
evolving threats, maintain operational integrity, and comply with data regulations. Global Fortune 500 companies like LVMH, Michelin, Schneider Electric, Toyota, Capgemini and non-profits trust Odaseva with their most complex data security challenges. More than 120 million Salesforce users rely on Odaseva, and we're backed by Salesforce Ventures. … Odaseva's integrated suite of security products features ZeroTrust architecture and real-time processing that not only meets but anticipates the stringent demands of global compliance. We provide businesses with the tools to prove recovery readiness, streamline precise data restoration, and leverage tools that protect the integrity … innovate and grow. Our culture is built on being smart, humble, hardworking, and above all-collaborative . Our core values define who we are: Trust, Customer Centricity, Engagement, Excellence, Continuous Innovation, and Teamwork . Inclusive & Diverse - We champion equality and embrace diversity. Supportive & Collaborative - A team of smart, kind More ❯
moving fast. Built by engineers for engineers, The Teleport Access Platform delivers on-demand, least privileged access to infrastructure based on cryptographic identity and zerotrust, with built-in identity security and policy governance, making the happy path for engineers the secure path. Teleport is trusted by the … people to accomplish their goals by working alongside highly talented people to make the most of their careers. You have the freedom, autonomy and trust to do what you're great at and have a significant impact on the future prospects of the company. Whether that's taking a … do. You will be joining the engineering team of Teleport , unified access plane for SSH, Kubernetes and Database infrastructure. Nasdaq, SumoLogic and Samsung Electronics trust Teleport to secure access to their infrastructure. Teleport is an open source project, written in Golang with web-based UIs in JavaScript with React. More ❯
who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together - lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the . Verizon's Global Cybersecurity Solutions group is a leading provider of advanced … imperative for you to remain abreast of advancements in technology and evolving market trends, particularly those pertaining to Data security and privacy, Artificial Intelligence, ZeroTrust, and Secure Access Service Edge (SASE), Cyber resilience and risk quantification as well as market regulatory needs and compliance. Ability to understand More ❯
this role, you will: Contribute to the development, deployment, and management of Samsara's enterprise security program, including endpoint detection and response, vulnerability management, zerotrust workflows, data loss prevention, and more. Be a key contributor for one or more security systems or processes, working both independently and … security in the technology sector with clear impact and career progression. Deep knowledge within enterprise security workflows, such as managing endpoint security toolsets, device trust efforts, email security tooling, secure access service edge delivery, or modern data loss prevention programs. Functional knowledge of one or more programming or scripting More ❯
threat detection, policies, compliance and assurance, and security architecture, addressing current and future needs of the University. Alongside driving the University's implementation of zero-trust architecture, you will be responsible for our ongoing Cyber Essentials implementation, and our overall security strategy, working closely with our outsourced More ❯
to be nothing short of the best. Preferred qualifications, capabilities, and skills Knowledge of security topics such as authentication, authorization, IdP, OAuth2/OIDC, zero-trust architectures, PKI are beneficial but not mandatory. More ❯
devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering or infrastructure programmes. More ❯