National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cyber Security Consultant

JR United Kingdom
Glasgow
5 days ago
Create job alert

Social network you want to login/join with:
Location: Scotland, preferably central belt for ease of collaboration. The role is hybrid, predominantly home based but requiring:
Some onsite days with clients who may be located anywhere in the UK
Face to face collaboration with colleagues in our central Glasgow workspace
Occasional UK-wide travel to events
Reports: to the Principal Technical Consultant.
Package: core salary range £50-60k + benefits subject to experience level.
ABOUT FULLPROXY
FullProxy is a specialist cyber security consultancy based in Glasgow, providing elite cyber advisory and services to critical public services plus brands such as Ryanair and Virgin Money. We’re looking for an ambitious Technical Cyber Consultant to join our experienced team based in Glasgow.
We’re growing rapidly right now, with recent accolades including Scottish Cyber Company of the Year Finalist 2025, and Tussell Tech 200 Top Growing Companies. We need to expand our team of cyber specialists to manage our increasing client workload, support our senior consultants, and provide our sales team with technical advisory in the critical stages of our customer onboarding process.
As a key member of this compact team, there’s lots of scope to make the role your own and input your specialisms, initiatives and areas of expertise into the future of the company. FullProxy is a collaborative, agile, hard working (and occasionally hard playing!) environment where everyone is an individual and all ideas are welcome.
KEY RESPONSIBILITIES & SKILLSETS
Your role will be to provide operational, consultative and administrative cyber security and technology services to FullProxy clients and prospects.
You’ll work closely with clients to understand their needs and provide the technical support to ensure their network and application infrastructures are secure and they’re getting the most out of their technology investment.
You’ll need demonstrable expertise in at least 2-3 of the following product suites: F5, Fortinet, ZScaler, Azure, AppViewX. FullProxy place high importance on ensuring that our consultants are accredited to the top level in the technologies we recommend, so you’ll need to be enthusiastic about keeping your skills up to date. We’ll help and encourage you to do this.
To provide top quality value and advice to our clients, you need to have a bigger picture cyber resilience mindset to understand the company’s entire infrastructure and ensure that recommendations and activities are optimised.
Day to day responsibilities will include but are not limited to, capacity around architecture, pre-sales, planning, troubleshooting, and enhancements of FullProxy supplied services and vendor kit, as well as providing best practices and recommendations to clients.
You’ll be a confident communicator, able to translate complex concepts into straightforward non-technical explanations. You’ll have a close working relationship with our sales and marketing team, providing expert advisory in key sales pitches, running customer demos and webinars, and investing in building your thought leadership profile via content to promote the business.
QUALIFICATIONS AND EXPERIENCE
Experience with F5 products, including LTM, DNS (GTM), AWAF (ASM), APM, and AFM plus Distributed Cloud, and Fortinet portfolio including FortiGate, FortiAnalyzer, FortiManager, FortiSwitch, FortiAP, FortiClient, FortiEMS, Secure SD-WAN
Experience with network design, implementation, and troubleshooting in a complex global multi-data center environment, including Firewall and VPN
Strong written and verbal communication skills, with the ability to explain technical concepts to both technical and non-technical audiences
F5 and/or Fortinet certification is a plus, such as F5 30x/40x, Fortinet NSE4-77 / FCX, FCSS and FCP
Experience with cloud platforms such as AWS, Azure, or Google Cloud Platform is a plus
You need to be self-motivated and solution-focused, detail-oriented, and able to work independently as well as in a team environment.
Cryptography, Encryption, PKI knowledge would be fantastic

#J-18808-Ljbffr

Related Jobs

View all jobs

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

Cyber Security Consultant

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.

LinkedIn Profile Checklist for Cybersecurity Jobs: 10 Tweaks to Supercharge Recruiter Engagement

In the ever-evolving realm of cybersecurity, having a LinkedIn profile that reflects both your technical prowess and threat-hunting acumen is vital. Organisations are on the lookout for professionals skilled in penetration testing, incident response, security architecture and compliance. With hiring managers scanning dozens of profiles daily, your profile needs to not just rank in searches but convey your expertise in safeguarding digital assets. This step-by-step LinkedIn for cybersecurity jobs checklist offers ten practical tweaks to supercharge recruiter engagement. Whether you’re an aspiring security analyst, a seasoned penetration tester or a chief information security officer aiming for board-level roles, these actionable optimisations will sharpen your LinkedIn presence and position you as a top infosec candidate.

Part-Time Study Routes That Lead to Cyber Security Jobs: Evening Courses, Bootcamps & Online Masters

The frequency and sophistication of cyber-attacks have exploded in recent years, making cyber security one of the UK’s most in-demand skill sets. From safeguarding NHS patient data to defending FTSE 100 financial systems, organisations across sectors require qualified professionals—penetration testers, security analysts, incident responders and security architects—to protect critical infrastructure. Yet many professionals cannot pause their careers to upskill full time. Fortunately, an ecosystem of part-time learning pathways—evening courses, intensive bootcamps and flexible online master’s programmes—enables you to learn cyber security while working. This comprehensive guide explores every route: foundational CPD, immersive bootcamps, accredited online MScs, plus funding options, planning strategies and a real-world case study. Whether you’re an IT support technician, a software developer or a compliance manager aiming to pivot into security, you’ll discover how to build expertise at your own pace.