Key Responsibilities
Security Design, Implementation & Management
- Design, implement, and maintain cybersecurity solutions to protect enterprise systems, networks, and data from threats and vulnerabilities
- Develop and manage security architectures aligned with client network topologies and organizational requirements
- Assist in the configuration and optimization of firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and SIEM tools
- Support secure onboarding and continuous monitoring for customer-facing services, ensuring high availability and resilience
Risk Assessment & Threat Detection
- Conduct risk assessments, identify and remediate security gaps
- Analyze network traffic patterns and logs to detect anomalies and contribute to threat hunting initiatives
- Stay up to date with emerging threats, industry trends, and compliance frameworks such as NIST, ISO 27001, or GDPR
Customer Engagement & Education
- Engage directly with customers to understand their security needs, provide expert guidance, and support secure solution deployments
- Educate customers on cybersecurity hygiene and help design awareness programs tailored to their risk landscape
Collaboration & Integration
- Collaborate with DevOps, IT, and engineering teams to integrate cybersecurity best practices into service workflows and infrastructure projects
Documentation & Compliance
- Create and maintain documentation for security procedures, client-specific configurations, and compliance reporting
Key Qualifications
You are someone who
- Is able to communicate complex technical issues to non-technical stakeholders
- Has customer-facing expertise: translating security posture into accessible solutions
- Is able to write clear policies, diagrams, and process documentation
- Has an analytical mindset for investigation and root-cause analysis
- Has a creative approach to layering technologies and designing secure workarounds
- Shows proactive risk identification before threats manifest
Knowledge of
- Network security architecture (LAN/WAN, cloud, hybrid environments)
- Endpoint Detection & Response (EDR), IDS/IPS, and firewalls (e.g., Palo Alto, Fortinet)
- EDR/AV: CrowdStrike, SentinelOne, Microsoft Defender
- VPN, zero trust, microsegmentation
- Security Information and Event Management (SIEM), log analysis, and threat correlation
- Compliance frameworks: NIST, ISO 27001, SOC 2, GDPR, CIS Controls
- Threat landscapes (MITRE ATT&CK, CVSS scoring framework)
- Malware behaviors, insider threats, phishing attacks
Experience with
- Vulnerability assessment and remediation planning
- Risk analysis methodologies (qualitative & quantitative)
- Threat hunting, anomaly detection, traffic analysis
- Log correlation and investigative skills using tools like Splunk, QRadar
- Configuration management and scripting: Bash, PowerShell, Python (optional but useful)
Going for gold?
- You have one or more of following certifications:
- CISSP
- CISM / CISA
- CEH / OSCP
- CompTIA Security+ (for baseline knowledge)
- Vendor-specific (e.g., Palo Alto PCNSA, Microsoft SC-200)
This role may include participation in our on-call duty system, which means being available outside regular hours to respond to urgent technical incidents. On-call weeks are planned in advance, and we offer a base allowance plus potential overtime compensation. You would need to respond within 30 minutes and be reachable by laptop, phone, or email when on call.
US: Diversity Statement - Equal Employment Opportunity
It is Lansweeper's policy to provide equal employment opportunity to all applicants and employees. Lansweeper disapproves of, and will not tolerate, unlawful discrimination against any applicant or employee because of race, color, national origin or ancestry, gender (including pregnancy, childbirth, or related medical conditions), gender identity, age, religion, disability, family care status, veteran status, marital status, sexual orientation, or any other basis protected by local, state, or federal laws.
Similar Jobs
What We Do
Managing a technology estate has never been a bigger challenge. Hardware, software, and users can be anywhere at any time, making IT environments extremely dynamic and often complex. A seemingly simple question has become terribly difficult to answer: ‘Who is using what device?’
CIO's, CTO's, IT managers, ... have to make decisions that are often based on scattered, out of date, and incomplete data sources. How can you effectively manage the technology assets of an organization, if you’re not 100% sure of what assets you have to manage in the first place?
This question inspired Lansweeper and still drives us today. We believe that answering it is crucial to tackle and simplify many of the challenges companies face every day.
Centralized technology asset intelligence enables every stakeholder who needs insights into your company’s IT landscape to speak the same language. Connecting and centralizing asset data to collaborate across silos, locations, and departments is essential.
Eliminate the blind spots from your environment and discover assets you didn't even know about. Lansweeper provides you the means to achieve complete visibility into your IT, centralized into one solution, helping you gain an in-depth understanding of your entire IT estate.
Lansweeper creates a substantial reduction in the measure of time IT teams would ordinarily spend on routine, yet key assignments, such as network discovery, inventory, software distribution, licensing and updates. This task automation is critical for organizations with restricted staff and IT spending plans. Reveal needless expenses, support budgeting decisions, and manage your IT cost-effectively with Lansweeper
The basic premise of good cybersecurity is that you can’t protect what you can’t see. So the critical first step when it comes to basic cyber hygiene is to maintain visibility of your IT environments and develop the relevant daily routines to inspect and verify.
Why Work With Us
We are on a mission. How about you?
We don't over promise, We Deliver! We empower courageous and the adventurous. The eager to learn and the keen to grow. The inventive and the exceptional. The misfits and the perfect fits. Together, we're writing our visionary story of ambition, growth, and top-notch tech.
Gallery
Lansweeper Offices
Hybrid Workspace
Employees engage in a combination of remote and on-site work.





