Skip to Content

40 under 40: Jon Bucsok, Unlimited Technology, Inc.

40 under 40: Jon Bucsok, Unlimited Technology, Inc.

40 under 40: Jon Bucsok, Unlimited Technology, Inc.

YARMOUTH, Maine—For Jon Bucsok, it’s all relative. Bucsok, whose father and brother are both in the security industry, followed in their footsteps and currently serves as Strategic Accounts Project Manager at Unlimited Technology, a Chester Springs, Pa.-based provider of systems integrator solutions.

The 34-year-old Bucsok, who has been with Unlimited Technology for four years, told Security Systems News that he “manages projects to ensure completion by a given deadline, whilst maintaining cost and adherence to the project scope of work. The slight modification to the usual Project Manager title is driven by increased responsibilities in cultivating, maintaining and growing accounts with nationwide or worldwide footprints.

“I’m still responsible for the usual tasks of reviewing drawings and designs, procuring materials, writing contracts, scheduling and coordinating, as well as quality assurance. My company counts on me to go above and beyond the strict project scope, making judgment calls that best meet the needs of our clients.”

Family Ties

With his father and brother both in the security industry, Bucsok noted that “I suppose it was only a matter of time before I got roped in! My father started his own security business when he was younger and maintained a strong relationship as a subcontractor for a larger security integrator. Over time it made more sense to join that integrator and assume the role of Senior Project Manager.

“My brother, an absolute wizard with electronics, worked under my father’s wing and took very well to the role of a technician. In fact, when we were teenagers, he even designed and installed his very own alarm system for his bedroom when we were kids! Over time he progressed very successfully to a Project Management role and is now an Operations Manager.

Bucsok added that he started working at his father’s security company as a teenager, primarily in the warehouse learning all the hardware.

“Over time, I developed an understanding of how to engineer a system just by looking at the routine bill of materials,” he said. “I started learning the electrical aspects when I was a Field Technician, as well as developing initial leadership skills. In this team lead position, I began to see and respect how people process and execute work very differently, an insight that is paramount to my role today. I then took up a role as a Sales Engineer but found myself focusing more on the engineering side than sales. While I preferred engineering, I did appreciate the balance of client support and operations. That new appreciation got me into the project management role that I enjoy today.”

IT and Security

When asked about the top trends in security today, Bucsok pointed out the back and forth between IT and security teams in terms of equipment control.

“As security systems become more network based, the benefits and heartaches are inevitably following suit,” he explained. “We are seeing clients’ IT and security teams contending as to who will be responsible for the provisioning, maintenance, and security of the equipment. I see the arguments for both sides maintaining control, but with cybersecurity bearing ever present, I feel that the IT roles will eventually fall under the security functions.

“Until then, at Unlimited Technology, we are offering both managed services and network health monitoring to supplement our installations for the full package, whilst thoughtfully engaging both teams to try and maintain a comfortable balance.”

He added that on the end point side of things, “I’m seeing more demand for control at the end users’ fingertips with features like cloud-based security and mobile phone control. The residential sector seems to be sparking this interest with products like Ring, Nest and SimpliSafe, but those systems are not robust enough for commercial needs.

“However, that does not stop commercial clients from asking for it. Fortunately, with everything living on the network and manufacturers providing greater integration functions, this is becoming a functional operation, but we need to be careful. It follows that the more accessible these systems are to access for permitted users, the more accessible they will be for nefarious ones.”

Cyber Technology

The most exciting/promising new security technology, according to Bucsok, is

cybersecurity “for sure, despite the industry often overlooking it. Many big brands already have taken this into mind, but smaller companies trying to appeal to the benefits of networking are still doing the bare minimum to get connected.

“At a minimum, every product should require the user to alter the login credentials and have minimum recommendations. Some manufacturers will even force a default username which cannot be changed.”

He continued. “I’m looking forward to seeing software developers in smaller to mid-size companies gain support in hardening their programming. Even companies like Microsoft, Amazon and Google are exposed to zero-day vulnerabilities. What can we expect out of smaller companies that are focusing on getting their products to market, rather than making them more robust or resilient? I think there is a market out there, but it seems only those that are regularly involved in the risks see the need for it.

“Unfortunately, I think it will take a rude awakening before the implicit need is established to expand the market on these services. Until then, homes and small business will likely remain vulnerable to cybersecurity threats.”

Keys to Success

With the COVID-19 pandemic entering its third year, Bucsok noted that planning, risk management and communication are “more important now than ever” during these challenging times.

“From an operational perspective, completing projects hinges much more heavily on external factors than before, such as material acquisition,” he explained. “Getting the core project materials like cameras and card readers is enough of a challenge on its own, but then we are also finding shortages for safety equipment like masks and disposable coveralls. So even when the project gets going, we can still run into snags that delay completion.

“Project scope changes are also pushing competition dates out further. It is frustrating for clients when the project takes several months to get started and then a small change, like adding a sub-panel or additional cameras, puts you right back in the waiting line. The best preventative measure seems to be getting the client to purchase spare critical materials upfront, which can be used for future service. Unfortunately, this seldom happens. More realistically, communication about these challenges with clients early and often is so important right now.

In addition, “keeping communication with your vendors and manufacturers is critical,” he said. “Several companies are adjusting their supply chains based on the current economic situation which has led to different part numbers for the same or similar part. Through trial and error, we’ve learned that if any item says ‘back ordered,’ that we should reach out to the manufacturer and see if a new model has been released that might be a slightly different color or different manufacturing origin.

“Even with the best planning and risk management, these tumultuous times will still find a way to push a project off the rails. Relaying information frequently and transparently to clients is not just a good idea but mandatory these days.”

Intertwined Verticals

Looking ahead, Bucsok predicts that the IT and security verticals will become “much more intertwined.”

“The days of benevolently installing network security devices without any thought to how the network is structured or secured are coming to an end for professionals,” he explained. “The companies that embrace this principal will find themselves with the competitive edge as the world begins to adapt to these new threats.

“It is ironic that we install cameras to catch physical threats, but then those same cameras become a point of entry for digital threats. We do not want to sound like fear mongers, but it is important that as security professionals we make clients feel comfortable that even the unseen threats are being addressed.”

In addition, Bucsok noted that producing content on social media platforms like YouTube and Instagram would be a “great start” in attracting more talented, diverse young people into the security industry.

“Other closely related industries like electrical contracting, information technology and cybersecurity already having engaging channels that talk about their trades in exciting ways,” he said.


To comment on this post, please log in to your account or set up an account now.