support escalation point for both corporate and industrial control Active Directories Contribute to Active Directory capacity planning, metrics, reporting, domain controller placement. Contribute to PKI capacity planning, reporting, certificate template usage, design. Contribute to Cybersecurity Operations roadmap. Cybersecurity Operations and Directory services advocate for the region Primary resource for CIP more »
Farnborough, England, United Kingdom Hybrid / WFH Options
Parico
as design, implementation, troubleshooting and support, including: Microsoft Windows Server 2012 R2, 2016, 2019 and 2022 AD and NTFS permissions DNS DHCP Group Policy PKI SQL (Failover Clustering + AG) Microsoft Cloud Azure Experience O365 Virtualisation Technologies VMware ESX vSphere Nutanix HCI Replication and Backup Technologies Cross-site failure and more »
Linux operating systems: Oracle Linux (Red Hat, CentOS) Systematic problem-solving approach, strong communication skills, a sense of ownership and drive Solid understanding of PKI, mTLS, SSL, SSH Experience with Agile Development (Scrum or Kanban) Experience with production operations and good practices for putting quality code in production and troubleshoot more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »
and techniques including EDR, IPS, and firewalls configuration and maintenance. Knowledge of email, web, cloud security, identity, and access management. Knowledge of publickeyinfrastructure, encryption, and tokenization. Knowledge of vulnerability scanning and penetration testing. Knowledge of security threat and risk assessment and threat modeling. Knowledge of more »