Solution Expert Management experience for small technical teams Two years of experience implementing load balancing solutions for cloud applications Experience working with enterprise VPN, PKIinfrastructure, and DNS solutions Thorough knowledge of network security concepts and emerging cybersecurity capabilities Thorough knowledge of various enterprise security point technologies and tools more »
Solution Expert Management experience for small technical teams Two years of experience implementing load balancing solutions for cloud applications Experience working with enterprise VPN, PKIinfrastructure, and DNS solutions Thorough knowledge of network security concepts and emerging cybersecurity capabilities Thorough knowledge of various enterprise security point technologies and tools more »
Solution Expert Management experience for small technical teams Two years of experience implementing load balancing solutions for cloud applications Experience working with enterprise VPN, PKIinfrastructure, and DNS solutions Thorough knowledge of network security concepts and emerging cybersecurity capabilities Thorough knowledge of various enterprise security point technologies and tools more »
Solution Expert Management experience for small technical teams Two years of experience implementing load balancing solutions for cloud applications Experience working with enterprise VPN, PKIinfrastructure, and DNS solutions Thorough knowledge of network security concepts and emerging cybersecurity capabilities Thorough knowledge of various enterprise security point technologies and tools more »
Solution Expert Management experience for small technical teams Two years of experience implementing load balancing solutions for cloud applications Experience working with enterprise VPN, PKIinfrastructure, and DNS solutions Thorough knowledge of network security concepts and emerging cybersecurity capabilities Thorough knowledge of various enterprise security point technologies and tools more »
Solution Expert Management experience for small technical teams Two years of experience implementing load balancing solutions for cloud applications Experience working with enterprise VPN, PKIinfrastructure, and DNS solutions Thorough knowledge of network security concepts and emerging cybersecurity capabilities Thorough knowledge of various enterprise security point technologies and tools more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
Alto Firewalls to engineer boundary protection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS, Active Directory, and 802.1x. • Engineering solutions with Cisco Call Manger and VTC technologies. • Possess excellent written and oral communication skills. As a more »
Alto Firewalls to engineer boundary protection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS, Active Directory, and 802.1x. • Engineering solutions with Cisco Call Manger and VTC technologies. • Possess excellent written and oral communication skills. As a more »
Alto Firewalls to engineer boundary protection mechanisms. • Experience with network security concepts, best practices and technologies including, but not limited to, SSH, IPSec, TACACS, PKI, firewall policies, DNS, Active Directory, and 802.1x. • Engineering solutions with Cisco Call Manger and VTC technologies. • Possess excellent written and oral communication skills. As a more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes more »
testing Physical security testing System-level logical analysis Product evaluations against Technology Type standards (Protection Profiles) Cryptographic and PublicKeyInfrastructure (PKI) testing Cryptographic algorithm testing Source code review activities Technical report writing and review. Testing automation through scripting Develop applications to support test cases. You Will … Bring These Qualifications: Cryptographic Validation Program (CVP) Certification Knowledge of cryptographic encryption algorithms, key exchange algorithms, hashing/message authentication algorithms, PKI, random number generators, etc. Experience with various programming languages (C, C++, Python or Java) and development environments. Ability to comprehend security standard requirements and apply them to more »
tool(s) and/or local console management capabilities. •Performs other information security duties including Trusted Agent (TA) PublicKeyInfrastructure (PKI) token issuer and PIN reset roles as required. Physical Requirements: •Must be able to lift and carry 50 lbs. for up to a 100 feet more »
Experience working with Infrastructure Services at scale, 10,000+ user base. Experience and/or certified in PublicKeyInfrastructure (PKI) A proactive, problem solving mindset Able to work autonomously and as part of a technology leadership team Confident, enthusiastic with a pragmatic approach. Experience and more »
Employment Type: Permanent
Salary: £60000 - £65000/annum Life Insurance/Health Care/Pension
Glasgow, City of Glasgow, United Kingdom Hybrid / WFH Options
CGI
Job order - J(Apply online only) - Permanent Full Time Title Pre-Sales EUC Architect Category Architecture City UK Wide - Various, UK Wide - Various, United Kingdom Job Description Pre-Sales EUC Architect Position Description Challenge yourself and change lives, unlocking complex more »
City of London, United Kingdom Hybrid / WFH Options
CGI
Job order - J(Apply online only) - Permanent Full Time Title Pre-Sales EUC Architect Category Architecture City UK Wide - Various, UK Wide - Various, United Kingdom Job Description Pre-Sales EUC Architect Position Description Challenge yourself and change lives, unlocking complex more »