methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes more »
a Technical Architect or Solution Architect role. Essential skills: Active SC clearance Development experience using PowerShell, Python or C# Leadership skills Azure experience including PKI and GPO Linux experience On Prem infrastructure experience Benefits: Group personal pension - company will invest 3-6% of your salary Life cover Income protection more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Oliver Bernard
scale – both internal employee-facing apps, and external customer-facing apps Strong on-premise infrastructure knowledge, comprising virtualisation, networking, database and data storage, PKI, in both Wintel and Linux environments Working knowledge of SDLC practises, including software development, configuration management, release management, CI/CD DevOps toolchains Providing hands more »
Information Security, or a related field Knowledge of ancillary network tools monitoring/troubleshooting tools like Wireshark would be advantageous Scripting knowledge Knowledge of PKI Knowledge of networking technology including routers, switches, and firewalls Good knowledge of software development and engineering techniques Knowledge of satellite communications systems Additional Information You more »
routing, switching, and firewall principles and protocols. Experience with SDN, DPDK and SR-IOV would be a plus. Security tools and practices: Configuration of PKI, certificates, HashiCorp Vault, and software supply chain security, in the context of cloud and Kubernetes environments. CI/CD: Expertise in integrating with a GitOps more »
Education Development diploma. One or more of the following active certifications: SRA+, or CND, or Network+, or Security+ Experience with Network Security Technologies including PKI, Vulnerability Assessments, Multiple Domains, and/or System Security Plans. Ability to quickly and dynamically change systems/network configurations to accommodate customer development/ more »
Greater London, England, United Kingdom Hybrid / WFH Options
Made Tech
cloud-based tooling Up-to-date understanding of network security (e.g. OSI, TCP/IP), web application security (e.g. OWASP) and cryptographic controls (e.g. PKI, TLS) Up-to-date understanding of identity management and authentication/authorisation products and patterns Evidence of self-development – we value keen learners Drive to more »
Reading, Berkshire, Tadley, Hampshire, United Kingdom Hybrid / WFH Options
Polar Recruitment Services
BAU and Project Work. Essential skills: Active Directory experience including GPO Active SC clearance AD Connect Understanding of the 5 FSMO roles Experience with PKI Services Knowledge Domain Controllers Azure experience Hours Mon-Fri 8:30-5pm Benefits: Group personal pension - company will invest 3-6% of your salary more »
Employment Type: Permanent
Salary: £56525 - £61000/annum + benefits and clearance allowance
Solihull, West Midlands, West Midlands (County), United Kingdom
Project People
general support escalations/fault finding. Your transferable skills and experience: Knowledge of configuring and tuning the following Juniper SRX platform BGP IPSEC MPLS PKI Desirable Skills: Juniper SRX platform - CLi exposure and knowledge of routing and switching; BGP - Successful candidate will have an in-depth knowledge of configuring and more »
interconnect. Familiar in multi-factor authentication platforms and solutions, and Identity Management such as OpenID, LDAP, and Kerberos. Security implementations using multi-factor authentication, PKI, or Kerberos and Unix OS hardening to DoD STIG standards. Experience programming or troubleshooting Python code Experience with supporting Apache Web Server Experience with Zabbix more »
experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced MSP is more »
the Yocto build system Full software lifecycle including design, design documentation, source control, unit test, integration test, user documentation Desired: Knowledge of PublicKeyInfrastructure systems Knowledge of IPSEC protocol Experience of board functional test design and development Experience of RF calibration procedures Experience using JTAG debuggers more »
Management Framework security controls. Performs Staff Assistance Visits to subordinate and Tenant unit ISSO programs. Acts as Site Trusted Agent for SCI PublicKeyInfrastructure issue and control. Writes, staffs, and submits Security Impact Analysis reports for HHQ approval. Manages Site REMWAR Program for the use of more »
CD tools such as Artifactory, Jenkins, and GIT Cloud native applications, including Terraform experience Technologies used to support microservices Encryption technologies (SSL/TLS, PKIInfrastructure management) Security controls as applied to software technologies Bachelor's degree in a related area 10+ years of related experience 10 years experience more »