methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes more »
servers.Knowledge of managing virtual machines (and possibly containers) and perhaps containers using such technologies as KVM, RHEV, VMware or Kubernetes.Knowledge of Rest APIs, Git, PKI and SSL certificates, RedHat/Fedora, DNS, Mail, LDAP and kernel-level debugging.Experience in automation and management of platform configuration using Ansible, Python, Puppet or more »
enabling technologies including but not limited to SIEM, SOAR, Case Management, GRC, EDR, Intrusion Detection Systems, HIPS, Web Proxy/Content Filtering, Active Directory, PKI- Work with partners to mature crisis procedures and security and privacy incident managementQualificationsMinimum Qualifications- CISSP, GCIA, GCIH, GREM or applicable experience in the Information Security more »
Excellent Communications - Experience with NetApp ONTAP and Synology - Awareness of Scality Ring, Service Mesh, consol and ltsio, NiFi, Kafka, AD, DNS Management, Group Policy, PKI, lAM and System Hardening. - Must hold a higher level government clearance. Together, as owners, lets turn meaningful insights into action. Life at CGI is rooted more »
routing, switching, and firewall principles and protocols. Experience with SDN, DPDK and SR-IOV would be a plus. Security tools and practices: Configuration of PKI, certificates, HashiCorp Vault, and software supply chain security, in the context of cloud and Kubernetes environments. CI/CD: Expertise in integrating with a GitOps more »
Greater London, England, United Kingdom Hybrid / WFH Options
Made Tech
cloud-based tooling Up-to-date understanding of network security (e.g. OSI, TCP/IP), web application security (e.g. OWASP) and cryptographic controls (e.g. PKI, TLS) Up-to-date understanding of identity management and authentication/authorisation products and patterns Evidence of self-development – we value keen learners Drive to more »
Reading, Berkshire, Tadley, Hampshire, United Kingdom Hybrid / WFH Options
Polar Recruitment Services
BAU and Project Work. Essential skills: Active Directory experience including GPO Active SC clearance AD Connect Understanding of the 5 FSMO roles Experience with PKI Services Knowledge Domain Controllers Azure experience Hours Mon-Fri 8:30-5pm Benefits: Group personal pension - company will invest 3-6% of your salary more »
Employment Type: Permanent
Salary: £56525 - £61000/annum + benefits and clearance allowance
securing cloud communications (AWS, GCP) Knowledge of SIEM technologies such as Splunk and creation of security event related dashboards Knowledge of access control systems, PKI, multi-factor authentication, and entitlements management External applicants will be required to perform a technical interview. Application Deadline: The application window for this position is more »
securing cloud communications (AWS, GCP) Knowledge of SIEM technologies such as Splunk and creation of security event related dashboards Knowledge of access control systems, PKI, multi-factor authentication, and entitlements management External applicants will be required to perform a technical interview. Application Deadline: The application window for this position is more »
PKI Architect Remote Contract **A national security clearance is required for this role but candidates not holding this level of clearance will be considered** Leading Managed Services Provider in the Defence Sector require a PKI Architect to join their successful Practice. A sound and extensive knowledge of PKI and Cryptography … technology and Key Management Server (KMS) technology. Expert level experience in cloud solution development with Azure or AWS architectures as is related to PKI management. Extensive Cryptography & PKI solution design experience (HLD & LLD) required. If you are interested please apply via this ad in the first instance or send more »
experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced MSP is more »
the Yocto build system Full software lifecycle including design, design documentation, source control, unit test, integration test, user documentation Desired: Knowledge of PublicKeyInfrastructure systems Knowledge of IPSEC protocol Experience of board functional test design and development Experience of RF calibration procedures Experience using JTAG debuggers more »
Management Framework security controls. Performs Staff Assistance Visits to subordinate and Tenant unit ISSO programs. Acts as Site Trusted Agent for SCI PublicKeyInfrastructure issue and control. Writes, staffs, and submits Security Impact Analysis reports for HHQ approval. Manages Site REMWAR Program for the use of more »
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »
Atlanta, Georgia, United States Hybrid / WFH Options
Cox Communications
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »
Decatur, Georgia, United States Hybrid / WFH Options
Cox Communications
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »
Conley, Georgia, United States Hybrid / WFH Options
Cox Communications
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »
Redan, Georgia, United States Hybrid / WFH Options
Cox Communications
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »
Mableton, Georgia, United States Hybrid / WFH Options
Cox Communications
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »
Marietta, Georgia, United States Hybrid / WFH Options
Cox Communications
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »
Austell, Georgia, United States Hybrid / WFH Options
Cox Communications
Experience utilizing Jenkins for builds and deployment. Experience with security testing tools such as Veracode, Fortify, Burp Suite and Qualys. Familiarity with publickeyinfrastructure deployments and associated services. 2+ years experience developing in Java 7, Java 8 and/or PowerShell. Experience with enterprise single sign more »