Ideally, degree or above educated, or with relevant experience. Java software development experience within an industry setting. Ability to work in both Windows and UNIX/Linux operating systems. Good understanding of software/data design methods and data structures. Experience of API (REST) development, Docker, and Kubernetes. Familiarity with more »
Worcester, Worcestershire, West Midlands, United Kingdom
Exsel Design & Integration Ltd
develop OO solutions for implementation in C++ on embedded Linux. Design and develop non-OO solutions for implementation in C on embedded Linux. Understand Unix/Linux IPC concepts and use under Ubuntu from versions 14.04 to latest. Able to configure and manage a Debian based embedded Linux Operating System. more »
new or observed threats within the network environment or enclave. • Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. • Knowledge of big data technologies and ecosystems (e.g., NiFi). • Knowledge of current market and emerging leaders more »
End collection systems, including network traffic collection, filtering, and selection. Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of cyber defence and information security policies, procedures and regulations. Knowledge of network security architecture concepts more »
now, we can help plug the gaps. CompTIA A+, N+, S+ Windows Server, Networking, AD, DPM Virtualisation (Hyper-V, VMware) SQL Server SharePoint Cisco Unix/Linux If you are and experienced IT Trainer or a skilled Tech specialist looking to move into a Trainer role then please do apply more »
end collection systems, including network traffic collection, filtering, and selection. * Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of cyber defence and information security policies, procedures and regulations. * Knowledge of network security architecture concepts more »