secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL/TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber More ❯
secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL/TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber More ❯
watford, hertfordshire, east anglia, united kingdom
Electus Recruitment Solutions
secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL/TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber More ❯
Stevenage, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
MBDA
secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL/TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber More ❯
Stevenage, Hertfordshire, England, United Kingdom Hybrid / WFH Options
MBDA
secure proxy solutions (e.g. Bluecoat, F5) and the ability to implement policies for content filtering, SSL inspection and network traffic monitoring. In depth knowledge of security protocols such as IPSec, SSL/TLS, VPNs and two factor authentication. Understanding of network architectures and security zones (DMZ, internal networks). Proficient in monitoring technologies e.g. PRTG, Nagios. DESIRABLES Understanding of cyber More ❯