engagements. RFP Responses: Assist in responding to RFIs and RFPs, ensuring alignment with customer requirements and CyberArk capabilities. Qualifications Knowledge of cryptographic security technologies such as SSL/TLS, SSH, PKI, and HSMs . Strong understanding of enterprise IT environments, including Windows Server, Linux/Unix, Active Directory/LDAP, load balancers, web servers, virtualization, and endpoint security . Familiarity More ❯
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
with log aggregation tools used for audit log purposes from all sources, including Linux and Windows systems, Networking equipment, and applications Experience with public key infrastructure (PKI), secureshell (ssh) configuration and troubleshooting, sssd, httpd Experience with Amazon Web Services or other cloud technologies Experience deploying SAN storage preferably from IBM (GPFS) 2 , Experience bootstrapping HPE servers, configuring storage, iLO More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
STAR 2281 TBD - No LCAT Specified Position Requires ACTIVE TS/SCI Clearance with Polygraph No Level Required Chantilly The maximum number of FTEs is 0.5 (either .5 for a 1-year period or 1.0 for a 6-month period More ❯
Linux-based systems (primarily Ubuntu, CentOS, RHEL, etc.) Troubleshoot and resolve hardware, software, and networking issues in physical and virtual environments Manage user access, permissions, and authentication (e.g., LDAP, SSH, Sudo policies) Monitor system performance and health; perform regular updates, patches, and backups Assist in deployment, configuration, and maintenance of servers and critical applications Document processes, procedures, and configurations in More ❯
anomalies to discover new threat actors and taking operational actions to achieve mission requirements. You should be comfortable working in a Linux (CentOS/Debian/Ubuntu) environment, using SSH and being able to conduct regular Linux system administration, configuration and maintenance tasks. You will be able to help improve existing Standard Operating Procedures (SOPs) and documentation. You should have More ❯
Role Description : As an Operational Security Officer for IBM Mainframe Z Series, your primary role is to maintain and improve the overall security posture of the organization's IT infrastructure that is based on IBM Mainframe Z Series technology. You More ❯
network vulnerabilities including: IP spoofing Use of default credentials Open/unused ports Unencrypted communication protocols (e.g., Telnet, SNMPv1) Missing firmware or OS-level patches Enforce secure alternatives like SSH and SNMPv3 , and ensure TLS 1.2/1.3 is implemented for encrypted communications. Apply hardening techniques across firewalls, routers, and switches based on CIS Benchmarks , NIST standards , and industry best More ❯
study 5 years of previous working experience as a Linux administrator Competent in Shell, Perl, and/or Python scripting Solid knowledge of protocols such as DNS, HTTP, LDAP, SSH, SNMP, etc. Familiarity with VMWare Security+ certification Familiarity with DevOps tooling (e.g. Jenkins, Salt, Gitlab) Cybersecurity expertise, including adversarial awareness and common IT Security requirements Active TS/SCI clearance More ❯
as an extension of Tier 3 when resolving complex issues on Endpoint Devices (workstations, mobile devices) Implement and maintain PKI Infrastructures, server certificates, Certificate Authority, Secure DNS (DNS SEC), SSH, PGP, and AWS CLI Access keys. Perform operating system and VMware vSphere and Microsoft HyperV administration, account management, and provisioning activity. Install and setup Enterprise Database systems i.e. Oracle, Microsoft More ❯
standard requirements and apply them effectively to products. Experience setting up networks and familiarity with subnetting and routing concepts. Knowledge of common security-related protocols and their design (e.g., SSH, IPsec, TLS). Experience building testing environments, performing testing, and reporting results (technical writing). Strong troubleshooting and problem-solving skills. Strong multitasking and time management abilities. Typically requires a More ❯
standard requirements and apply them effectively to products. Experience setting up networks and familiarity with subnetting and routing concepts. Knowledge of common security-related protocols and their design (e.g., SSH, IPsec, TLS). Experience building testing environments, performing testing, and reporting results (technical writing). Strong troubleshooting and problem-solving skills. Strong multitasking and time management abilities. Typically requires a More ❯
a full-time position located at Hanscom AFB, Bedford, MA. Responsibilities Duties include, but not limited to: Possess a deep understanding of Internet based technologies (DNS, Security, IP Routing, SSH, SFTP, HTTP/HTTPS, etc.). Deep understanding of IP network technologies and software tools for performance monitoring and troubleshooting. (Especially layers 2 and 3). Write and maintain custom More ❯
systems such as LDAP, SSO, SAML, Azure AD/Entra ID and MS Active Directory/ADFS Familiarity with TCP/IP, SSL, IPSec, HTTP/HTTPS, DNS, SMTP, SSH protocols Versatile with using various operating systems including Windows, Mac, and GNU/Ubuntu Hands-on knowledge with system and network troubleshooting using tools such as ps, top, strace, Wireshark More ❯
DNS, SMTP, IP routing, latency, and connectivity issues Implement TCP/IP & related services-DHCP/DNS Install/Upgrade Cisco Switches and Firewalls (ASA) IOS using TFTP Implement SSH/RADIUS authentication on Cisco Hardware Troubleshoot network problems using Protocol Analyzers Maintain all LAN/WAN connectivity Document network problems and resolution for future reference Oversee software and network More ❯
Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical tools is preferable Good understanding of common protocols such as HTTP, SMTP, SSL/TLS, SSH, DNS Must demonstrate strong analytical and problem-solving skills to enable effective security incident and problem resolution Knowledge of latest threat trends and security landscape Pre-requisites: Excellent analytical skills More ❯