London, England, United Kingdom Hybrid / WFH Options
BlackRock, Inc
i.e. SLI/SLO) and capacity planning. You are a competent Linux & Windows systems administrator (for multiple distributions), including storage management (e.g. LVM, RAID) and security best-practices e.g. SSH, SSL/TLS, HMAC, IPS/IDS. Our benefits To help you stay energized, engaged and inspired, we offer a wide range of employee benefits including: retirement investment and tools More ❯
Responses: Assist in responding to RFIs and RFPs, ensuring alignment with customer requirements and CyberArk capabilities. #LI-CB1 Qualifications Knowledge of cryptographic security technologies such as SSL/TLS, SSH, PKI, and HSMs . Strong understanding of enterprise IT environments, including Windows Server, Linux/Unix, Active Directory/LDAP, load balancers, web servers, virtualization, and endpoint security . Familiarity More ❯
e.g. certificate handling and PKI, attestation, TPM/HSM) - Expert knowledge of Windows, Linux, and hypervisor security (especially in cloud environments) - Expert knowledge of common security-relevant protocols (e.g. SSH, TLS, DNS, DHCP, NTP, ICMP) Amazon is an equal opportunities employer. We believe passionately that employing a diverse workforce is central to our success. We make recruiting decisions based on More ❯
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Hands-on DevOps delivery experience working on digital or technology projects at a leading consultancy, agency, or government organization. AWS or Azure certification, or willingness to attain More ❯
optimising high performance technology at scale. Passion as an open source technologist, with good working knowledge of common open source technologies. (E.g. Red Hat Linux, Amazon Linux, Debian, git, SSH, rsync, nginx, apache, etc) Familiarity and experience with core Information Security principles and ISO 27001 accreditation (E.g. threat modelling, compartmentalisation, separation of concerns, principle of least privilege, etc) Ability to More ❯
e.g. certificate handling and PKI, attestation, TPM/HSM) - Expert knowledge of Windows, Linux, and hypervisor security (especially in cloud environments) - Expert knowledge of common security-relevant protocols (e.g. SSH, TLS, DNS, DHCP, NTP, ICMP) #J-18808-Ljbffr More ❯
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Hands-on DevOps delivery experience working on digital or technology projects at a leading consultancy, agency, or government organization. AWS or Azure certification, or willingness to attain More ❯
concept integrations between Venafi and many other technologies. Understand basic uses of cryptography in IT environments and common products or technologies used, in areas such as SSL/TLS, SSH, PKI, and HSMs. Strong communication and organization skills. Help bring order to chaotic environments. With an end-state in mind, must be able to identify projects or actions that need … the inventor of the technology that secures and protects machine identities. The Venafi platform provides visibility, intelligence, and automation for SSL/TLS, IoT, mobile, cloud native, Kubernetes, and SSH machine identity types. Many of the largest organizations in the world use Venafi. Billions of dollars have been spent protecting usernames and passwords and almost nothing managing machine identities—organizations More ❯
Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
GivEnergy
in our AWS environment. What We’re Looking For: >3 years’ development experience An understanding and competence in: JavaScript/TypeScript (Node.js) REST APIs, Basic Linux commands, (use case: ssh onto a server to run code) MongoDB AWS (RDS, EC2, ECS, S3, Lambda, DNS, Basic Network routing on AWS) Basic Docker understanding VCS (Git) Automation & CI/CD pipelines ( Github More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
MLOPs pipelines. Experience of working with simulation environments and the use of simulation protocols such as DIS and HLA. Experience of network programming and protocols such as HTTP(s), SSH, TCP and UDP. Mobile development experience with Java, Kotlin. Development experience working in secure environments. You may occasionally be required to work away (both in UK and abroad) in support More ❯
CSF, CIS Critical Security Controls). Awareness of common cryptographic principles and algorithms, including encryption, hashing, and key exchange methods. Understanding of key network protocols, including DNS, HTTP, TLS, SSH, TCP, UDP, ARP, IP, and IPSec. Understanding of stateful and stateless firewalls and how they control network traffic. Basic scripting skills in languages like Python or PowerShell for automating security More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
RemoteStar
Architecture in AWS and/or Azure. Cybersecurity expertise in SAST, DAST, SIEM, SSO, penetration testing, and cybersecurity controls. Experience with Cybersecurity Incident Response protocols. Cryptographic controls experience, including SSH key handling, logging, and auditing. Competence with Key Management Service, key rotation, and automation. Certifications such as AWS Certified Security, AWS Certified Advanced Networking, CCNA, CCNP are highly desirable. Experience More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
policies and processes. ·Experience of transfer protocols (SFTP, FTPS, HTTPS). ·Experience of B2B protocols (AS2/3/4, EDI, MQ, Connect:Direct) ·Understanding of encryption technologies e.g. SSH, SSL, AES, 3-DES, PGP etc ·Experience of networks and domains ·Experience of working with APIs and understanding of REST/SOAP systems. This is an excellent opportunity for a More ❯
Web Applications, and SQL servers. Knowledge of networking concepts: TCP/IP, DNS, routing, subnets, and firewall rules as related to system communication. Understanding of common ports and protocols (SSH, RDP, HTTPS, etc.) used by CyberArk for credential rotation. Scripting awareness (AutoIT, PowerShell, Python, etc.) is a plus for automation and integrations. Additional skills and experience that will help you More ❯
Linux, VMware, AWS, Containers, Kubernetes, Docker, Ansible, Terraform, PostgreSQL, Cybersecurity, Monitoring Systems Icinga2 & Elastic Stack, Core Internet Application Protocols – DHCP/DNS, Scripting, Application and Network Security best practices – SSH/Iptables/TLS Previous experience and alignment to Gigaclear’s approach to leading, managing, supporting, training, mentoring, and developing your team is key. Gigaclear is a growing Fibre Broadband More ❯
Linux, VMware, AWS, Containers, Kubernetes, Docker, Ansible, Terraform, PostgreSQL, Cybersecurity, Monitoring Systems Icinga2 & Elastic Stack, Core Internet Application Protocols – DHCP/DNS, Scripting, Application and Network Security best practices – SSH/Iptables/TLS Previous experience and alignment to Gigaclear’s approach to leading, managing, supporting, training, mentoring, and developing your team is key. igaclear is a growing Fibre Broadband More ❯
systems, incident management and change control tools and processes Knowledge of networking technology and protocols including routers, switches, firewalls, TCP/IP, UDP, BGP, HTTP(S), SSL/TLS, SSH, SNMP etc. Knowledge of IT security practices and technologies including IPSec and PKI. Knowledge of Cloud Computing Services Knowledge of various operating systems usage and administration (Windows and Linux) Programming More ❯