Gloucester, Gloucestershire, South West, United Kingdom
DXC Technology
Shell scripting(Bash, KornShell, etc.) Infrastructure as Code (IaC): Ansible, Terraform, Puppet, Chef Process and job control(cron, at, systemd timers) Networking fundamentals(TCP/IP, DNS, DHCP, NFS, SSH, FTP) Filesystem management(LVM, ext4, XFS, ZFS) Performance tuning and monitoring(top, vmstat, iostat, sar, netstat) Exposure to automation software such as Ansible/Puppet Knowledge of scripting with Bash More ❯
Shell scripting (Bash, KornShell, etc.) Infrastructure as Code (IaC): Ansible, Terraform, Puppet, Chef Process and job control (cron, at, systemd timers) Networking fundamentals (TCP/IP, DNS, DHCP, NFS, SSH, FTP) Filesystem management (LVM, ext4, XFS, ZFS) Performance tuning and monitoring (top, vmstat, iostat, sar, netstat) Exposure to automation software such as Ansible/Puppet Knowledge of scripting with Bash More ❯
Belfast, Northern Ireland, United Kingdom Hybrid/Remote Options
MK Recruit
autonomy and variety in a global environment. What You’ll Do Deploy, configure, and maintain Linux servers in production and staging environments Manage network infrastructure and secure remote access (SSH, VPNs, firewalls) Implement and improve server monitoring, maintenance, and automation Troubleshoot system and network performance issues Collaborate with DevOps and IT teams to support critical systems Document infrastructure and mentor More ❯
field · Be experienced in IT or software development roles · Possess a strong understanding of IT infrastructure, network protocols, and IT security principle · Have experience with Windows Server, virtual desktops, SSH, cloud-based management tools, Jira, Confluence, GitHub, and BI reporting tools THE COMPANY: We manufacture top of the range products from office printers, to industrial machining centres. We have won More ❯
OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network protocols (TCP/IP, DNS, HTTP/S More ❯
OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Detailed understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network protocols (TCP/IP, DNS, HTTP/S More ❯
and vulnerability scanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP, HTTP, DNS, SSH • Familiarity with network segmentation • Experience with endpoint protection software EDR, Anti-Virus, DLP and securing mobile, tablet, laptop, desktop devices. • Familiar with Zero Trust security models • Proficient in using SIEM More ❯
OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network protocols (TCP/IP, DNS, Understanding of industrial More ❯
Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C++ programming skills and/or web application framework , i.e. Angular Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.). Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network protocols (TCP/IP, DNS, HTTP/ More ❯
embedded firmware Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C/C++ programming skills Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25) Familiarity with Linux, Windows, RTOS and network protocols (TCP/IP, DNS, HTTP/S More ❯
Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C++ programming skills and/or web application framework , i.e. Angular Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.). Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25). Familiarity with Linux, Windows, and network protocols (TCP/IP, DNS, Understanding of More ❯
embedded firmware Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Strong C/C++ programming skills Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding of common vulnerabilities (e.g., OWASP Top 10, CWE/SANS Top 25) Familiarity with Linux, Windows, RTOS and network protocols (TCP/IP, DNS, Understanding of industrial More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and More ❯
City, Birmingham, United Kingdom Hybrid/Remote Options
TXP
NIST, ISO 27001, Cyber Essentials+ Hands-on experience with tools like Nessus, Qualys, SIEM, EDR, DLP, VPNs, and firewalls Strong understanding of network protocols (TCP/IP, DNS, HTTP, SSH) and segmentation Knowledge of Zero Trust architecture and cloud-native security practices Proficiency in identity and access management (Azure AD, MFA, SSO, RBAC) Skilled in log analysis, threat detection, and More ❯
Linux System Administration, including deployment and hardening. Basic knowledge of Ruby Programming to customise Oxidized behaviour. Experienced with Git & Version Control Workflows. Skilled in Network Device Access & Protocols, including SSH, Telnet, and SNMP. Expertise in Oxidized Configuration & Model Development. Experience with inventory integration methods such as CSV, SQL, or HTTP. Familiarity with monitoring and notification integration tools like Syslog, Slack More ❯
Linux System Administration, including deployment and hardening. Basic knowledge of Ruby Programming to customise Oxidized behaviour. Experienced with Git & Version Control Workflows. Skilled in Network Device Access & Protocols, including SSH, Telnet, and SNMP. Expertise in Oxidized Configuration & Model Development. Experience with inventory integration methods such as CSV, SQL, or HTTP. Familiarity with monitoring and notification integration tools like Syslog, Slack More ❯
Southampton, Hampshire, South East, United Kingdom
Spectrum It Recruitment Limited
to their end users on the efficient and effective use of their software solution. What We're Looking For Linux operating System: Experience using terminal sessions (e.g., PuTTY, native SSH). Good at executing Linux commands confidently for daily operational tasks and troubleshooting. Additional Linux skills, including scripting and system administration basics. Windows Operating System: Complete knowledge required to debug More ❯
Swavesey, Cambridgeshire, United Kingdom Hybrid/Remote Options
Gardasoft Vision Ltd
oscilloscopes, logic analysers, protocol analysers, etc. High level familiarity of electronics & schematics relevant to embedded systems. Good knowledge of communication protocols – e.g. TCP/UDP, SPI/I2C, CAN , SSH, HTTPS, RS232, RS485, etc. Eye for detail and problem solving ability. Proven numerical and analytical skills. Desirable Skills/Experience: Experience developing on Arm Cortex platforms; RTOS or Bare-metal. More ❯
Middlesex, south east england, united kingdom Hybrid/Remote Options
Sky
relevant to broadcast applications. Proficiency in Linux, including basic troubleshooting via command-line interfaces. Solid working knowledge of IT networking (IPv4, TCP/UDP, DNS) and common security standards (SSH keys, TLS certificates). Strong problem-solving skills and the ability to troubleshoot complex systems in both broadcast and IT environments. Experience working in live production environments is a plus. More ❯
and Layer 3 networking. Proficiency with Cisco equipment, Versa SD-WAN, and ideally Meraki. Solid understanding of Layer 2 features: LAGs, Spanning Tree, CoS/QoS, TACACS, SNMP, FTP, SSH, NTP, ACLs, and device configuration/management. Familiarity with Layer 3 protocols, Cisco IOS, and SD-WAN technologies. Experience with traffic generators and tools such as Ixia, Byteblower, Wireshark. Testing More ❯
and Layer 3 networking. Proficiency with Cisco equipment, Versa SD-WAN, and ideally Meraki. Solid understanding of Layer 2 features: LAGs, Spanning Tree, CoS/QoS, TACACS, SNMP, FTP, SSH, NTP, ACLs, and device configuration/management. Familiarity with Layer 3 protocols, Cisco IOS, and SD-WAN technologies. Experience with traffic generators and tools such as Ixia, Byteblower, Wireshark. Testing More ❯
connectors/ETL or complex backend. Design data models from scratch. Do advanced analytics - only basic checks according to checklists. Tools: Postman/Insomnia, WinSCP/FileZilla/Termius, SSH/SFTP/PGP, Google Sheets/Excel, SQL (MariaDB/MySQL/Postgres), 1Password/Bitwarden, G-Drive/S3. Bonus: Python/PowerShell for mini-scripts. Requirements … years in IT-Support/system administration (accounts, access, SSO/MFA, networks at a basic level). Practice with SFTP/SSH/keys, understanding read-only access and IP allow-list. Basic SQL (SELECT/COUNT/JOIN at the check level), confident work with CSV/JSON, attention to encodings and separators. Scrupulousness, discipline in safety and More ❯