Oracle Linux (Red Hat, CentOS) Systematic problem-solving approach, strong communication skills, a sense of ownership and drive Solid understanding of PKI, mTLS, SSL, SSH Experience with Agile Development (Scrum or Kanban) Experience with production operations and good practices for putting quality code in production and troubleshoot issues when they more »
Description Methods is a £100M+ IT Services Consultancy who has partnered with a range of central government departments and agencies to transform the way the public sector operates in the UK. Established over 30 years ago and UK-based, we more »
Ashby-De-La-Zouch, Leicestershire, East Midlands, United Kingdom
CMR & Life Sciences
QNX platforms. Developing best practices, procedures, checklists, and implementing security standards for control systems. Implementing secure network protocols such as SSL/TLS, HTTPS, SSH, SFTP, and secure industrial protocols for PRISMIC control systems. Conducting and maintaining ongoing threat analysis and risk assessment processes to proactively identify and mitigate potential more »
User and Application Support Creation and management of user accounts Account creation Environments Home directories Shells sssd protocol Automounter Linux Security Patching Security Updates SSH Configuration SUDO – Managing SUDO files Managing users and groups in a secure manner File Systems Permissions – How to organize and configure UNIX permissions and groups more »
REST API design. • Good understanding of concepts like virtualization, networking, wide area networks. • Good Linux knowledge • Good understanding of networking, security, and protocols (HTTPS, SSH, TLS etc.) • Good understanding of configuration management, container orchestration (Docker, Kubernetes) and concepts of infrastructure as code. • Strong skills in code management, especially with Git more »
architecture. Networking concepts such as routing, switching, and transport layer protocols i.e., TCP/IP suite. Common application layer protocols, HTTP/S, DNS, SSH, etc. Active Directory, Microsoft Entra and related authentication/authorization technologies. Modern attack strategies that use social engineering and technological abuse primitives. Utilizing and customizing more »
Understanding of OSI or TCP/IP models Understanding of protocols like TCP/UDP/IP/DNS/DHCP/NAT/SSH Apply now to Callum or call for a confidential discussion. We have a full job spec and benefits package for your review . We are more »
with at least 7+ years of experience Experienced at Git management and deploying solutions through CD style deployments, alongside more legacy approaches such as SSH and SFTP Confident in client engagement, with the ability to communicate complex technical concepts in an understandable manner Have a deep understanding of how to more »
London, England, United Kingdom Hybrid / WFH Options
Sky
ADCS monitoring, and related tasks Familiarity with Data-in-motion and Data-at-rest Encryption techniques Expertise in PKI machine identity technologies such as SSH, SSL, TLS Experience managing Key Management Systems (KMS) for cryptographic key security. Hands on experience with: PKI and Certificate deployment and automation. Thales HSMs Team more »
London, England, United Kingdom Hybrid / WFH Options
Sky
ACME protocol, use of RESTful APIs. Experience with Certificate Authority Administration, ADCS monitoring, and related tasks Understanding in PKI machine identity technologies such as SSH, SSL, TLS Experience supporting Key Management Systems (KMS) for cryptographic key security. Experience with: PKI and Certificate deployment and automation. Thales HSMs Good problem-solver more »
server hardware and operating systems, with experience in Linux and Windows administration. Configure switches and routers, manage protocols like LACP, NTP, Iptables/firewall, SSH, NAT, VPN, and work with virtual machines on VMware or Hypervisor. Requirements: Clean driving license. 5-year employment/gap history for obtaining an airside more »
Scripting capabilities (SH/Bash/Python/Perl). • Configuration of common services (DNS/Apache/NGINX/Postfix/Squid/SSH/iptables). • Understanding of clustering services, enabling High Availability failover. • Experience with enterprise hardware and management tools. • Experience working within a strict Change Management more »
science organisation or with Science R&D Knowledge of TCP/IP networking, HTTP/REST, APIs and other data transfer mechanisms such as SSH, SFTP, VPN links Knowledge and experience with MS Azure solution architectures (esp. IaaS, PaaS and SaaS based solutions) Experience in MS Azure storage, apps, Azure more »
network have a good working and implementing knowledge of the following protocols and technologies – IPSec, VPN, TCP/IP, SSL, TLS, IDS/IPS, SSH, SNMP, NTP of security tools and technologies, including firewalls, IDS/IPS, VPN, and SIEM and scripting skills required (Python, Powershell scripting or Shell scripts more »
and execute robust security strategies. The ideal candidate will possess a deep understanding of cloud platforms and be well-versed in security protocols, including SSH and HTTP. Complementary skills that will enhance your role include programming, containerisation, and threat modelling, enabling you to provide a holistic approach to cybersecurity challenges. more »
attractive organisation to get into at early stages of your career. Skills required for this Linux Systems Administrator role: Experience administering Linux systems over SSH Strong diagnostic and debugging skills Knowledge of networking and internet technologies including IPv4, IPv6, TCP, UDP, DNS, and DHCP Experience configuring and maintaining networking infrastructure more »
Suite, Nmap, Nessus, Qualys, Metasploit, and others. Strong knowledge of the OWASP Testing Methodology. Solid understanding of security protocols such as SSL/TLS, SSH, and HTTP. Knowledge of cloud security platforms like AWS, Azure, and Google Cloud. Understanding of networking protocols and the OSI Model. Mandatory Soft Skills and more »
Greater London, Grange, United Kingdom Hybrid / WFH Options
Remarkable Jobs
tools like Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit, etc. Strong knowledge of the OWASP Testing Methodology Understanding of security protocols (SSL/TLS, SSH, HTTP) Knowledge of cloud security platforms (AWS, Azure, Google Cloud) Understanding of networking protocols and the OSI Model Security Testing Consultant (Pen Tester) Mandatory Soft more »