KG175, SafeNet IP and SONET encryptors. Basic Linux Administration or command line interface (CLI) and scripting skills. General knowledge RADIUS, SNMP, NTP, TLS and PKI protocols. Proficiency in at least one of the following tools: WWOLS, MSS, OneNet, SMC, SILVX, CTC, Junos Space, SolarWinds. Knowledge of configuring, deploying, and supporting more »
Dartford, England, United Kingdom Hybrid / WFH Options
Europa Worldwide Group
policies to ensure maximum system reliability & security. Monitor network traffic to optimise performance and efficiency. Implement and administer remote access, and VPN Solutions. Manage PKI distribution and issue/revoke certificates. Give direction and recommendation on Network & Security Enhancements/Features. Develop technical specifications, runbooks, design documents and roll-out more »
Fratton, England, United Kingdom Hybrid / WFH Options
IO Associates
supporting NATO programmes Operating Systems: Windows Server 2012/16, Windows 10, VMWare, Solaris, HyperV, Powershell. Windows Policies and Firewall settings, RedHat/Oracle, PKI, SQL, PostgreSQL Reviewing documentation for Installation and integration of software packages. Experience of FAS Applications support: NIRIS - ICC - JChat - LOGFAS - JOCWatch - TOPFAS Strong PowerShell and more »
Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
IO Associates
supporting NATO programmes Operating Systems: Windows Server 2012/16, Windows 10, VMWare, Solaris, HyperV, Powershell. Windows Policies and Firewall settings, RedHat/Oracle, PKI, SQL, PostgreSQL Reviewing documentation for Installation and integration of software packages. Experience of FAS Applications support: NIRIS - ICC - JChat - LOGFAS - JOCWatch - TOPFAS Strong PowerShell and more »
s such as Malware, Ransomware, Data exfiltration, DDoS, etc Background with Threat Modeling or Secure Design Consultation Background w ith Cryptography/IAM Experience: PKI, Encryption, SAML, MFA, SSO, C i pher Suites Background in Red team (Attack Vectors/Surfaces) a plus Experience with Pen Test Tools a plus more »
following the green book five case model would be a plus and certifications such as: CCP, CISMP, CISSP, Identity management and federation, publickeyinfrastructure, SIEM, cryptography, firewalls, vulnerability scanning A varied background, diverse programme exposure and a security based master's degree or alternatively STEM degree more »
Specific Skills Essential Advanced knowledge of security technologies including firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identity and access management) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and associated protocols, remote access more »
support escalation point for both corporate and industrial control Active Directories Contribute to Active Directory capacity planning, metrics, reporting, domain controller placement. Contribute to PKI capacity planning, reporting, certificate template usage, design. Contribute to Cybersecurity Operations roadmap. Cybersecurity Operations and Directory services advocate for the region Primary resource for CIP more »
Active Directory Administration • VOIP hardware • Enterprise Backup Solutions • Windows RDS (Remote Desktop Solution) • Firewall technologies. • Linux OS • PublicKeyInfrastructure (PKI) • Switch Technologies • Hyperconverged Technologies This role will be home based, with travel to customer sites, and offices in Reading and Stoke on Trent. Must be able more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes more »
Linux operating systems: Oracle Linux (Red Hat, CentOS) Systematic problem-solving approach, strong communication skills, a sense of ownership and drive Solid understanding of PKI, mTLS, SSL, SSH Experience with Agile Development (Scrum or Kanban) Experience with production operations and good practices for putting quality code in production and troubleshoot more »
Greater London, England, United Kingdom Hybrid / WFH Options
Made Tech
cloud-based tooling Up-to-date understanding of network security (e.g. OSI, TCP/IP), web application security (e.g. OWASP) and cryptographic controls (e.g. PKI, TLS) Up-to-date understanding of identity management and authentication/authorisation products and patterns Evidence of self-development – we value keen learners Drive to more »
interconnect. Familiar in multi-factor authentication platforms and solutions, and Identity Management such as OpenID, LDAP, and Kerberos. Security implementations using multi-factor authentication, PKI, or Kerberos and Unix OS hardening to DoD STIG standards. Experience programming or troubleshooting Python code Experience with supporting Apache Web Server Experience with Zabbix more »
general networking knowledge to troubleshoot connectivity issues, including firewall policies, and have familiarity with network tracing tools like Wireshark. Provides support for the internal PKIinfrastructure, certificate issuance, template, as well as assists with the public certificate authority and application teams certificate requirements. Supports audit and compliance requirements … platform technologies. Knowledge supporting IT enterprise directory services technologies and standards including software & hardware life cycle, system and security configuration policies, hardening, AD, DNS, PKI, DHCP, HA, DR, etc. Experience and knowledge of cloud computing technologies, business drivers, and emerging computing trends for driving long-term cloud adoption with appropriate more »
experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced MSP is more »
the Yocto build system Full software lifecycle including design, design documentation, source control, unit test, integration test, user documentation Desired: Knowledge of PublicKeyInfrastructure systems Knowledge of IPSEC protocol Experience of board functional test design and development Experience of RF calibration procedures Experience using JTAG debuggers more »
Management Framework security controls. Performs Staff Assistance Visits to subordinate and Tenant unit ISSO programs. Acts as Site Trusted Agent for SCI PublicKeyInfrastructure issue and control. Writes, staffs, and submits Security Impact Analysis reports for HHQ approval. Manages Site REMWAR Program for the use of more »
VLAN, VxLAN, SD-WAN. Enterprise wireless technologies, standards and RF operation. Knowledge of modern structured cabling standards and their implementation. Understanding of encryption and PKI principles. Practical understanding of network application protocols such as DHCP, DNS, SNMP, SIP and others. Responsibilities: Manage and implement IT infrastructure installation and network more »
CD tools such as Artifactory, Jenkins, and GIT Cloud native applications, including Terraform experience Technologies used to support microservices Encryption technologies (SSL/TLS, PKIInfrastructure management) Security controls as applied to software technologies Bachelor's degree in a related area 10+ years of related experience 10 years experience more »
CD tools such as Artifactory, Jenkins, and GIT Cloud native applications, including Terraform experience Technologies used to support microservices Encryption technologies (SSL/TLS, PKIInfrastructure management) Security controls as applied to software technologies Bachelor's degree in a related area 10+ years of related experience 10 years experience more »
Live System. You will be sponsored through DV+ for this role, but active DV is required to start. Essential skills 3rd Line Support experience PKI Understanding of Networks DV clearance If you are interested in discussing this Wintel Engineer role further, please send your updated CV to (url removed) CBSbutler more »
Live System. You will be sponsored through DV+ for this role, but active DV is required to start. Essential skills 3rd Line Support experience PKI Understanding of Networks DV clearance If you are interested in discussing this Wintel Engineer role further, please send your updated CV to (url removed) CBSbutler more »
an understanding of traditional processes and procedures and how they may impact a digital transformation. with Identity and Access Management, OAUTH2, JWT, SSO, SAML, PKI, Certificate management highly available internet banking application. experience essential. architecture skills required. Ability to produce Solution design documents with UML diagrams. of client side applications more »