etc.) Familiarity with MITRE ATT&CK and threat detection methodologies Strong analytical mindset with log, endpoint, and network analysis skills Understanding of network protocols (TCP/IP, DNS, HTTP, SMTP) Awareness of enterprise security architecture: firewalls, AV, VPNs, IDS/IPS Eligible for DV Clearance – British citizens who have resided in the UK for the past 10 years This SOC More ❯
Point-of-Rental is an Elavon Payments Partner & Registered MSP/ISO of Elavon, inc
Terminal Services, and other advanced Windows features. Advanced knowledge of Virtual Machine hosting and management. Proficiency in IIS, Port Forwarding, VPN, RDS, and Web API. Experience with POP/SMTP Email setup with providers like Google Gmail, Microsoft O365, etc. Advanced knowledge of Microsoft SQL Server deployment methods and TSQL programming for automation. Familiarity with Windows More ❯
web applications, databases, firewalls, VPNs, and AntiVirus products. Expertise in log data analysis and intrusion detection systems. Strong networking knowledge including TCP/IP, WANs, LANs, and protocols like SMTP, HTTP, FTP, POP, LDAP. If you're interested but unsure if your skills match, please apply-we'd love to hear from you! Clearance required: Eligible for DV clearance Referral More ❯
II certification. • Linux+, RHCSA, LPIC or equivalent Linux computing certificate is required. • Demonstrated knowledge of Linux: RedHat, CentOS, Debian, etc. • Solid knowledge of protocols such as DNS, HTTP, LDAP, SMTP and SNMP • Experience acquiring and installing software from different sources (ie: vendor tar files, repos) • Identity and Device Management (ie: Active Directory, Kerberos, PAM, SSSD) • Experience using Windows operating systems More ❯
Active Directory is also required, and a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.). Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment. Experience with More ❯
Active Directory is also required, and a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.) Experience with the identification and implementation of counter-measures or mitigating controls for deployment and implementation in the enterprise network environment Experience with one More ❯
II certification. Linux+, RHCSA, LPIC or equivalent Linux computing certificate is required. Demonstrated knowledge of Linux: RedHat, CentOS, Debian, etc. Solid knowledge of protocols such as DNS, HTTP, LDAP, SMTP and SNMP Experience acquiring and installing software from different sources (ie: vendor tar files, repos) Identity and Device Management (ie: Active Directory, Kerberos, PAM, SSSD) Experience using Windows operating systems More ❯
Tree, Port Security, VTP,Ether channels, VLANs). Experience configuring and troubleshooting Cisco ASR routers (including HSRP, OSPF, BGP, route-map and Cisco ASA firewalls. Experience troubleshooting various DNS, SMTP, IP routing, latency, and connectivity issues; Implement TCP/IP & related services-DHCP/DNS. Install/Upgrade Cisco Switches and Firewalls (ASA) IOS using TFTP. Maintain all LAN/ More ❯
to other IT team members, serving as a subject matter expert in specific IT areas. Required Skills: Working knowledge of end-user computing & networking troubleshooting (TCP/IP, DNS, SMTP). Experience with IT infrastructure, systems administration, network management, and end-user support. Experience with Service Management or Ticketing Tools like Jira Service Management, ServiceNow. Experience with IDP platforms such More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Sportserve
serving as a subject matter expert in specific areas of IT systems and services. Required skills: Working knowledge of end-user computing and networking troubleshooting (TCP/IP, DNS, SMTP). Experience with IT infrastructure, systems administration, network management, and end-user support services. Experience with Service Management or Ticketing Tools like Jira Service Management, ServiceNow. Experience with IDP platforms More ❯
a timely manner Writing effective procedural guidance Technical Knowledge Familiarity with MS Intune or similar tool Willingness to learn MECM A clear understanding of TCP/IP, HTTP, HTTPS, SMTP, SNMP, DNS, DHCP and knowledge of the 802.11 wireless internet standards Proficient in Jamf Pro, macOS, Active Directory, MySQL Certifications relating to Apple Mac Technician, Jamf Technician strongly encouraged Remedy More ❯
Proven team leadership or people management experience. Expertise in Microsoft Sentinel and Splunk. Familiarity with the MITRE ATT&CK framework. Sound understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. Desirable skills: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Relevant SOC certifications More ❯
Redis, Varnish Logstash & Elasticsearch Networking (switching, routing, firewalls, IDS/IPS, VPN, load balancing, DNS, Cisco, F5, Akamai) Multi cloud setup - AWS, Digital Ocean, Rackspace, Linode etc DNS, NTP, SMTP, Jenkins A solid background in Linux System Administration Functions and responsibilities This is a dynamic and varied role, which includes things like: Build, deployment and maintenance of new and existing More ❯
Redis, Varnish • Logstash & Elasticsearch • Networking (switching, routing, firewalls, IDS/IPS, VPN, load balancing, DNS, Cisco, F5, Akamai) • Multi cloud setup - AWS, Digital Ocean, Rackspace, Linode etc • DNS, NTP, SMTP, Jenkins • A solid background in Linux System Administration Functions and responsibilities This is a dynamic and varied role, which includes things like: • Build, deployment and maintenance of new and existing More ❯
relevant experience in network investigations - Knowledge of CND policies, procedures and regulations - Knowledge of TCP/IP protocols - Strong understanding of standard protocols - ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc. - Knowledge and experience of Wifi networking - Knowledge and experience with network topologies - DMZ's, WAN's, etc. - Experience with Splunk (or other SIEM's) - Ability to find More ❯
as Jupyter, Excel, Visio, Sharepoint, and Confluence. Demonstrated experience in LINUX environments, networks, applications, and security operations. Demonstrated experience with networking and internet protocols, including TCP/IP, DNS, SMTP, HTTP and distributed networks. Demonstrated experience with web services, API, REST and RPC. Demonstrated experience with Artificial Intelligence and Machine Learning frameworks and platform services.Location: Chantilly, VA This role is More ❯
In depth knowledge of CND policies, procedures and regulations - In depth knowledge of TCP/IP protocols - In depth knowledge of standard protocols - ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc. - In depth knowledge and experience of Wifi networking - In depth knowledge and experience of network topologies - DMZ's, WAN's, etc. - Substantial knowledge of Splunk (or other More ❯
Experience, Linux/Windows server environment. PHP, Perl, MySQL skills. Network Knowledge, TCP/IP, Data Transmission, L2/L3 VPN, Multi-Layer Networking. ISP related server application. I.E. SMTP, DNS, HTTP, Radius, SNMP Monitoring & Traffic Management. Experience in monitoring applications such as icinga, nagios, solarwinds and others (opmanager) Facility Management, Network Cabling, Equipment Installation. Knowledge and proficiency in Excel More ❯
/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE More ❯
/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE More ❯
/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with MITRE More ❯
SharePoint Online technologies, Microsoft Azure and Entra technologies,configurationand administration, especially for Microsoft Entra ID, Workload ID Management, Permission Management, Working knowledge of TCP/IP, DNS, Active Directory, SMTP, and DHCP technologies Working knowledge of Data Backup concepts, migration topics, adoption and governance strategies Understanding of Microsoft SharePoint architecture, components, and configuration, including the differences between SharePoint versions, hybrid More ❯
Spanning Tree, Port Security, VTP,Ether channels, VLANs); Configure and troubleshoot Cisco ASR routers (including HSRP, OSPF, BGP, route-map; Configure/Troubleshoot Cisco ASA firewalls; Troubleshoot various DNS, SMTP, IP routing, latency, and connectivity issues; Implement TCP/IP & related services-DHCP/DNS; Install/Upgrade Cisco Switches and Firewalls (ASA) IOS using TFTP; Maintain all LAN/ More ❯
languages are a plus. Exposure to at least two of the following skill sets are recommended Enterprise email solutions such as Exchange, O365, G-Suite, Lotus Dominoorworking knowledge of SMTP IT security related areas such as Vulnerability and Risk Management, Security Operations or Incident Response Data Loss Prevention (DLP), compliance and data privacy Cloud security and shadow IT monitoring Cloud More ❯