i.e. SLI/SLO) and capacity planning. You are a competent Linux & Windows systems administrator (for multiple distributions), including storage management (e.g. LVM, RAID) and security best-practices e.g. SSH, SSL/TLS, HMAC, IPS/IDS. Our benefits To help you stay energized, engaged and inspired, we offer a wide range of employee benefits including: retirement investment and tools More ❯
london, south east england, united kingdom Hybrid / WFH Options
BlackRock, Inc
i.e. SLI/SLO) and capacity planning. You are a competent Linux & Windows systems administrator (for multiple distributions), including storage management (e.g. LVM, RAID) and security best-practices e.g. SSH, SSL/TLS, HMAC, IPS/IDS. Our benefits To help you stay energized, engaged and inspired, we offer a wide range of employee benefits including: retirement investment and tools More ❯
engagements. RFP Responses: Assist in responding to RFIs and RFPs, ensuring alignment with customer requirements and CyberArk capabilities. Qualifications Knowledge of cryptographic security technologies such as SSL/TLS, SSH, PKI, and HSMs . Strong understanding of enterprise IT environments, including Windows Server, Linux/Unix, Active Directory/LDAP, load balancers, web servers, virtualization, and endpoint security . Familiarity More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). More ❯
with log aggregation tools used for audit log purposes from all sources, including Linux and Windows systems, Networking equipment, and applications Experience with public key infrastructure (PKI), secureshell (ssh) configuration and troubleshooting, sssd, httpd Experience with Amazon Web Services or other cloud technologies Experience deploying SAN storage preferably from IBM (GPFS) 2 , Experience bootstrapping HPE servers, configuring storage, iLO More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
STAR 2281 TBD - No LCAT Specified Position Requires ACTIVE TS/SCI Clearance with Polygraph No Level Required Chantilly The maximum number of FTEs is 0.5 (either .5 for a 1-year period or 1.0 for a 6-month period More ❯
Linux-based systems (primarily Ubuntu, CentOS, RHEL, etc.) Troubleshoot and resolve hardware, software, and networking issues in physical and virtual environments Manage user access, permissions, and authentication (e.g., LDAP, SSH, Sudo policies) Monitor system performance and health; perform regular updates, patches, and backups Assist in deployment, configuration, and maintenance of servers and critical applications Document processes, procedures, and configurations in More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
anomalies to discover new threat actors and taking operational actions to achieve mission requirements. You should be comfortable working in a Linux (CentOS/Debian/Ubuntu) environment, using SSH and being able to conduct regular Linux system administration, configuration and maintenance tasks. You will be able to help improve existing Standard Operating Procedures (SOPs) and documentation. You should have More ❯
Role Description : As an Operational Security Officer for IBM Mainframe Z Series, your primary role is to maintain and improve the overall security posture of the organization's IT infrastructure that is based on IBM Mainframe Z Series technology. You More ❯
study 5 years of previous working experience as a Linux administrator Competent in Shell, Perl, and/or Python scripting Solid knowledge of protocols such as DNS, HTTP, LDAP, SSH, SNMP, etc. Familiarity with VMWare Security+ certification Familiarity with DevOps tooling (e.g. Jenkins, Salt, Gitlab) Cybersecurity expertise, including adversarial awareness and common IT Security requirements Active TS/SCI clearance More ❯
as an extension of Tier 3 when resolving complex issues on Endpoint Devices (workstations, mobile devices) Implement and maintain PKI Infrastructures, server certificates, Certificate Authority, Secure DNS (DNS SEC), SSH, PGP, and AWS CLI Access keys. Perform operating system and VMware vSphere and Microsoft HyperV administration, account management, and provisioning activity. Install and setup Enterprise Database systems i.e. Oracle, Microsoft More ❯
standard requirements and apply them effectively to products. Experience setting up networks and familiarity with subnetting and routing concepts. Knowledge of common security-related protocols and their design (e.g., SSH, IPsec, TLS). Experience building testing environments, performing testing, and reporting results (technical writing). Strong troubleshooting and problem-solving skills. Strong multitasking and time management abilities. Typically requires a More ❯
standard requirements and apply them effectively to products. Experience setting up networks and familiarity with subnetting and routing concepts. Knowledge of common security-related protocols and their design (e.g., SSH, IPsec, TLS). Experience building testing environments, performing testing, and reporting results (technical writing). Strong troubleshooting and problem-solving skills. Strong multitasking and time management abilities. Typically requires a More ❯
a full-time position located at Hanscom AFB, Bedford, MA. Responsibilities Duties include, but not limited to: Possess a deep understanding of Internet based technologies (DNS, Security, IP Routing, SSH, SFTP, HTTP/HTTPS, etc.). Deep understanding of IP network technologies and software tools for performance monitoring and troubleshooting. (Especially layers 2 and 3). Write and maintain custom More ❯
systems such as LDAP, SSO, SAML, Azure AD/Entra ID and MS Active Directory/ADFS Familiarity with TCP/IP, SSL, IPSec, HTTP/HTTPS, DNS, SMTP, SSH protocols Versatile with using various operating systems including Windows, Mac, and GNU/Ubuntu Hands-on knowledge with system and network troubleshooting using tools such as ps, top, strace, Wireshark More ❯
DNS, SMTP, IP routing, latency, and connectivity issues Implement TCP/IP & related services-DHCP/DNS Install/Upgrade Cisco Switches and Firewalls (ASA) IOS using TFTP Implement SSH/RADIUS authentication on Cisco Hardware Troubleshoot network problems using Protocol Analyzers Maintain all LAN/WAN connectivity Document network problems and resolution for future reference Oversee software and network More ❯
Strong foundation in network security and common attack methodologies Exposure to user behaviour analytical tools is preferable Good understanding of common protocols such as HTTP, SMTP, SSL/TLS, SSH, DNS Must demonstrate strong analytical and problem-solving skills to enable effective security incident and problem resolution Knowledge of latest threat trends and security landscape Pre-requisites: Excellent analytical skills More ❯