Houston, Texas, United States Hybrid / WFH Options
Kavaliro
with protocols such as SAML, OAuth, OIDC, FIDO, PKI, JWT, LDAP, and Kerberos. Strong knowledge of common network protocols, including TCP/IP, HTTP/HTTPS, DNS, SMTP, SNMP, SSH, and VPN technologies. Expertise in encryption technologies (e.g., TLS, AES, RSA) and key management practices (e.g., KMS, HSM, PKI). Familiarity with firewalls, IDS/IPS, WAF, VPN, Routers, Switches More ❯
CI poly Desired • Experience in building processes for deploying to a Kubernetes based environment using Gitlab and Helm • Understanding of access management and security groups (i.e. IAM, S3 bucket, SSH, VPN, etc.) • Ability to write and use unit and functional testing More ❯
Directory, general networking, Email (MS Exchange, Spam filters) and security (Firewalls, IDS/IPS, encryption). Ability to use open-source software systems to improve engineering processes. Experience with SSH Server/Client and Key-based authentication. Demonstrates solid Networking skills. Experience with DevOps/software tool administration (e.g., Jenkins, Puppet) is a plus. Broad knowledge of engineering tools (compilers More ❯
via Ansible or other automation platforms. Thorough understanding and/or experience with Azure Cloud Services Knowledge of basic networking and network protocols (e.g. TCP/IP, routing, firewalls, SSH, VPNs) Hands-on experience with reviewing system logs and events to resolve issues. Develop and provide solutions to complex technical issues and problems that impact dev, test and production computing More ❯
Shell scripting (Bash, KornShell, etc.) Infrastructure as Code (IaC): Ansible, Terraform, Puppet, Chef Process and job control (cron, at, systemd timers) Networking fundamentals (TCP/IP, DNS, DHCP, NFS, SSH, FTP) Filesystem management (LVM, ext4, XFS, ZFS) Performance tuning and monitoring (top, vmstat, iostat, sar, netstat) Exposure to automation software such as Ansible/Puppet Knowledge of scripting with Bash More ❯
Linux & Windows 10 development experience GIT, GitHub and collaborative software development Nice-to-Haves: AWS (S3, SageMaker, Lambdas) MLOps, CI/CD processes PyTorch-Ignite TypeScript & Semantic UI React SSH and secure deployment workflows Bonus Skills: JIRA & Confluence ClearML What We Value At Hawk-Eye, our culture is built on openness , collaboration , and technical excellence . Here's what we More ❯
experience • In depth knowledge of CND policies, procedures and regulations • In depth knowledge of TCP/IP protocols • In depth knowledge of standard protocols - ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc. • In depth knowledge and experience of Wifi networking • In depth knowledge and experience of network topologies - DMZ's, WAN's, etc. • Substantial knowledge of Splunk (or More ❯
CI poly Desired •Experience in building processes for deploying to a Kubernetes based environment using Gitlab and Helm •Understanding of access management and security groups (i.e. IAM, S3 bucket, SSH, VPN, etc.) •Ability to write and use unit and functional testing More ❯
Saint Petersburg, Florida, United States Hybrid / WFH Options
Pitisci & Associates
Experience managing Zero Trust platform (secure access service edge, browser proxy, etc) Network Configuration - Experience with iptables/nftables, WireGuard/OpenVPN, and DNS - Ability to configure and audit SSH, TLS, and firewall rules for least privilege access Zero Trust Model - Understand never trust, always verify and continuous authentication models - Implement device posture checks Identity and Access skills - Integrate with More ❯
as an extension of Tier 3 when resolving complex issues on Endpoint Devices (workstations, mobile devices) Implement and maintain PKI Infrastructures, server certificates, Certificate Authority, Secure DNS (DNS SEC), SSH, PGP, and AWS CLI Access keys. Perform operating system and VMware vSphere and Microsoft HyperV administration, account management, and provisioning activity. Install and setup Enterprise Database systems i.e. Oracle, Microsoft More ❯
Lexington, Massachusetts, United States Hybrid / WFH Options
Encode
access to on-site test hardware. Qualifications & Required Skills: - Active Secret Clearance (or higher). - Strong understanding of networking applications and protocols, including TCP/IP, DNS, NTP, DHCP, SSH, FTP, and HTTP/S (5 years of experience). - Proficiency in software documentation (5 years). - Extensive experience in C/C++ programming (15 years). - Development experience on More ❯
IAT level II, Security +ce. Familiarity with all related aspects of cybersecurity operations and security architecture Experience and knowledge of network and application protocols like TCP, UDP, ICMP, HTTP, SSH, etc Familiarity with basic security concepts such as firewalls, antivirus software, and network security. Experience remediating cyber vulnerabilities like misconfigurations, Unpatched software, weak APIS, etc Ability to identify common exploitation More ❯
system utilization Use shell scripting to automate system maintenance tasks Configuring system logging, including remote logging Configure a system to provide networking services, including HTTP/HTTPS, DNS, SMTP, SSH and NTP Qualifications Minimum five to eight years' (5-8) experience in system administration of Linux-based servers and Linux-based workstations High School Diploma required; Bachelros degree preferred Ideal More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
respond to emergencies; and attend meetings and make formal presentations as necessary. Moderate understanding of computer and networking technologies (OS, TCP/IP, Routing, Subnets, Firewalls) Common networking protocols (SSH, SMB, SMTP, FTP/SFTP, DNS) Preferred Excellent technical skills and knowledge in the areas of IT infrastructure components such as server, storage, network, database, virtualization, operating systems and cloud More ❯
implementation. • Must have experience in working with two or more of the following vender network technologies: Cisco, Juniper, Palo Alto, Dell, or AppGate. • Experience with the following protocols: SFTP, SSH, SCP, SNMP, NTP. • Must be able to work as part of a team to lead troubleshooting and resolve complex network issues. • Excellent written and verbal communication skills. PREFERRED QUALIFICATIONS: • Certified More ❯
in one or more of the following enterprise network management tools such as Palo Alto Panorama, Cisco Prime, Cisco DNA, or Junos Space. Experience with the following protocols: SFTP, SSH, SCP, SNMP, NTP. Must be able to work as part of a team to lead troubleshooting and resolve complex network issues. Excellent written and verbal communication skills. Eligibility requirements apply More ❯
to maintain other Windows core services. - Comprehension of NTFS file share permissions. - Fundamental understanding of authentication mechanisms such as Kerberos and LDAP. - Basic networking experience (TCP/IP, routing, SSH, OpenVPN) - Must be an independent problem solver with troubleshooting, decision making and analytical skills. Employee Value Proposition (EVP) The USACE RITS program was awarded to SAIC with 1 base year More ❯
be extra awesome if you had:Experience and/or knowledge of Mobile Ad-hoc Networked (MANET) radio, C4I, and military communications. Experience using networking troubleshooting tools: Wireshark, ICMP, SSH Experience programming VB.NET, Python, C. Experience with LINUX/UNIX command line interface. Experience with shell scripting or more advanced programming skills. Advanced experience with Microsoft Office Application (Word, Excel More ❯
network performance and test network capabilities. Experience on Cisco data center deployment to include Cisco Nexus Familiar with network protocols including TCP/IP, UDP, DHCP, TFTP, SCP/SSH Documentation and compliance: Creating and maintaining detailed network documentation and adhering to yearly Security Technical Implementation Guide (STIG) policies. Hardware and software upgrades: Implementing new network equipment and software upgrades. More ❯
of SPIFFE standards and certificate/token-based authentication using tools such as Teleport, SPIRE or Consul Demonstrated expertise in designing and deploying IAM/PAM solutions that leverage SSH CA, using tools like Teleport to implement secure, automated access controls Proven experience in deploying secure Kubernetes clusters, including worker node attestation, using TPM or secure boot, and container signing More ❯
environment (CentOS, Ubuntu, Fedora, Solaris, Kali). • Experience configuring small business or home network (SOHO) devices (e.g., wifi routers, switches, etc.). • Comfortable working in a command-line environment (SSH, bash, telnet, etc.) • Experience monitoring network activity, to include performing network packet inspection, traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of information security practices. • Experience using virtual More ❯