engagements. RFP Responses: Assist in responding to RFIs and RFPs, ensuring alignment with customer requirements and CyberArk capabilities. Qualifications Knowledge of cryptographic security technologies such as SSL/TLS, SSH, PKI, and HSMs . Strong understanding of enterprise IT environments, including Windows Server, Linux/Unix, Active Directory/LDAP, load balancers, web servers, virtualization, and endpoint security . Familiarity More ❯
i.e. SLI/SLO) and capacity planning. You are a competent Linux & Windows systems administrator (for multiple distributions), including storage management (e.g. LVM, RAID) and security best-practices e.g. SSH, SSL/TLS, HMAC, IPS/IDS. Our benefits To help you stay energized, engaged and inspired, we offer a wide range of employee benefits including: retirement investment and tools More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). More ❯
with log aggregation tools used for audit log purposes from all sources, including Linux and Windows systems, Networking equipment, and applications Experience with public key infrastructure (PKI), secureshell (ssh) configuration and troubleshooting, sssd, httpd Experience with Amazon Web Services or other cloud technologies Experience deploying SAN storage preferably from IBM (GPFS) 2 , Experience bootstrapping HPE servers, configuring storage, iLO More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
via Ansible or other automation platforms. Thorough understanding and/or experience with Azure Cloud Services Knowledge of basic networking and network protocols (e.g. TCP/IP, routing, firewalls, SSH, VPNs) Hands-on experience with reviewing system logs and events to resolve issues. Develop and provide solutions to complex technical issues and problems that impact dev, test and production computing More ❯
anomalies to discover new threat actors and taking operational actions to achieve mission requirements. You should be comfortable working in a Linux (CentOS/Debian/Ubuntu) environment, using SSH and being able to conduct regular Linux system administration, configuration and maintenance tasks. You will be able to help improve existing Standard Operating Procedures (SOPs) and documentation. You should have More ❯
STAR 2281 TBD - No LCAT Specified Position Requires ACTIVE TS/SCI Clearance with Polygraph No Level Required Chantilly The maximum number of FTEs is 0.5 (either .5 for a 1-year period or 1.0 for a 6-month period More ❯
Role Description : As an Operational Security Officer for IBM Mainframe Z Series, your primary role is to maintain and improve the overall security posture of the organization's IT infrastructure that is based on IBM Mainframe Z Series technology. You More ❯
CI poly Desired • Experience in building processes for deploying to a Kubernetes based environment using Gitlab and Helm • Understanding of access management and security groups (i.e. IAM, S3 bucket, SSH, VPN, etc.) • Ability to write and use unit and functional testing More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
standard requirements and apply them effectively to products. Experience setting up networks and familiarity with subnetting and routing concepts. Knowledge of common security-related protocols and their design (e.g., SSH, IPsec, TLS). Experience building testing environments, performing testing, and reporting results (technical writing). Strong troubleshooting and problem-solving skills. Strong multitasking and time management abilities. Typically requires a More ❯
standard requirements and apply them effectively to products. Experience setting up networks and familiarity with subnetting and routing concepts. Knowledge of common security-related protocols and their design (e.g., SSH, IPsec, TLS). Experience building testing environments, performing testing, and reporting results (technical writing). Strong troubleshooting and problem-solving skills. Strong multitasking and time management abilities. Typically requires a More ❯
discipline (In lieu of degree must have 8+ years of hands-on relevant technical experience) - Must understand communication protocols (TCP/IP, etc) and Application layer protocols (http(s), ssh, etc.) - Experience analyzing network protocols, including capturing and interpreting traffic from open/documented and proprietary, to decode and characterize communications between systems and identify potential issues, vulnerabilities - Experience performing More ❯
implementation. • Must have experience in working with two or more of the following vender network technologies: Cisco, Juniper, Palo Alto, Dell, or AppGate. • Experience with the following protocols: SFTP, SSH, SCP, SNMP, NTP. • Must be able to work as part of a team to lead troubleshooting and resolve complex network issues. • Excellent written and verbal communication skills. PREFERRED QUALIFICATIONS: • Certified More ❯
implementation. • Must have experience in working with two or more of the following vender network technologies: Cisco, Juniper, Palo Alto, Dell, or AppGate. • Experience with the following protocols: SFTP, SSH, SCP, SNMP, NTP. • Must be able to work as part of a team to lead troubleshooting and resolve complex network issues. • Excellent written and verbal communication skills. PREFERRED QUALIFICATIONS: • Certified More ❯
in one or more of the following enterprise network management tools such as Palo Alto Panorama, Cisco Prime, Cisco DNA, or Junos Space. • Experience with the following protocols: SFTP, SSH, SCP, SNMP, NTP. • Must be able to work as part of a team to lead troubleshooting and resolve complex network issues. • Excellent written and verbal communication skills. • Certified Cisco Network More ❯
study 5 years of previous working experience as a Linux administrator Competent in Shell, Perl, and/or Python scripting Solid knowledge of protocols such as DNS, HTTP, LDAP, SSH, SNMP, etc. Familiarity with VMWare Security+ certification Familiarity with DevOps tooling (e.g. Jenkins, Salt, Gitlab) Cybersecurity expertise, including adversarial awareness and common IT Security requirements Active TS/SCI clearance More ❯
as an extension of Tier 3 when resolving complex issues on Endpoint Devices (workstations, mobile devices) Implement and maintain PKI Infrastructures, server certificates, Certificate Authority, Secure DNS (DNS SEC), SSH, PGP, and AWS CLI Access keys. Perform operating system and VMware vSphere and Microsoft HyperV administration, account management, and provisioning activity. Install and setup Enterprise Database systems i.e. Oracle, Microsoft More ❯