least 2+ years of experience in penetration testing. Demonstrable skills in the Penetration Testing/Ethical Hacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such More ❯
Must be able to obtain and maintain a TS/SCI security clearance. DESIRED SKILLS • PE license preferred • Commissioning experience • Familiar with configuration, maintenance, troubleshooting, and security practices for Windows and Unix servers with Linux. • Bachelor's or master's Degree Abilities: Exposure to computer screens for an extended period of time. Sitting for extended periods of time. Reach More ❯
written and verbal communication skills. An ability to quickly grasp technical concepts and systems and communicate them in a clear and concise manner for the end-user. Knowledge of Windows enterprise business environment. Knowledge of or exposure to IT server hardware/software Knowledge of or exposure to a data centre environment Strong analytical skills coupled with the ability More ❯
gathering requirements and developing SharePoint solutions for business users; Experience testing and debugging existing code, updating SharePoint apps and workflows to work with new versions of SharePoint; Experience with Windows Server OS, IIS, AD, #.NET, Word Press, Linux; Experience with SharePoint Records Management system (Gimmal Records Lion) SharePoint Feature/Apps installation and development, migration, integration, testing and troubleshooting More ❯
Experience in Maximo configuration, administration, and support, including application installation and integration. Knowledge of data feeds, automation scripts, data loading (MIF), reporting, security, and release management. Good understanding of Windows operating systems (client and server), licensing services, and IT change management processes. Familiarity with working in ITIL environments and applying best practices. Strong communication and interpersonal skills, with the More ❯
if no current IAM Level II certification. • 8 years of experience in cybersecurity or a related field. • 2 years of experience displaying strong knowledge of operating systems (e.g., Windows, Linux). • 2 years of cybersecurity experience in the Department of Defense (DoD) or Intelligence community. • 2 years of experience as a Cyber or Security Analyst for federal information systems. More ❯
/REST), web and application servers Excellent development/coding skills relevant to SailPoint (java/bean shell/oracle/jsf etc.). Experience installing complex applications on Windows and UNIX/Linux platforms Experience with databases (Oracle, Sybase, MSSQL, MySQL) Bachelor's Degree and/or qualification in an IT related discipline or equivalent technical and business More ❯
ll thrive here if you have: 4+ years in cybersecurity or technical security roles Familiarity with frameworks like NIST, ISO 27001, or CIS Controls Working knowledge of networking, OS (Windows/macOS), and security protocols Experience with tools like Splunk, CrowdStrike, Nessus, Palo Alto, Wireshark Basic cloud security knowledge (AWS/Azure/GCP) Scripting experience (Python, Bash, PowerShell More ❯
build and optimize cloud-based networks (VNets, App Gateways, etc) Familiarity and experience with integrating multiple third-party tools like SonarCloud. Ability to build environments from the ground up (windows, linux, SQL, Redis, WebApps, etc) Experience with containerization Preferred skills: Kubernetes or other orchestration tools NewRelic scripted monitors Experience with security tools (including CheckPoint) and best practices Hadoop, Kafka More ❯
Databases (Postgres, SQLite, etc.). Experience writing scripts and services in Python. Familiarity with GitLab (CI/CD). Understanding of basic Containerization in Docker. Familiarity with Operating Systems (Windows, Linux, IOS Desired Skills: Service containerization and deployment with Docker/Kubernetes. Experience with production CNO capabilities and operations. System engineering or team leadership experience. Education/Experience More ❯
Proficiency in SQL for data analysis and security investigations. Hands-on experience with incident response, including detection, triage, and remediation. Strong endpoint management skills across multiple operating systems (Mac, Windows, Linux). Proficiency in at least one scripting language (Python, Bash) and one compiled language (Rust, Go). Familiarity with serverless functions and API security is a plus. Bonus More ❯
strategy aligned with the release schedules. Environment Lifecycle Management - oversee provisioning, configuration and environment refreshes. Close coordination with Release Management to minimise conflicts and environment downtime. Plan environment maintenance windows with minimal disruption. Environment governance - maintain a centralised list of environments (including environment ownership, purpose and configuration details). Optimisation - optimise resource usage to reduce costs and improve efficiency. More ❯
MIL-STD-1553, SpaceWire, Attitude &, Orbital Control, Star Trackers, Gyros, Momentum Wheels, power systems, batteries, Solar Arrays, Thermal Control, heaters, thermostats, FDIR, Spacecraft Configuration Vectors etc. Familiar with the Windows and Linux operating systems Awareness of 'cleanroom' disciplines Knowledge of system testing & Verification Desired skills Programming and scripting languages, particularly writing and debugging Linux/Unix Bash scripts is More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom
Cybit
service led career path. We're looking for someone with Previous customer service experience; with a passion for providing an excellent customer experience. Passionate about technology; basic knowledge of Windows operating systems and network technologies. Excellent problem-solving and communication skills including a great telephone manner and strong written skills Ability to work independently and as part of a More ❯
host government offices and ministries, as well as with administrative staff in the private sector and non-governmental organizations. A strong working knowledge of MS Office software package and Windows is required. Is expected to bring to the Executive Office any information, which might lead to potential embarrassment regarding protocol issues. Is expected to show tact and diplomacy in More ❯
deployment, and maintenance. Modernize and enhance legacy systems for performance, security, and scalability. Write and maintain scripts in PowerShell for automation and infrastructure support. Develop and troubleshoot applications on Windows, Android, or embedded platforms. Conduct code reviews, mentor junior developers, and contribute to process improvements. Interface with stakeholders to ensure solutions meet performance and security expectations. Must-Have Qualifications More ❯
operational availability, deployment patching, incident resolution, request fulfilment. Your responsibilities Senior technical expert & Product Owner/SME for Storage, File Services, Backup & Archive, including File-shares, home-drives, NAS, Windows file-servers (& underlying storage), & data transfers & transfer mechanisms into & out of these systems such as Azure Box. Maintenance & support of RWE's Cloud and Data Centre (C&DC) storage More ❯
Familiarity with NIST SP 800-171, CMMC 2.0, DFARS , and RMF processes. •Familiarity with JSIG classified systems, boundary definitions, and compliance documentation (e.g., SSPs, POA&Ms) •Working knowledge of Windows operating systems and cybersecurity tools (e.g., Nessus, SIEM, endpoint protection). •Strong understanding of IT systems, networking, security policies, process controls, and IT operations. •Advanced knowledge of security principles More ❯
have also worked out (Sheetrocking) • Ensure that you are following all safety requirements/PPE • Basic computer skills/literate - able to follow work instructions, enter timecard online etc., windows/MS office. Qualified candidates should APPLY NOW for immediate consideration! Please hit APPLY to provide the required information, and we will be back in touch as soon as More ❯
implement standard operating procedures and technical documentation. The Level 2 System Administrator shall possess the following capabilities: Critical Skills: Experience with: Configuration and Maintenance of Virtual Machines Linux and Windows operating systems Scripting languages (e.g. Bash, Perl) OS and Software application patching (e.g. IAVA, Version updates) Container Technologies (Kubernetes, Docker) Knowledge or skill relevant to computer operations Attention to More ❯
Henley-on-Thames, Oxfordshire, England, United Kingdom
QA
high-quality support services. Committed attitude towards a first-class customer service Clear written and verbal communication skills. A technical understanding of PC's and common operations. Knowledge of Windows 10, 11 and MAC operating systems. Entry requirements: 3 GCSEs (or equivalent) at grades 4+ (A-C) in any subject GCSE Maths and English (or equivalents) at grades 3+ More ❯
years of experience in penetration testing. Demonstrable skills in the Penetration Testing/Ethical Hacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite More ❯
required to be a Tier 2 Cyber Security Analyst: * Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network. * Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms. * Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure More ❯
Livingston, West Lothian, Scotland, United Kingdom
FPSG Connect
required to be a Tier 2 Cyber Security Analyst: * Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network. * Advanced knowledge of Windows and Linux operating environments, including standard commands, file systems, and user authentication mechanisms. * Competence in using SIEM solutions (e.g., ArcSight, Azure Sentinel) for monitoring and log analysis; some exposure More ❯
working with digital out of home technologies (KIS, Broadsign, OneLAN, etc) Experience in working with ticket systems (CONNECT for Service, Zendesk, etc) Experience using various operating systems (Linux and Windows variants) Quality Management Adherence to the philosophy of continuous improvement through examination of all outcomes of processes, regardless of either a positive or negative outcome Ensures standard operating procedures More ❯