and improve standard operating procedures (SOP's) in a matrixed organization supporting the prime contractor and CMS. Along with a demonstrated ability to manage a team composed of Network & Firewall Administrators Experience with Cisco technologies with recent experience in Cisco ACI Experience with F5 Load balancers Experience with physical connection/access to data center hardware via console serial for More ❯
system configuration if third party software is utilized on the hosting environments Updating and tracking Time Compliance Network Orders (TCNOs) and if applicable, NOTAMS related to database support Coordinating firewall access to maintain mainframe/server accessibility for users and interfaces Coordinating release schedules with the PMO and interfacing partners Installing new maintenance releases of the CEMS applications Resolving system More ❯
the time. Executive presence and ability to manage high-stakes conversations and escalations. Advantages: Experience with and Gainsight. Technical depth in TCP/IP v4, VRF, AWS VPC, routing, firewall policies, LDAP, and Radius. French, Spanish or Italian fluency. AlgoSec is an Equal Opportunity Employer (EEO), committed to creating a friendly, diverse and inclusive company culture. More ❯
Experience with analyzing logs, stack traces, debug libraries, software/hardware. • Possesses an understanding of Python, Bash, SQL databases. • Create installation guides and as-built documentation. • Experience with Linux firewall and VPN configuration System One, and its subsidiaries including Joulé, ALTA IT Services, and Mountain Ltd., are leaders in delivering outsourced services and workforce solutions across North America. We help More ❯
telecom protocols, codecs, and technologies (e.g., SIP, RTP, SRTP). - Demonstrated experience with Unix/Linux systems for troubleshooting and configuration. - Strong network experience, including IP routing, DNS, QoS, firewall rules, and VLANs as they relate to VOIP. - Experience with administration tasks such as managing user accounts, call routing, and provisioning extensions. - Ability to work in a 24x7x365 mission-critical More ❯
the workload of others. Proven experience mentoring and supporting colleagues Capable of configuring and maintaining Microsoft 365, along with migrations. Knowledgeable on MS Windows Server, MS365 Administration, backup software, firewall configuration, anti-virus, and remote connection software. Knowledge of firewalls, AV, or backup products/technologies Familiarity with Azure hosting and configuration, Entra, Intune device enrolment, and Windows Modern Desktop More ❯
trust networking principles and solutions, e.g. Zscaler Experience configuring and troubleshooting dynamic routing protocols (e.g. BGP, OSPF) VPN configuration and troubleshooting skills across multiple environments Exposure to multi-vendor firewall environments with a focus on secure policy design and integration What you'll get in return Competitive base salary Up to 20% bonus BAYE, SAYE & Performance share schemes Flexible benefits More ❯
to Operate (ATO) operations and experience developing solutions that adhere to cyber policy Preferred Skills: Familiarity with foundational networking concepts such as routing, switching, identity services, intrusion detection, and firewall Familiarity with virtual machines in VMWare vSphere environments including networking configuration Familiarity with complex software development environments including submodules, remote dependencies, and mixed-code deployments Competencies: Exceptional knowledge of cybersecurity More ❯
load balancers, and other network appliances. Conduct network capacity planning, performance monitoring, and optimization to ensure high availability and optimal network performance. Implement and maintain network security measures, including firewall configurations, access controls, and intrusion detection systems. Collaborate with cross-functional teams to gather and translate network requirements into scalable and efficient network designs. Provide technical guidance and mentoring to More ❯
endpoint protection, and other network defense technologies Adept in evaluating network protocols utilizing network analyzers, such as Wireshark, Tshark, and tcpdump Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations. Experienced in leveraging data analysis platforms, such as Splunk, Kibana, and Arkime, to detect and analyze anomalous network activity Proficient in triaging More ❯
Hands-on experience with cybersecurity products and concepts such as EDR/XDR, endpoint protection, SEIM, PKI, CA, HSM, key vaults, encryption services, web application security/web application firewall/bot protection, ATOs. Support projects including product upgrades and deployment of new capabilities, tools, and enhancements and daily operational support. Ability to present technical issues to non-technical audiences. More ❯
and maintain routers, switches, and cabling Configure switches and routers in accordance with DISA STIGs Manage switch and router settings and configurations Configure and maintain trunks and VLANs Provide firewall and proxy administration, including creating and deleting rules Manage access control system settings Create, delete, and manage VPN configurations Install, maintain, move, and remove hardware and cabling Upgrade software and More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Corelight, Inc
experience is a plus Security and/or Networking related certification(s) Demonstrated expertise in Windows/MacOS/Linux/Unix operating systems, IDS/IPS, Network administration, firewall configuration, and strong knowledge of TCP/IP SIEM experience (Splunk required, others a bonus) Scripting in (some of) Zeek, Bash, Python, Perl, Powershell, etc. Strong briefing skills; experience interacting More ❯
Support to all computer systems and network assets before the assets can be connected to the network. Manage cybersecurity hardware and software changes for the installation. Provide host-based firewall management for enterprise managed assets and workstations. Determine abnormalities, attacks, damages, and unauthorized modifications in the network via mechanisms such as intrusion detection devices. Qualifications 4+ years experience in a More ❯
system security, and supporting security information and event management (SIEM) Experience with infrastructure management and support and system administration in Windows and UNIX environments Experience with security tools, including Firewall, IDS, and Active Directory Splunk Administrator Certification Qualified candidates should APPLY NOW for immediate consideration! Please hit APPLY to provide the required information, and we will be back in touch More ❯
and tools users. Qualifications: Required: 19 years of experience and HS/GED OR bachelors and 14 years of experience. Brocade Cisco Juniper JUNOS Network Operating System Network Device (firewall/router/switch) System Administration Palo Alto Proficient in Linux/UNIX commands Proficient in Windows Server OS RHEL 7x, 8x, or 9x RHEL/Linux Server Administration Web More ❯
Degree in Computer Science or a related discipline OR equivalent experience Excellent knowledge of a wide variety of security solutions and technologies, including Linux, network architecture, implementation, and configuration, firewall technologies,proxy technologies, anti-virus, spam and spyware solutions (Gateway and SaaS), malware/security experience Comprehensive understanding of the intelligence lifecycle, information needs, collection, organization, and priority intelligence requirements More ❯
polygraph clearance • 7 years of more of technical experience in cybersecurity discipline, computer applications, information systems, engineering, mathematics, or related field • Understanding of computer network architectures • Well versed in firewall technologies, proxies, ipchains, iptables, SNORT, NMAP, Wireshark, etc. • Developmental knowledge of basic scripting with python (preferable), bash, perl, or Powershell • Experience with and ability to train others on advanced operational More ❯
polygraph clearance • 7 years of more of technical experience in cybersecurity discipline, computer applications, information systems, engineering, mathematics, or related field • Understanding of computer network architectures • Well versed in firewall technologies, proxies, ipchains, iptables, SNORT, NMAP, Wireshark, etc. • Developmental knowledge of basic scripting with python (preferable), bash, perl, or Powershell • Experience with and ability to train others on advanced operational More ❯
of remediating security vulnerabilities and experience hardening Linux systems in accordance with RMF and STIGs. Experience building custom "rpm" software packages for Red Hat platforms. Experience with host-based firewall implementations and configuration. Ability to travel as needed. Preferred Qualifications: Red Hat System Administration certification(s). Experience integrating LDAP in complex environments. Solid understanding of Enterprise-level storage concepts. More ❯
and perform system capacity analysis and planning Conduct data captures to obtain network performance information Implement specific network solutions to support server requirements to include load-balancing, VPN's, firewall contexts, and network address translation (NAT) where appropriate Qualifications: Ten (10) years' experience as a Platform Engineer is required. Bachelor's degree in a computer engineering or in a field More ❯
systems knowledge and understanding of trade flow, Equities and FX products knowledge a must. Other market data-trading products as well as experience with Windows server. IPC Dealerboard, Citrix, firewall,Wyse, STP. Trader workstation hardware Amulet Blade LINUX-UNIX and VDI knowledge. Personal Requirements: Excellent communication skills Results driven, with a strong sense of accountability A proactive, motivated approach. The More ❯
Application support experience within a Unix/Linux environment Strong working knowledge of the FIX protocol Proven experience of supporting Windows Server environments Experience in troubleshooting network problems: i.e., firewall and routing problems Understanding of international Equity market mechanics and flows, particularly back-office flows such as Regulatory & Transaction Reporting Ability to manage multiple projects simultaneously in order to meet More ❯
components. 7. Gather needed data to specify system/component performance and interface requirements. 8. Implement specific network solutions to support server requirements to include load balancing, VPN's, firewall contexts, Traffic Shaping Voice over IP (VoIP), GRE Tunneling, IP Security (IPSec), IP Encryption, Media over IP (MolP), and network address translation (NAT) where appropriate. 9. Configure and maintain organization More ❯
Ensure compliance with cybersecurity frameworks including NIST 800-53, NIST 800-171, OWASP, CIS, STIG, SOX, CMMC and DFAR requirements Conduct network security assessments, focusing on ZTA, secure connectivity (Firewall Ingress/Egress), and data encryption, and key management Manage workload independently and escalate issues proactively; Collaborate directly with Product Owners to explain technical architecture requirements and address any related More ❯