DoD) Unified Capabilities Requirements and monitor security updates in accordance with Government procedures. Operate standard Active Directory (AD) services plus the availability to use Windows Light DirectoryAccessProtocol (LDAP) services for network devices and appliances. Monitor and optimize replication speed of directory services. Oversee Rights Management Services for administrators, users, and groups. Design, Develop and Integrate application networking ports More ❯
MUOS networks. • Integrating classified networks into network architecture through the use of TACLANEs. • Microsoft domain replication, domain trusts, Active Directory, Exchange, SQL, Windows Deployment Service (WDS), SharePoint, Windows Firewalls, LDAP, SCCM/MECM, Bluecoat Proxy Server, PKI, and FSMO Roles. • Cisco routing and switching, Unity Connection (CUC), IM & Presence Service (CIMP), CUCM, UCS-E, • VMWARE ESXi, VCSA, VSAN, virtual switching More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
systems for security events and anomalies. Maintain comprehensive documentation of IAM configurations. Strong understanding of IAM concepts (authentication, authorization, provisioning, SSO, MFA, PAM). Familiarity with directories (Active Directory, LDAP). Knowledge of industry security frameworks and compliance (e.g., NIST, ISO 27001). Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and More ❯
and Security Center on both Linux/Unix and Windows based environments Responsible for installing and configuring Nessus Agents Secure Tenable server an Enable SSL Integrating Tenable products with LDAP, Active Directory, and CyberArk. Responsible for the creation of tenable Organizations, Repositories, and Scan Zones. Responsible for local and LDAP based user management. Responsible for configuring tenable plugins/feeds More ❯
and Security Center on both Linux/Unix and Windows based environments Responsible for installing and configuring Nessus Agents Secure Tenable server an Enable SSL Integrating Tenable products with LDAP, Active Directory, and CyberArk. Responsible for the creation of tenable Organizations, Repositories, and Scan Zones. Responsible for local and LDAP based user management. Responsible for configuring tenable plugins/feeds More ❯
and Security Center on both Linux/Unix and Windows based environments Responsible for installing and configuring Nessus Agents Secure Tenable server an Enable SSL Integrating Tenable products with LDAP, Active Directory, and CyberArk. Responsible for the creation of tenable Organizations, Repositories, and Scan Zones. Responsible for local and LDAP based user management. Responsible for configuring tenable plugins/feeds More ❯
lieu of a degree Experience managing RHEL, Windows Server 2016/2019, and virtualized environments Familiarity with patching tools, IAVA remediation, and secure scripting (bash/perl) Experience with LDAP, Active Directory, or IdAM solutions TS/SCI with Polygraph Bonus if you bring: Previous experience working in an IdAM or ICAM environment Strong technical documentation habits and Jira/ More ❯
time management. Excellent communications skills Desired Skills: Experience with: oDocker containerization and Kubernetes orchestration oPublic Key Infrastructure(PKI) oSecrets/Vault Management oIdAM directories (active directory and/or LDAP) oTicket tracking tools (e.g. Jira, Redmine, RT Tracker) oNetworking/Load Balancing oStrong organizational and time management skills, including the ability to multi-task and work independently and with a More ❯
Kubernetes, Docker) Knowledge or skill relevant to computer operations Attention to detail and time management. Excellent communications skills Desired Skills: Experience with: IdAM directories (active directory and/or LDAP) Ticket tracking tools (e.g. Jira, Redmine, RT Tracker) Familiarity with Ansible and Mongo Strong organizational and time management skills, including the ability to multi-task and work independently and with More ❯
years of related experience in Desktop Support. Experience in Financial Services Industry a plus O365 Product Suite Microsoft SCCM Foundational experience with enterprise directory and directory integration services (AD, LDAP, ADFS, PKI) General knowledge of infrastructure security, including Windows, Unix/Linux, desktop and mobile ITIL Processes and Procedures Education/Certification: Specific certifications i.e., A+, Network+, HP, Dell, Microsoft More ❯
routing, Server Load Balancing, and Network Security architecture and core technologies such as IP, TCP, OSPF/IS-IS, BGP, MPLS, Server Load Balancers, Firewalls, ACLs, DNS, DHCP, IPAM, LDAP, NFS, etc. • Knowledge of network analysis fundamentals and robust troubleshooting skills; specifically, network performance analysis with experience working with customers to diagnose a problem, and work toward resolution. • Strong Unix More ❯
Perl) Deep understanding of TCP/IP, IP routing, Server Load Balancing, Network Security, and core technologies like IP, TCP, OSPF/IS-IS, BGP, MPLS, Firewalls, DNS, DHCP, LDAP, NFS Experience with vendor platforms such as Cisco, Juniper, Arista, F5, Palo Alto, etc. Knowledge of network hardware and packet forwarding architectures Experience in virtualized enterprise networking environments Relevant degree More ❯
threats and vulnerabilities in ICS/SCADA systems. SIEM : Strong understanding of SIEM technologies for log management, log analysis, and event correlation. Authentication & Access Control: Proficient in 802.1x, RADIUS, LDAP, AD, smart cards, and other authentication mechanisms. Security Tools & Troubleshooting : Hands-on experience with tools like TCPDUMP, Wireshark, NETSTAT, and SNMPWALK for network and security troubleshooting. Operating Systems & Platforms: Proficiency More ❯
level (troubleshoot and effectively resolve issues by research/using knowledge bases in a confident way). Active Directory to a medium-high level - security groups, administration/deployment, LDAP, ADSI. Know-how of Citrix XenApps ?" Administration, Maintenance and Support of existing Citrix XenApps server farm Windows Server Environment 2012/2016 - design, deployment, maintenance and support. Networking - design/ More ❯
and Filesystems (VXFS, ZFS, EXT3, EXT4, XFS, UFS, SVM) Volume Managers (VXVM, LVM) Cyberark and SCCM compliant support for CI's. UNIX/Linux auditing and logging systems Networking LDAP configuration Server/Client UNIX/Linux Software Patching Desirable: Virtualization (VMware, Solaris Zones and Containers) EMC SAN Storage Scripting (Shell, Python, Perl, Ansible YAML) Configuration management tools (Ansible or More ❯
IAT Level 2 Certification. Experienced with administering Red Hat Linux based systems with minimal support, to include patching, creating/maintaining RPM packages, performance tuning, networking, user management (LDAP), and security hardening. Deploying and administration of systems in Amazon Web Services (AWS). REQUIRED Active TS/SCI w/Poly Clearance is required on day one. Typically requires a … Security, GICSP, GSEC, SSCP, CySA+, CND. Experience administering Red Hat Linux based systems with minimal support, to include patching, creating/maintaining RPM packages, performance tuning, networking, user management (LDAP), and security hardening Deployment and administration of systems in Amazon Web Services (AWS) SKILLS PREFERRED Using and developing with automation tools/frameworks such as Terraform, Ansible, and Chef as More ❯
Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat-hunting activities Experience More ❯
depth understanding of: Client Server applications and multi-tier web environments Relational databases, Firewalls, VPNs, enterprise AntiVirus solutions Networking principles (eg TCP/IP, WAN, LAN, SMTP, FTP, POP, LDAP) * Please note this is a shift-based position, following a rotation of 2 days (6am-6pm), 2 nights (6pm-6am), 4 days off* Due to the highly secure nature of More ❯
Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP/S, SSL, SMTP, FTP/S, LDAP/S. Demonstrable experience with Security Information Event Monitoring Tools and/or Network Packet Capture tools Hands-on experience with IDS/IPS technologies and threat-hunting activities Experience More ❯
of 2 years of experience (within the last 5 years) in software engineering. Experience working with at least 3 of the following: C#, Java, JavaScript, Tomcat, SQL, XML, HTML, LDAP certificates, REST services. Experience with full lifecycle agile software development projects. Experience with software issue tracking tools such as JIRA Desired Skills and Qualifications: Demonstrated experience developing Android applications. Demonstrated More ❯
Linux system administration and scripting (including Python and/or Bash) Hands-on experience with data onboarding via syslog, REST API, or Splunk Universal Forwarders Familiarity with enterprise authentication (LDAP, SSO), RBAC, and multi-tenant environments Experience supporting incident response, forensic investigations, or SOC operations Experience in deploying and managing Splunk in virtualized or cloud-hosted environments (VMware, AWS, or More ❯
Linux system administration and scripting (including Python and/or Bash) Hands-on experience with data onboarding via syslog, REST API, or Splunk Universal Forwarders Familiarity with enterprise authentication (LDAP, SSO), RBAC, and multi-tenant environments Experience supporting incident response, forensic investigations, or SOC operations Experience in deploying and managing Splunk in virtualized or cloud-hosted environments (VMware, AWS, or More ❯
of SailPoint, Okta, CyberArk, Azure AD are considered a plus. You are familiar with security concepts and technologies in the wider Identity and Access management space (Logical Access Controls, LDAP and RBAC, Authentication solutions, PKI concepts, etc.). As a certified Top Employer we offer: An international corporate culture in which personal growth, mutual trust and lifelong learning are being More ❯