updates and trainer development initiatives. Building and maintaining your own Red Hat certifications. The kind of person this would suit: An experienced IT trainer or instructor with a strong Linux or UNIX background. Fluent in English and either German or Dutch. Certified to RHCE level, or ready to get certified within your first two months. Confident delivering technical content in … for recruitment purposes. Applicants must have the right to work in the EU or the relevant permissions for business travel across Europe. Keywords: Red Hat Certification Jobs, RHCE Trainer, Linux Training Jobs Europe, Remote IT Instructor, Red Hat Jobs EMEA, DevOps Training Roles, Ansible Instructor, Dutch Speaking IT Jobs, German Tech Trainer Jobs, Virtual Classroom Trainer, IT Skills Instructor Remote More ❯
level troubleshooting, tuning, and support for: HPC infrastructure and associated applications including Nagios, xCAT, failover software, and compilers. Distributed computing environments utilizing RES, LSF, and SLURM workload managers. Enterprise Linux operating systems, specifically Red Hat and SUSE. Administer and support high-performance parallel file systems such as XFS, GPFS, and Lustre. Collaborate with cross-functional teams to implement best practices … degree, 15 years of experience working in a large complex IT environment providing industry functional expertise with the skills listed above. Experience with HPC MPP systems Experience with enterprise Linux operating systems, specifically Red Hat and SUSE Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative More ❯
Stevenage, Hertfordshire, England, United Kingdom Hybrid / WFH Options
MBDA
and product development. What you will be doing: Design and build real-time simulations for missile testing, Abstract detail to understand the simulation and missile behaviour, Work with the Linux operating system and programming languages like C/C++, Interact with relevant stakeholders across MBDA, Conduct experiments with real missile hardware and software, Analyse the missile performance and report on … the best HWIL engineers have wide engineering experience, with knowledge in some (not necessarily all) of the skill areas listed below: Software design for real-time applications, Familiarity with Linux operating system, Familiarity in C/C++ programming languages, System integration & interface debugging, System performance analysis. Our company: Peace is not a given, Freedom is not a given, Sovereignty is More ❯
being an effective technical manager. As part of a team of embedded software developers you will be involved with a variety of projects that use microcontroller, DSP and embedded Linux technologies. It is expected that you will have proven skills in one or more areas and will be able to actively contribute to the code base. In the early stages … discipline. 5+ years of embedded software development experience. Good working knowledge of C on embedded platforms. ln-depth familiarity with at least one embedded software discipline, such as Embedded Linux, ARM microcontrollers or DSP. Advocate of Unit testing, Automated testing and Test Driven Development. A proactive approach to documenting design decisions. We use Atlassian Confluence. A personal interest in Hi More ❯
we offer a world-class, truly unique employee experience that is rare within our industry. We are seeking a highly motivated Systems Engineer with hands-on experience in both Linux and Windows environments, deep familiarity with RF systems, and a strong background in FORNSAT operations. This individual will provide end-to-end systems engineering support across the project lifecycle-from … TS/SCI security clearance with agency appropriate polygraph). Capabilities Support full lifecycle systems engineering activities including requirements analysis, design, integration, verification, and validation Provide expertise across both Linux and Windows platforms, ensuring compatibility and security Design, test, and optimize RF systems, antennas, and signal paths Apply FORNSAT knowledge to support signal collection and analysis initiatives Collaborate with multi More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across network, hardware, and software components Preferred Skills and Experience: A combined minimum total of ten (10) years of full … MITRE D3FEND frameworks Threat intelligence assessments and identification of emerging potential threats Performing vulnerability assessments with ACAS Remediation of vulnerability findings to include implementation of vendor patches on both Linux and Windows Operating systems Design, implementation, configuration, and enforcement of security controls on network, hardware, and software components and devices Possess one of the following DoD 8570.01-M IAT Level More ❯
system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows environments across DoD networks. You will work collaboratively with Blue Team, Red Team, and other Cybersecurity professionals on overall cyber readiness defense and system accreditation efforts. ** Position is … Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science in Information Technology, Bachelor of Science in Computer Science, Bachelor of Science in Computer Engineering Compensation More ❯
system hardening, vulnerability assessment, and security compliance activities in accordance with DoD requirements. The ideal candidate will have a solid foundation in cybersecurity practices and proven experience supporting both Linux and Windows environments across DoD networks. You will work collaboratively with Blue Team, Red Team, and other Cybersecurity professionals on overall cyber readiness defense and system accreditation efforts. ** Position is … Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science in Information Technology, Bachelor of Science in Computer Science, Bachelor of Science in Computer Engineering Compensation More ❯