IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA), provides, operates, and assures command and control of the Defense … Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We support key missions which include: JRSS (Joint Regional Security Stack) enterprise … system, which provides a centralized network suite of equipment that provides a host of network security capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. Missile Defense Agency Ground-based Midcourse Defense (GMD) Communications Network. Other key services More ❯
IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA), provides, operates, and assures command and control of the Defense … Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We support key missions which include: JRSS (Joint Regional Security Stack) enterprise … system, which provides a centralized network suite of equipment that provides a host of network security capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. Missile Defense Agency Ground-based Midcourse Defense (GMD) Communications Network. Other key services More ❯
other scripting language(s) Utilize knowledge of latest cyber threats and attack vectors to develop and or maintain custom correlation rules from all indexed sources to support continuous event monitoring and alerting Participate in discussions to make recommendations on improving SOC cyber visibility, process improvements, and reducing the incident remediation period Review all existing network event collections to … Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPL Advanced knowledge of TCP/IP (Transport protocols geared to Network Engineering - Maybe change to encryption methods e.g. SSL/TLS and PKI) protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security … data from security devices Must have demonstrated the ability to tune the SIEM event correlation rules and logic to filter out security events associated with known and well-established network behavior, known false positives, and/or known errors Experience developing advanced correlation rules utilizing stats and data models for cyber threat detection Experience with NetworkMonitoringMore ❯
Network Support (NOC) Engineers wanted by established Global IT Managed Service Provider. This role involves a combination of Night and Day shift (4 on/4 off) Responsibilities Monitor a variety of devices, services and applications including Servers, Routers and Switches. Provide timely response to incidents, outages and performance issues Categorise issues for escalation to appropriate technical teams Document … all actions in accordance with standard company policies and procedures. Required Skills and Experience: Proven experience as a 2nd Line NOC Engineer or in a similar role. Knowledge of network and server infrastructure, including LAN/WAN, Routers, Switches, Firewalls, and VPN. Proficiency in networkmonitoring tools and technologies. Excellent problem-solving skills with the ability to More ❯
cybersecurity, ready to contribute to a growing and innovative academic program. Responsibilities: Instruction and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethical hacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials … Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized networks, attack and defense simulations, and monitoring student use of the systems. Troubleshooting: Assist students in troubleshooting technical issues related to lab setups and provide feedback on their performance within the lab environment. Real-world Case … training environments preferred. Experience with online course platforms and virtual learning environments is a plus. Technical Proficiency: Proficient in cybersecurity tools and technologies such as firewalls, IDS/IPS, networkmonitoring tools, threat intelligence platforms, and security protocols. Skills and Expectations: Technical Expertise In-depth knowledge of cybersecurity frameworks, tools, and protocols. Practical experience with penetration testing, vulnerability More ❯
Hat, Debian Linux, and other platforms. Collaborate with IT and OT teams to secure legacy manufacturing equipment and industrial control systems. Monitor and improve firewall rules, VPN configurations, and network segmentation strategies. Support compliance efforts and internal audits by maintaining documentation and evidence of security controls. Assist in the development and enforcement of security policies, standards, and procedures. Participate … analysis and post-incident reviews. Stay current with emerging threats, vulnerabilities, and regulatory requirements. Skills & Experience Essential: Strong knowledge of endpoint protection (SentinelOne preferred). Experience with firewalls and network security principles ( Palo Alto and Cisco). An understanding of encryption and certificates as used within IT systems. Experience of security patching and their management systems. Familiarity with Windows … vulnerabilities with tools like Nessus Ability to analyse logs, detect anomalies, and respond to threats. Desirable: Certifications such as CompTIA Security+, CISSP, CEH, or GIAC. Experience with SIEM tools, networkmonitoring, or threat intelligence platforms. Knowledge of NIST(2), Cyber Assessment Framework, Cyber essentials(+), ISO 27001, or IEC 62443 standards. Scripting skills and data manipulation The Package More ❯
Scunthorpe, South Humberside, England, United Kingdom
Principal IT
Hat, Debian Linux, and other platforms. Collaborate with IT and OT teams to secure legacy manufacturing equipment and industrial control systems. Monitor and improve firewall rules, VPN configurations, and network segmentation strategies. Support compliance efforts and internal audits by maintaining documentation and evidence of security controls. Assist in the development and enforcement of security policies, standards, and procedures. Participate … analysis and post-incident reviews. Stay current with emerging threats, vulnerabilities, and regulatory requirements. Skills & Experience Essential: Strong knowledge of endpoint protection (SentinelOne preferred). Experience with firewalls and network security principles ( Palo Alto and Cisco). An understanding of encryption and certificates as used within IT systems. Experience of security patching and their management systems. Familiarity with Windows … vulnerabilities with tools like Nessus Ability to analyse logs, detect anomalies, and respond to threats. Desirable: Certifications such as CompTIA Security+, CISSP, CEH, or GIAC. Experience with SIEM tools, networkmonitoring, or threat intelligence platforms. Knowledge of NIST(2), Cyber Assessment Framework, Cyber essentials(+), ISO 27001, or IEC 62443 standards. Scripting skills and data manipulation The Package More ❯
all servers are backed up in line with the firm's backup policy. Participate in the Out of Hours rota to monitor and respond to critical alerts in the networkmonitoring tools and any emergency escalations from the Service Desk and Management. Skills Required: Proven experience of Azure and Entra Services, adhering to best practices in Azure security … including identity management, access control, and threat protection. Background in Infrastructure/Systems Administration/Dev Ops with knowledge of networking, monitoring, and support Proficiency in coding languages Extensive proven working experience in maintaining vulnerability management solutions and remediating system vulnerabilities. Proven working experience in managing server infrastructure in a Data Centre environment. Strong Knowledge of Windows Server More ❯
A large government client of ours is seeking an experienced Network Control Technician to join their dynamic team. PRIMARY RESPONSIBILITIES: Self- motivated and driven to seek solutions to resolve monitoring errors, using research and documentation. Troubleshoot circuits using router commands, loops, alarms and errors, and other troubleshooting technologies and techniques. Utilize networkmonitoring tools to monitor … management. Expertise in one or more of the following: routers, switches, crypto devices, routing, DSN/DRSN, Video Services, Promina, CISCO, Juniper, MSPP, DWDM, Optical Switching. General understanding of network topologies, both transport and IP. Currently possess an active Secret security clearance and be able to obtain and maintain a Top Secret security clearance. Marathon TS is committed to More ❯
site location is Fort Belvoir, VA. A DoD Secret clearance will be accepted, but the ability to be cleared for a Top Secret is required. Position Responsibilities: - Conduct continuous networkmonitoring and analysis using various defensive cyber tools - Enumerate vulnerable terrain in support of Tier 1 reporting. - Provide end customers with vulnerability assessment reports with tailored, prioritized mitigation … actions. - Track vulnerability management efforts from identification, to notification, to remediation. - Investigate and report potential false positives from continuous monitoring tools. - Analyze risk score trends and ascertain potential root causes to risk score anomalies. - Track compliance trends and provide prioritized list of findings to end customers. - Assist subscribers in the deployment of Nessus agents. - Enumerate and report instances of … specific platforms, installed software, and services (including unauthorized instances). - Validate network scanning quality and compliance IAW applicable JFHQ-DODIN TASKORDS. - Troubleshoot credentialed vulnerability scanning failures and provide remediation guidance. - Research emerging threats and vulnerabilities to aid in the identification of network security risks. - Assist in incident response activities by querying existing data and sharing matching indicators of More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Fynity
an ambitious Junior SOC Analyst ready for the next challenge, this is a fantastic opportunity to make a real impact in a fast-paced, country critical environment. The Role: Monitoring and triaging security alerts to identify potential threats across client environments Investigating events using system logs, network traffic, and endpoint telemetry Supporting containment and recovery efforts during active … as Microsoft Sentinel or Splunk Familiarity with the MITRE ATT&CK framework and threat detection methodologies Strong analytical skills with a keen eye for detail in log analysis and networkmonitoring Basic understanding of enterprise security architecture including firewalls, VPNs, AV, and web applications Good grasp of network protocols such as TCP/IP, HTTP, SMTP, and … have the opportunity to work with cutting-edge tools and technologies and be part of a team defending country critical technology.If you are interested please apply ASAP. The People Network is an employment agency and will respond to all applicants within three - five working days. If you do not hear within these timescales please feel free to get in More ❯
Position Overview: We are seeking a highly skilled Sr. System Security Engineer to join our team in Brunswick, GA. The ideal candidate will support the Server and Network Teams in tracking, documenting, planning solutions for, remediating, or requesting waivers for vulnerabilities and threats. This role involves working closely with ISSOs and CISO to provide status and progress reports for … Assist in systems' Security Authorization testing. Assist in resolving security event notifications for hardware and software. Review vulnerabilities and configuration management deficiencies identified during scans, work with server and network teams to remediate, and provide monthly reports of all corrective actions or exceptions. Maintain 100% compliance with all applicable Information Security laws, regulations, and policies. Advise on enterprise IT … infrastructure security using the latest on-premise and/or cloud-based network, server, storage, and client security principles, techniques, and protocols. Utilize network, server, storage, and client security technologies, monitoring tools, and applications to ensure optimal information and system integrity, confidentiality, and availability. Review configurations of on-premise and/or cloud-based enterprise IT security More ❯
contributor at a pivotal time in our company's growth and at a pivotal point in computing history. Summary As a Technical Escalation Engineer, you will be responsible for monitoring and maintaining the health and performance of our fleet of installed clusters. You will work in a 24/7 network operations center-style environment, ensuring the availability … reliability, and security of services. This role involves real-time monitoring, incident detection, incident management, incident resolution, and clear written and verbal communication with other teams and stakeholders. The Role Monitor clusters using internal monitoring tools to detect and troubleshoot issues promptly. Respond to alerts and incidents in a timely manner, following standard operating procedures (SOPs) and escalation … coverage. Maintain up-to-date knowledge of VAST Data Platform technologies via prescribed hands-on training modules. Adhere to security protocols and ensure the confidentiality, integrity, and availability of network and system data. Provide excellent customer service to internal and external stakeholders during incident resolution and communication. Requirements Proven experience as a NOC Operator or in a similar networkMore ❯
are seeking an intermediate to advanced-level IT Operations Engineer to join our team supporting IT operations for the Special Operations Community. The IT Operations Engineer will maintain various network-monitoring technologies and applications focusing on the Splunk IT Service Intelligence (ITSI) premium application. The selected candidate will provide advanced experience in managing Splunk Core and Splunk ITSI. … technical/management leadership on major tasks or technology assignments • Establishes goals and plans that meet project objectives and has domain and expert technical knowledge • Maintains various IT Operations monitoring technologies and methodologies using Splunk IT Service Intelligence (ITSI) Premium Application • Works with external teams to perform requirements gathering sessions to develop the scope and design of new and … existing content to include glass tables, dashboards, alerts, reports, and data sources to fulfill IT Operations monitoring • Discovers and mines data to develop meaningful insights into IT Operations • Develops visualization dashboards and indicators that identify anomalous activities using statistical behavior models, and machine learning • Integrating Splunk with a wide variety of legacy data sources and industry leading commercial security More ❯
well-established organisation based in Reigate; due to continued growth and expansion they are looking to recruit a 2nd Line Support Engineer. Responsibilities include: Under the guidance of the Network Manager: Provide Specialist IT support that ensures the site establishes and maintains high quality facilities. Assist the Network Manager in the successful operation of the site Ability to … Active Directory, Azure AD, Microsoft 365 administration Ensure that Helpdesk tickets are updated and resolved in a timely fashion in line with the SLAs. Follow standard practises to run networkmonitoring reports or utilities. Update asset lists or equivalent records for hardware and software on site. Follow processes and tasks described in sites disaster recovery and maintenance plans. … support, IT helpdesk, Active Directory, AD, Azure AD, Microsoft 365, Office 365, user accounts, site servers, cloud platforms, networks, networking, IT networks, Specialist IT support, malware, malware protection, logs, network manager, helpdesk logging, PC’s, PC support, Microsoft, Cisco, Aruba, Apple, networked, network manager, Reigate More ❯
Employment Type: Permanent
Salary: £30000 - £33000/annum plus excellent benefits
well-established organisation based in Reigate; due to continued growth and expansion they are looking to recruit a 2nd Line Support Engineer. Responsibilities include: Under the guidance of the Network Manager: Provide Specialist IT support that ensures the site establishes and maintains high quality facilities. Assist the Network Manager in the successful operation of the site Ability to … Active Directory, Azure AD, Microsoft 365 administration Ensure that Helpdesk tickets are updated and resolved in a timely fashion in line with the SLAs. Follow standard practises to run networkmonitoring reports or utilities. Update asset lists or equivalent records for hardware and software on site. Follow processes and tasks described in sites disaster recovery and maintenance plans. … support, IT helpdesk, Active Directory, AD, Azure AD, Microsoft 365, Office 365, user accounts, site servers, cloud platforms, networks, networking, IT networks, Specialist IT support, malware, malware protection, logs, network manager, helpdesk logging, PC’s, PC support, Microsoft, Cisco, Aruba, Apple, networked, network manager, Reigate More ❯
Job ID: R1034001 Job type: Permanent Time type: Full time Categories: Large & Complex Advisory More than you expected The UK member firms of Grant Thornton are part of global network of independent audit, tax and advisory firms, made up of some 76,000 in over 150 countries. We're a team of independent thinkers who put quality, inclusion and … develop along the way. Experience of scoping, delivering, and reporting on technology internal audits. Experience in assessing and testing technical security controls in areas such as firewalls, cloud configurations, networkmonitoring and antimalware solutions. Experience of auditing public (such as AWS Azure and Google Cloud) and/private (such as VMWare) cloud platforms. Experience with auditing ERPs such More ❯
version control tools (e.g., Git), Docker, and Kubernetes. Strong ownership, accountability, and communication skills. Bonus Points For: Experience leading projects in SCIF environments. Expertise in Cyber Analytics, PCAP, or network monitoring. Familiarity with Spark, Dask, Snowpark, Kafka, or task schedulers like Airflow and Celery. More ❯
Excellent communication skills in English, both written and verbal. Nice-to-Haves: Demonstrated experience leading project development efforts from a SCIF. Familiarity with cybersecurity analytics, including PCAP, CVEs, and network monitoring. Experience integrating with technologies such as Spark, Dask, Snowpark, or Kafka. Background in web application stacks (e.g., Flask, Django) or task schedulers (e.g., Airflow, Celery, Prefect). Compensation More ❯
obtain an (Interim Secret, Interim Top Secret) Because an active or interim DoD clearance is required, U.S. Citizenship is required Operate and maintain enterprise level NMS tools. Perform daily network updates/changes/moves as required. Monitor network for outages and performance issues. Coordinate with Sr. Network Administrator and Base to push changes to include configuration … and software updates. Specific tasks: • Network configuration and automation • Networkmonitoring and alerting • Common Troubleshooting • Policy and STIG compliance validation • Performance monitoring and analysis Associated tasks, include the following: • Bug and Vulnerability patching Required Skills: • Ability to clearly communicate and work with others • Cisco switch and router experience Desired Skills: • Experience with US Air Force data More ❯
Wigan, Greater Manchester, North West, United Kingdom
Baltic Apprenticeships
Are you fascinated by how networks operate and eager to start a career in IT infrastructure? Evolve is looking for a proactive and enthusiastic Network Engineer Apprentice to join their team and support the design, development, and maintenance of their internal systems and network infrastructure. In this role, youll gain hands-on experience working on real-world projects … across the business. With full support from your workplace mentor and structured training provided by Baltic Apprenticeships, youll develop the skills, knowledge, and confidence needed to succeed as a Network Engineer in todays digital world. If youre organised, technically curious, and ready to grow, this is your chance to build a strong foundation for a long-term career in … Full training and support will be provided by your workplace mentor and by the Baltic team. A Typical Day in the Job: Design, develop, and maintain internal systems and network infrastructure Assist with network expansion activities, including installation and configuration of switches, routers, servers, and access points Configure software to enhance security and support firewall upgrades Utilise networkMore ❯
specific to the program's objectives. • Strong systems administration skills for Windows and Linux operating systems . • Competent with VMWare. • Experience patching large numbers or servers and workstations across network infrastructure. • Automation, monitoring, and scheduled task management across large scale networks. • Monitoring, troubleshooting, and resolving communication issues across network boundaries. • Building in redundancy and failover within … network and application infrastructure. • Creating and configuring cloud compute, storage, and other cloud services in the system on AWS. • Knowledgeable in AWS CloudFormation scripts, CloudWatch, AWS console system administration to include operations and maintenance to include EC2, S3, Elastic Load Balancing, Auto-Scaling, and SNS. • Monitoring and renewing server certificates. • Maintaining network performance by performing networkmonitoring and analysis, and performance tuning; troubleshooting network problems. • Maintaining disaster recovery procedures and environment. • Supporting internal users if/when issues arise. • Familiarity with DevOps technologies. • Familiar with JIRA. • Knowledgeable with agile development practices. Required Education: B.S. Computer Science, Computer Engineering, Computer Information Systems, Computer Systems Engineering OR equivalent combination of education and experience. Optional Skills More ❯
Professional (SCP); Arcsight; Elastic Stack; RedSeal; ACAS; Linux+; CEH; Microsoft365 Fundamentals, SolarWinds NetFlow Traffic Analyzer Secondary Skills - Nice to Haves Data analysis Job Description . Our Analysis Team conducts network research and network analysis through AFNet monitoring and performance, and in support of 26NOS Operations Teams, 26NOS Senior Management and external USAF customers. Additionally, supports system assurance … and network availability through AFINC circuit utilization monitoring and reporting of bandwidth utilization and system availability utilizing enterprise level tools. Provide technical expertise in the area of enterprise networkmonitoring, performance analysis, capacity analysis, and provide recommendations on remediation and/or corrective action to maximize and maintain SLA. Monitor and report on deviations from established … network norms, perform root cause analysis, and provide recommendations on remediation actions as required. Work closely with the Operations teams, with Government, Industry engineers, and managers to advise them on operationally relevant status of assigned tasks. Generate, provide, and enable ad hoc and automated network performance reports and real-time analysis of the AFNet network for More ❯
design, installation and support of Distributed Antenna System (DAS), Small Cell, and 4G/5G Private Wireless Networks for Enterprise. We are seeking an Assistant Manager for our NOC (Network Operations Center) based in Greenville, South Carolina. Local candidates highly preferred who can work on-site. We are open to remote candidates who reside in the Tri- State area … of South Carolina, North Carolina and Tennessee depending on their experience with Fiber/Passive DAS (Distributed Antenna Systems) Network Operations Management. The NOC Assistant Manager plays a crucial role in shaping and optimizing the Network Operations Center (NOC) operational processes. This position is responsible for ensuring the efficient functioning of monitoring systems, overseeing NOC technicians, and … Assistant Manager leads project management initiatives to enhance NOC performance and service delivery. This strategic role goes beyond daily operations, focusing on leadership, mentorship, and the continuous improvement of network performance, service quality, and operational effectiveness. Key Responsibilities: Process Development and Management: Design, implement, and refine operational processes within the NOC to enhance efficiency and effectiveness. Develop and maintain More ❯
TS/SCI with CI Polygraph Requirements/Responsibilities: Experience evaluating systems and recommending changes to improve the systems' security posture Experience in penetration testing, red team, system/network configuration, and familiarity with different operating systems and virtualization platforms Willingness to obtain an associated certification such as CEH, PenTest, OSCP, OSCE, OSWE, or GPEN, if not already obtained … Knowledgeable in hacker/hacktivist group capabilities, intentions and methodologies Experience with incident handling procedures, network threat assessment, and analysis activities Knowledgeable in the security landscape (attack vectors, best practices, and mitigation) Experience using packet capture and analysis tools Experience using computer and network forensics techniques Knowledgeable in hardening techniques Experience in network and web related protocol … in conjunction with the Security Control Assessment (SCA) team to achieve ATO (Authorization to Operate) Perform application security testing on mission critical IC systems Identify and analyze anomalies in network traffic using metadata Ability to reconstruct a malicious attack or activity based on network traffic Assess network topology and device configurations identifying critical security concerns Perform networkMore ❯