or Microsoft 365. Troubleshooting in hybrid environments, managing service desk tickets, and providing both on-site and remote support. Experience in at least two of the following: Enterprise-level networksecurity technologies. Automation using SCCM and/or Intune. Microsoft 365 (Exchange, Teams, Defender). Microsoft Hosting Server solutions (Hyper-V, Windows Clusters). Managing Windows 10/ More ❯
redhat family OS, including RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and networksecurity best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps More ❯
redhat family OS, including RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and networksecurity best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps More ❯
Security Engineer Remote with occasional trave to their London office 10 - 12 month contract - starting in August Inside IR35 £450 - £475pd iO are working with an established and successful Consultancy in their search for an experienced NetworkSecurity Engineer They have a global presence providing expertise in Cloud, Security and Networking. They provide services from Strategy … and design through to implementation and support This position is critical for designing, implementing, managing, and optimizing the organization's complex network infrastructure, ensuring its stability, security, and scalability, particularly during critical transition and integration phases To be considered for this role you must have experience in the following: Palo Alto Networks Firewalls/Global Protect/decryption …/DLP Fortinet Juniper Routers/Firewalls Good with knowledge of network automations and infrastructure as code Terraform, Ansible and Git Interested in hearing more? Please get in touch with Rebecca Long on 0117 332 8100/r.long @ ioassociates.co.uk More ❯
Security Engineer Remote with occasional trave to their London office 10 - 12 month contract - starting in August Inside IR35 £450 - £475pd iO are working with an established and successful Consultancy in their search for an experienced NetworkSecurity Engineer They have a global presence providing expertise in Cloud, Security and Networking. They provide services from Strategy … and design through to implementation and support This position is critical for designing, implementing, managing, and optimizing the organization's complex network infrastructure, ensuring its stability, security, and scalability, particularly during critical transition and integration phases To be considered for this role you must have experience in the following: Palo Alto Networks Firewalls/Global Protect/decryption …/DLP Fortinet Juniper Routers/Firewalls Good with knowledge of network automations and infrastructure as code Terraform, Ansible and Git Interested in hearing more? Please get in touch with Rebecca Long on 0117 332 8100/r.long @ ioassociates.co.uk More ❯
Job Number: 304 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (304) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 120K- 130K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Develop new tradecraft needed to perform this analysis as technologies … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 301 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (301) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 120K- 130K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Develop new tradecraft needed to perform this analysis as technologies … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 257 Job Category: GovTech Job Title: TARGET DIGITAL NETWORK ANALYST (257) - UTAH - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Draper UT Salary: 190K-230K Background Conducting advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets … tasking, and analysis Identifying intelligence gaps to tailor current collection or enable new collection to close the gaps; employing multiple analysis disciplines such as pattern recognition against targets' communications, network usage and digital footprints Applying knowledge and understanding of IC needs and missions, as well as the targets' culture, behaviors, and communications technologies Mentoring other analysts on the tools … Relevant experience must be in computer or information systems design/development/analysis roles may include may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Excellent communication and collaboration skills to interface across NSA More ❯
Job Description 2nd Line NetworkSecurity Engineer Location: Bracknell This role is shift-based We are seeking a shift-based engineer to provide 24x7x365 support for gateway, sensor, and DHCP technologies. The role involves technical oversight and guidance for shift technicians managing security enforcement devices, resolving complex faults, and liaising with Third Line support for escalations. Our … purpose is to make the world more sustainable by building trust in society through innovation. As a Security Engineer, you will contribute by ensuring the operational effectiveness of our security technologies. Your role Your responsibilities include providing continuous support for gateway, sensor, and DHCP technologies, offering technical oversight and expertise to shift technicians responsible for managing security … complex faults, liaise with the Third Line team for escalations, and cover technician responsibilities when needed. Your experience Experience in technical support within a service operations environment. Understanding of network concepts such as communication protocols and security technologies. Good communication skills. Ability to develop positive working relationships across teams to achieve business objectives. Please note: It's worth More ❯
Job Number: 303 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (303) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing … detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis as … + 2 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 302 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 2 (302) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing … detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis as … + 2 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 308 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (308) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Annapolis Junction MD Salary: 150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 4 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 395 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 4 (395) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: AK Anchorage Salary: 210K -215K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 7 yrs Relevant experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 312 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (312) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in … developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this analysis … + 4 yrs Relevant experience must be in computer or information systems design/development/analysis. May also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area More ❯
Job Number: 305 Job Category: GovTech Job Title: DIGITAL NETWORK EXPLOITATION ANALYST 3 (305) - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Annapolis Junction MD Salary: 150K -154K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist … in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network Involved in developing new tradecraft needed to perform this … yrs Relevant experience must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such More ❯
Generali Operations Service Platform S.r.l., Branch Office Germany NetworkSecurity Expert (m/f/d) Overview The Generali Operations Service Platform (GOSP) supports the Generali Group in optimizing its digital services, its service quality and the creation of synergies. GOSP uses common technology platforms for the Group. As a joint venture partner, Accenture provides expertise to support … transformation, innovation and scaling. GOSP develops solutions for digitalization and the introduction of a cloud-centric model. GOSP includes IT infrastructure, procurement, and security operations, among others. That is the job GOSP - Generali Operations Service Platform is a joint-venture between Generali and Accenture and provides IT and Procurement services to Generali Group companies. Our purpose is to accelerate … innovation and digitization strategy through the Cloud and shared platforms. Based in Italy it has 5 branches across Europe and employs about 1.000 people. We are looking for a NetworkSecurity Expert (m/f/d) to strengthen the Perimeter Security group and to contribute to increase the NetworkSecurity posture of Generali Group. More ❯
Belay is hiring Digital Network Exploitation Analysts (DNEA) to support a brand new contract! The DNEA evaluates target opportunities and strategizes activities against particular networks using all source data to understand and map target networks and assist in developing detailed exploitation and operations plans. The Digital Network Exploitation Analyst will have a solid understanding of logical/physical … IP core infrastructure, communication devices and how they connect to networks, and the traffic movements in a network; has a working knowledge of the principles and methods used to identify, collect, analyze process and disseminate information in accordance with established requirements and priorities; possesses an understanding of and experience in the SIGINT disciplines of collection, target development, and tasking … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such More ❯
Security Control Assessor (Authorizing Official) Position Summary: As Security Control Assessor (Authorizing Official/AO) you will provide cybersecurity support to the National Geospatial-Intelligence Agency (NGA) in Springfield, VA. You will award authorization to operate (ATO) for systems and/or networks based on the determination of acceptable risk. Clearance Requirement: Must have an active DoD Top … Secret/SCI security clearance Essential Functions and Responsibilities: Manage and approve accreditation packages (e.g., ISO/IEC 15026- 2). Establish acceptable limits for the software application, network, or system. Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. Manage accreditation packages (e.g. … year of full-time professional experience in establishing, implementing, and tracking project plans (more experience required for sr. level openings). Knowledge of computer networking concepts and protocols, and networksecurity methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk) Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. More ❯
runs a globally distributed environment, operating at massive levels of scale. Businesses, from start-ups to enterprises, run their operations and applications on AWS' multi-tenant infrastructure About Amazon Security Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates … to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying. Why Amazon Security? At Amazon, security is central to maintaining customer trust and delivering delightful customer experiences. Our organization is responsible for creating and maintaining a high bar for security across … all of Amazon's products and services. We offer talented security professionals the chance to accelerate their careers with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations, and physical stores. Inclusive Team Culture In Amazon Security, it's in our nature to learn and be curious. Ongoing DEI events More ❯
runs a globally distributed environment, operating at massive levels of scale. Businesses, from start-ups to enterprises, run their operations and applications on AWS' multi-tenant infrastructure About Amazon Security Diverse Experiences Amazon Security values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates … to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying. Why Amazon Security? At Amazon, security is central to maintaining customer trust and delivering delightful customer experiences. Our organization is responsible for creating and maintaining a high bar for security across … all of Amazon's products and services. We offer talented security professionals the chance to accelerate their careers with opportunities to build experience in a wide variety of areas including cloud, devices, retail, entertainment, healthcare, operations, and physical stores. Inclusive Team Culture In Amazon Security, it's in our nature to learn and be curious. Ongoing DEI events More ❯
Network & Security Engineer - Belgium - Remote! Your role: You will be the subject matter expert in networking within the operations team, and be the main point of contact for clients for their network infrastructure & security Responsible for leading projects related to network and security solutions for clients Designing and overseeing implementation of network and … s or higher degree in IT, Computer Science, or other related fields 5+ years' experience in similar roles Strong knowledge in Wi-Fi and Networking (Routers, Switches, Wireless Networks, Network Access Control, Load Balancing, Software Defined Network) with Juniper, Huawei, or Cisco Experience in security and firewalling with Fortinet, Palo Alto, and/or ZScaler will be More ❯
the signal.The Protocol Analyst shall possess the following capabilities: The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Requirements Position requires a security clearance with successful polygraph. Associate's Degree with 10 years … be in Engineering, Mathematics, Computer Science, a Physical Science, or related technical field Relevant experience must be in signals analysis, including protocol analysis, and preferably related to communication signals, network troubleshooting, network traffic characterization, and/or networksecurity analysis More ❯
Cisco SDA Network Consultant - London 2 days per week - SC Cleared - Inside scope of IR35 TrinIT Talent are looking for a Cisco SDA Network Consultant to come on board for a 6 month contract based in London 2 days per week. This role falls In Scope of IR35 and is paying £600 per day. - Design/Deploy Cisco … SDA solutions - DNA Centre & Identity Services Engine (ISE) - Develop network segmentation strategies to enhance security and compliance. - Integrate Cisco SDA with existing network infrastructure - Strong networking protocols experience, including TCP/IP, BGP, OSPF, and MPLS. - Network automation tools and Scripting (Python, Ansible, etc.). - Strong experience in networksecurity principles - Firewall management, intrusion … sending your CV in Word format to (see below) TrinIT Talent will consider applications based only on skills and ability and will not discriminate on any grounds. Cisco SDA Network Consultant - London 2 days per week - SC Cleared - Inside scope of IR35 More ❯
a System Vulnerability Analyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems. You will compare and contrast various system attack techniques and develop operationally effective countermeasures. … missions being studied. The Level 3 SVA shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the … experience. Analyst should be comfortable with network analysis, network anomaly detection, IOC's, Mitre Att&ck framework, AMOD tools experience, and be able to analyze data to discover malicious or unauthorized activity collected from various sources. Qualifications: Doctoral degree with 2 years of relevant experience Master's degree with 3 years of relevant experience Bachelor's Degree with More ❯