for the design, implementation, maintenance, and optimization of Distributed File Systems across enterprise environments, including the administration of File Share services through the control of permissions via Active Directory security groups. This role ensures high availability, scalability, and performance of file storage systems, supporting business continuity and data integrity. Key Responsibilities: Design and deploy DFS architectures using technologies such … replication groups, and file shares. Troubleshoot DFS-related issues including replication failures, namespace inconsistencies, and performance bottlenecks. Knowledge and experience on AD & OU's Implement and maintain file system security, access controls, and auditing. Collaborate with network, security, and application teams to ensure seamless integration. Experience and knowledge on Windows File share & Managed folders. Perform capacity planning More ❯
leading with Zero Trust Privileged Access Management (PAM), we help our customers achieve secure, dynamic, and fine-grained control over access to their most sensitive resources. This focus on security has earned us an industry-leading 98% customer retention rate. Once a customer, forever a fan. That's our goal. When you work at StrongDM, you join a team … committed to solving today's security challenges with technology that works and customers who trust us to protect their most critical assets. If you ask anyone at StrongDM, you'll find that our values truly guide everything we do-from how we innovate to how we treat each other. These values are the foundation of our culture and define … Coordinate with Product Management, Engineering, Customer Success, and Support to fully address a prospect's technical issues Be the technical voice of the field for all things related to security, compliance, and privileged access management Requirements: Technical - Infectious enthusiasm for technology and cybersecurity. A demonstrated willingness to master things you may know nothing about. Don't know how to More ❯
edge of Cyber Security. Ideal candidates should be able to demonstrate strong design and coding skills, a desire to explore ideas, and, above all, have a passion for quality. Security will be paramount in development so this role will suit a candidate wanting to build a career in developing high-integrity software, aligned to functional correctness, predicated upon formally … experience RUST and Ada SPARK experience Cryptol and SAW experience Proficiency with scripting languages (ruby, groovy, python, Perl, bash, PowerShell) Practical experience in developing applications for Microsoft Windows Computer networksecurity and vulnerability analysis Conversant with IP standards Multi-threaded RTOS and bare metal embedded experience Background in a range of CPU/MPU’s with practical experience … in ARM based architectures These roles require candidates to be a British Citizen as well as obtaining and retaining an unconditional DV security clearance. Remuneration: £40,000 - £75,000 Pension Flexible working hours. A comprehensive relocation package is available Location: Belper, Derbyshire If you think you’ve got what it takes, we’d love to hear from you More ❯
Winfrith Newburgh, Dorchester, Dorset, England, United Kingdom
Hays Specialist Recruitment Limited
Your new company Located between Poole and Dorchester, this well-established company is looking for a skilled and ambitious professional to join its Network team. If you're looking for an employer that values growth and supports your development by covering training and certification costs, this could be the right opportunity for you. Your new role In this role … will cover troubleshooting, maintenance, and support across various systems, with a 70/30 split between project work and BAU tasks. With a robust five-year roadmap packed with network upgrades, there's plenty to get stuck into. You'll be part of a fantastic team of six high-level network engineers who are always ready to lend … a hand and support their colleagues. What you'll need to succeed Cisco CCNA/CCNP Qualified Strong working knowledge of proactive monitoring tools such as SolarWinds Proven Network architect knowledge, design and project implementation Experience with networksecurity such as certificate management in applications Strong/Expert knowledge in virtualisation technologies such as VMWare Experience with More ❯
their capabilities. Our Penetration Testers work with organisations of all sizes and types to detect and remediate vulnerabilities. They help identify areas lacking sufficient protection. The team tests the security of infrastructure and applications, conducts IT Health Checks, reviews IT configurations, identifies gaps that threat actors could exploit, and makes recommendations to safeguard assets. What you'll be doing … to internal and external stakeholders. Leading the delivery of PGI's infrastructure penetration testing. Collaborating on the design and delivery of new and existing service lines related to offensive security assessments. Supporting and often leading technical pre-sales, proposal writing, and client engagements. Coaching and supervising junior team members, including resource management, development planning, mentoring, and knowledge transfer. Analyzing … security data to identify patterns, threats, and vulnerabilities. Producing high-quality technical reports that explain vulnerabilities in non-technical language for stakeholders. Performing quality assurance and peer reviews of project reports. Collaborating with colleagues on internal or client projects. Contributing to technical training and development materials. Supporting technical delivery projects to ensure successful outcomes. Mentoring security consultants or More ❯
exciting opportunity to serve as a Subject Matter Expert (SME) in Windows-based enterprise infrastructures. You'll play a central role in the design, deployment, and support of high-security systems that underpin key defence and aerospace operations. Your Impact Take ownership of complex technical issues through to resolution, collaborating with users and other IT teams. Provide expert-level … support, ensuring consistent and minimal disruption to services. Deploy and integrate secure Windows Server environments (Active Directory, Group Policy, DNS, DHCP) using industry best practices. Implement and maintain infrastructure security measures such as patching, access controls, and hardening to align with compliance and internal governance. Use monitoring tools to proactively optimize system performance and ensure high availability. Create and … maintain detailed technical documentation and contribute to internal knowledge sharing and mentoring. Participate in IT projects, ensuring infrastructure design meets both technical and business objectives. Collaborate closely with network, security, and application teams to deliver reliable, secure IT services. What you'll bring: Proficiency in Ivanti Application & Device Control or similar lockdown tools. Experience working with high-securityMore ❯
IaC). Monitor and optimize cloud infrastructure performance, ensuring high availability and disaster recovery. Collaborate with development teams to ensure seamless integration and deployment of applications. Implement and manage security best practices and compliance requirements in cloud environments. Troubleshoot and resolve issues related to cloud infrastructure and CI/CD pipelines. Stay up to date with the latest industry … development, design, and integration efforts. Leadership of agile programs and waterfall methodologies. Excellent problem-solving skills and the ability to work in a fast-paced environment. Maintain Top Secret security clearance which requires U.S. Citizenship. Qualifications: Bachelor's Degree and a minimum of 12 years of software experience. Graduate Degree and a minimum of 10 years of software experience. … In lieu of a degree, minimum of 16 years of software experience. Have the ability to obtain and maintain a Top Secret Security Clearance, which requires U.S. Citizenship. 8+ years of experience in a lead DevOps engineering role with complex designs. 5 years experience with AWS and Azure cloud platforms. 5 years scripting languages such as Python, Bash, or More ❯
and maintain automation scripts to increase system efficiency and reduce repetitive manual tasks. Manage and maintain existing Linux based servers, both on-prem and cloud hosted, including management of security patches, distribution upgrades and configuration management systems/codebases, installation/configuration/operation of the applications running on the servers. Be part of the on 24x7 on call … Virtualization VmWare/Veeam Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Core internet applications protocols DHCP/DNS Scripting Python/Perl/Bash Application and networksecurity best practices SSH/Iptables/TLS Hardware management Server racking/Storage Required knowledge Containerisation - Docker/Kubernetes AWS EC2/VPC/RDS/EKS More ❯
and maintain automation scripts to increase system efficiency and reduce repetitive manual tasks. Manage and maintain existing Linux based servers, both on-prem and cloud hosted, including management of security patches, distribution upgrades and configuration management systems/codebases, installation/configuration/operation of the applications running on the servers. Be part of the on 24x7 on call … Virtualization – VmWare/Veeam Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Core internet applications protocols – DHCP/DNS Scripting – Python/Perl/Bash Application and networksecurity best practices – SSH/Iptables/TLS Hardware management – Server racking/Storage Required knowledge Containerisation - Docker/Kubernetes AWS – EC2/VPC/RDS/EKS More ❯
but not limited to: Linux, VMware, AWS, Containers, Kubernetes, Docker, Ansible, Terraform, PostgreSQL, Cybersecurity, Monitoring Systems Icinga2 & Elastic Stack, Core Internet Application Protocols – DHCP/DNS, Scripting, Application and NetworkSecurity best practices – SSH/Iptables/TLS Previous experience and alignment to Gigaclear’s approach to leading, managing, supporting, training, mentoring, and developing your team is key. More ❯
software engineering or related discipline. • Comprehensive expertise in software engineering and architecture. • Ability to understand business requirements and translate them into high level architectures and technical specifications. • Understanding of network technology and design. • In depth understanding of software architecture principles such as design patterns and microservices. • Understanding of cloud technologies, cloud native architecture and cloud integration with telco services. … Kafka and RabbitMQ. • Experience designing and interfacing with user portals. • Experience with monitoring, telemetry and observability technology and patterns. • Understanding of BSS/OSS systems and their integration with network infrastructure. • Experience with agile development methodologies and ways of working. • Awareness of software and networksecurity best practices. What will help you on the job • Knowledge of More ❯
leader who thrives in a dynamic environment. Proven experience managing 2nd/3rd Line Support Teams across diverse technical areas. Expertise in Wintel virtualization, VMWare, Azure Cloud operations, and networksecurity infrastructure (Checkpoint, Cisco Meraki SD-WAN). Strong working knowledge of Windows Server and desktop operating systems, with experience in scripting languages like PowerShell. Familiarity with ITSM More ❯
Services, Support Services, Consulting Services and Technical Services. Advanced understanding of platform delivered services and how to articulate the value of standardized, centralized and optimized services. Strong knowledge of networksecurity principles and products. Advanced understanding of broader IT infrastructure components, such as servers, storage, virtualization, and data centers. Conversant with a business outcome led approach to sales. More ❯
Experience must be working in a security domain (e.g., cyber security, networksecurity, information systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, and/or using networksecurity intrusion or computer network diagnostic software utilities More ❯
Cyber Security Analyst Advisor (Cyber Operations Support) McLean, VA Demonstrate Experience with computer network infrastructure Demonstrate Experience with networksecurity concepts Demonstrate Experience with network exploitation/attack Demonstrate Experience with computer and network operation systems (e.g. windows, Linux, OSX, Citrix) and hardware/network management tools, and protocol (e.g. TCP/IP More ❯
Are you passionate about network & security and ready to take on an exciting role in a global company? Join a prominent logistics and supply chain management company that offers a wide range of services, including road, air, sea, and warehouse logistics. They are currently seeking for a Network & Security engineer who will be responsible for deploying … administering, and supporting cutting-edge global networks and security systems. If you're looking to make a real impact, work with the latest technology, and grow your career, this is the perfect opportunity for you. Want to learn more about this opportunity? Feel free to reach out and apply today! Responsibilities : Deploy, administer, and maintain network and security platforms (routers, switches, firewalls, VPNs, and more). Conduct diagnostics to ensure maximum reliability across Cisco-based technologies. Monitor network traffic and optimize performance for enhanced efficiency and security. Implement remote access and VPN solutions, and manage PKI certificates. Collaborate with IT and security teams to integrate security measures into new systems and applications. Provide BAU More ❯
N etworking Security Engineer To £70k + Benefits + Training + Supportive Culture Based: Manchester Who's it for We are proud to be partnering with a leading tech employer with headquarters in Manchester. A business driven by both technology and great service, they now require a networksecurity engineer to help support and develop their internal … IT networksecurity capability. Employing over 500 IT staff they offer an amazing career opportunity, coupled with an award winning culture, brilliant training and support across all your certification pathways. The role The networksecurity engineer will be a highly skilled individual aimed at designing, maintaining, and improving the overall networksecurity posture of … primarily). You will implement policies and procedures to aid other engineers to maintain secure delivery of support issues and projects. This is a hands-on role that delivers networksecurity to a level that can deflect most if not all attacks aimed at the network infrastructure. This role reports directly into a Senior Networking Operations Manager More ❯
Digital Network Exploitation Analyst Level 3 - Clearance Required Please note, this position requires all candidates to currently possess an active Top-Secret SCI Clearance with a Polygraph. This position is not an opportunity to be sponsored or nominated for a government security clearance. Minimum Qualifications: • A current Top-Secret/SCI government security clearance with polygraph is … in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). (U) Information Technology (IT) and Information Security (IS) degrees … Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such More ❯
population, they continue to set the standard as the UK's best mobile network. Ready to take the next step in your career? Apply today! Responsibilities: Provide 3rd line networksecurity support, troubleshooting and resolving complex issues Work with Fortinet, Palo Alto, Cisco, or Checkpoint (strong expertise in at least one required) Operate in a highly secure environment … SC Clearable candidates preferred) Follow a DuPont shift pattern, ensuring 24/7 coverage of networksecurity operations Collaborate with cross-functional teams on security implementations, upgrades, and incident response Required Skills/Qualifications: Experience in a 3rd line networksecurity role, handling complex troubleshooting and support Strong skills in at least one of the … office) = 1 Day Off This cycle repeats every 4 weeks. Benefits: Hybrid shift model: Nights worked from home, days onsite in Sheffield, Belfast, or Hatfield Work on cutting-edge networksecurity solutions in a high-security environment A structured shift pattern with regular extended time off Salary: £55,000 - £65,000 base salary + £10,000 shift More ❯
Our Arlington VA based client is looking for Network Based Systems Analyst. If you are qualified for this position, please email your updated resume in word format to Responsibilities: • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources • Coordinate with enterprise-wide cyber defense staff to validate network alerts • Perform … correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack • Provide daily summary reports of network events and activity relevant to cyber defense practices Receive and analyze network alerts from various sources within the enterprise and determine possible causes of alerts • Provide timely detection … and analysis of system activity to identify malicious activity • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information - Identify and analyze anomalies in network traffic using metadata - Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools - Identify applications and operating systems of a network device based on More ❯
innovators. The ingenuity of our developers, engineers, cyber experts, linguists, and analysts are dedicated to empowering our clients, fulfilling The Mission, and remaining trusted leaders and advisers in national security and technology solutions. We are looking for a Computer Network Defense Analyst (CNDA)to join a growing team in multiple location such as Annapolis Junction, MD and Salt … Lake City, UT. Responsibilities: Use information collected from a variety of sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or … wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Requirements: Bachelor's Degree in Network Engineering, System Engineering or related field. At least 5 years demonstrated experience within the Department of Defense (DoD) as a Computer Network Defense Analyst. CNDAs must have experience More ❯
before - the things the nation and the world are counting on us to deliver. Join the transformation and help us make this impact now. We are seeking a Computer Network Defense Analyst (CNDA) to join our team. The CNDA must be experienced in security concepts/network defense, network and routing protocols, and traffic analysis/… details and apply to make the most out of your career. You'd like to do this Computer or information systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Network or system administration. Use information collected from a variety of sources (e.g. … intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur. You're required to have this Level 1 Bachelor's degree 2 years of relevant experience 2 additional years of experience may be substituted if you have an associates degree. Level More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Catorfaen
SEP2 Limited Per Hour Primary Function: The Project Delivery Engineer role will be responsible for service implementation of hardware installation and network/security configurations in a hands - on capacity . This role has a strong focus on being a customer facing technical engineer primarily focused on UK customers, with international service delivery as required . The role … on Check Point as a field engineer Is responsible for delivering implementation tasks, assigned by the project lead including but not limited to physical installation of equipment, power and network cabling, management configuration and licensing of product Can understand statement of work documentation created by SEP2 containing a set of project deliverables Will be available to travel out to … call through to technical delivery and completion Can write effective statement of work documentation using SEP2 template tools with customisation as required per project The ability to troubleshoot complex network/security scenarios , resulting in either a resolution of the configuration on the to-be-installed device, or recommendations to the customer surrounding their wider network topology More ❯
Opticore IT is a specialist Network Engineer and Project Management consultancy offering a wide variety of opportunities to work within fast-paced, challenging environments across our client base spanning multiple sectors including Finance, Broadcast Media, Telecommunications, and more. Opticore IT is currently searching for a Senior NetworkSecurity Engineer to support our client in a critical migration … project from a cloud-based proxy solution (Netskope) to an on-premise proxy infrastructure. This role requires deep technical expertise in proxy technologies, a solid security mindset, and familiarity with automation practices. You will join our excellent team, based in the London area, on an initial 6-month contract, inside IR35, with scope to extend . The role requires … efficient traffic control. Configuring and managing advanced features such as SSL inspection, re-termination, web sockets, and custom policy creation. Ensuring granular control over web traffic and enforcing enterprise security standards. Providing strategic guidance on multi-product proxy environments, identifying potential compatibility or integration challenges. Supporting automation of policy deployment and configuration tasks where feasible. Collaborating with stakeholders to More ❯
Product Development 4. Sales and Pre-sales Management 5. Project Leadership and Coordination Requirements: 1. Experience of customer facing role like Presales, sales, or consultant. 2. Knowledge:- Knowledge in network or security products such as Cisco, Palo Alto, Fortinet, Zscaler, CrowdStrike, CATO and other equivalent vendors/service providers. 3. Knowledge of new technologies of Enterprise IT solutions More ❯