methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs) Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions Desired Qualifications: Active CISSP certification strongly desires ITIL 4 Foundation certification Demonstrated current and significant relationships with NIH, HHS or more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. DoD 8570 compliance with IASAE Level 2 or 3. more »
environment. Preferred Qualifications: Five (5) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, publickeyinfrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes more »
Linux operating systems: Oracle Linux (Red Hat, CentOS) Systematic problem-solving approach, strong communication skills, a sense of ownership and drive Solid understanding of PKI, mTLS, SSL, SSH Experience with Agile Development (Scrum or Kanban) Experience with production operations and good practices for putting quality code in production and troubleshoot more »
routing, switching, and firewall principles and protocols. Experience with SDN, DPDK and SR-IOV would be a plus. Security tools and practices: Configuration of PKI, certificates, HashiCorp Vault, and software supply chain security, in the context of cloud and Kubernetes environments. CI/CD: Expertise in integrating with a GitOps more »
Greater London, England, United Kingdom Hybrid / WFH Options
Made Tech
cloud-based tooling Up-to-date understanding of network security (e.g. OSI, TCP/IP), web application security (e.g. OWASP) and cryptographic controls (e.g. PKI, TLS) Up-to-date understanding of identity management and authentication/authorisation products and patterns Evidence of self-development – we value keen learners Drive to more »
interconnect. Familiar in multi-factor authentication platforms and solutions, and Identity Management such as OpenID, LDAP, and Kerberos. Security implementations using multi-factor authentication, PKI, or Kerberos and Unix OS hardening to DoD STIG standards. Experience programming or troubleshooting Python code Experience with supporting Apache Web Server Experience with Zabbix more »
PKI Architect Remote Contract **A national security clearance is required for this role but candidates not holding this level of clearance will be considered** Leading Managed Services Provider in the Defence Sector require a PKI Architect to join their successful Practice. A sound and extensive knowledge of PKI and Cryptography … technology and Key Management Server (KMS) technology. Expert level experience in cloud solution development with Azure or AWS architectures as is related to PKI management. Extensive Cryptography & PKI solution design experience (HLD & LLD) required. If you are interested please apply via this ad in the first instance or send more »
experience is below: IT Engineering up to at least 2nd Line, ideally 3rd line too Experience with Cyber related technologies e.g IDAM, AD (PKI is Preferred but not essential) Secure systems and Environments Strong attention to detail Customer focused, support focused environment. Experience in a fast-paced MSP is more »
Management Framework security controls. Performs Staff Assistance Visits to subordinate and Tenant unit ISSO programs. Acts as Site Trusted Agent for SCI PublicKeyInfrastructure issue and control. Writes, staffs, and submits Security Impact Analysis reports for HHQ approval. Manages Site REMWAR Program for the use of more »
CD tools such as Artifactory, Jenkins, and GIT Cloud native applications, including Terraform experience Technologies used to support microservices Encryption technologies (SSL/TLS, PKIInfrastructure management) Security controls as applied to software technologies Bachelor's degree in a related area 10+ years of related experience 10 years experience more »
CD tools such as Artifactory, Jenkins, and GIT Cloud native applications, including Terraform experience Technologies used to support microservices Encryption technologies (SSL/TLS, PKIInfrastructure management) Security controls as applied to software technologies Bachelor's degree in a related area 10+ years of related experience 10 years experience more »
Live System. You will be sponsored through DV+ for this role, but active DV is required to start. Essential skills 3rd Line Support experience PKI Understanding of Networks DV clearance If you are interested in discussing this Wintel Engineer role further, please send your updated CV to (url removed) CBSbutler more »
Live System. You will be sponsored through DV+ for this role, but active DV is required to start. Essential skills 3rd Line Support experience PKI Understanding of Networks DV clearance If you are interested in discussing this Wintel Engineer role further, please send your updated CV to (url removed) CBSbutler more »
Live System. You will be sponsored through DV+ for this role, but active DV is required to start. Essential skills 3rd Line Support experience PKI Understanding of Networks DV clearance If you are interested in discussing this Wintel Engineer role further, please send your updated CV to (url removed) CBSbutler more »