Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP ). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Houston, Texas, United States Hybrid / WFH Options
Kavaliro
with protocols such as SAML, OAuth, OIDC, FIDO, PKI, JWT, LDAP, and Kerberos. Strong knowledge of common network protocols, including TCP/IP, HTTP/HTTPS, DNS, SMTP, SNMP, SSH, and VPN technologies. Expertise in encryption technologies (e.g., TLS, AES, RSA) and key management practices (e.g., KMS, HSM, PKI). Familiarity with firewalls, IDS/IPS, WAF, VPN, Routers, Switches More ❯
CI poly Desired • Experience in building processes for deploying to a Kubernetes based environment using Gitlab and Helm • Understanding of access management and security groups (i.e. IAM, S3 bucket, SSH, VPN, etc.) • Ability to write and use unit and functional testing More ❯
Directory, general networking, Email (MS Exchange, Spam filters) and security (Firewalls, IDS/IPS, encryption). Ability to use open-source software systems to improve engineering processes. Experience with SSH Server/Client and Key-based authentication. Demonstrates solid Networking skills. Experience with DevOps/software tool administration (e.g., Jenkins, Puppet) is a plus. Broad knowledge of engineering tools (compilers More ❯
via Ansible or other automation platforms. Thorough understanding and/or experience with Azure Cloud Services Knowledge of basic networking and network protocols (e.g. TCP/IP, routing, firewalls, SSH, VPNs) Hands-on experience with reviewing system logs and events to resolve issues. Develop and provide solutions to complex technical issues and problems that impact dev, test and production computing More ❯
Linux & Windows 10 development experience GIT, GitHub and collaborative software development Nice-to-Haves: AWS (S3, SageMaker, Lambdas) MLOps, CI/CD processes PyTorch-Ignite TypeScript & Semantic UI React SSH and secure deployment workflows Bonus Skills: JIRA & Confluence ClearML What We Value At Hawk-Eye, our culture is built on openness , collaboration , and technical excellence . Here's what we More ❯
experience • In depth knowledge of CND policies, procedures and regulations • In depth knowledge of TCP/IP protocols • In depth knowledge of standard protocols - ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc. • In depth knowledge and experience of Wifi networking • In depth knowledge and experience of network topologies - DMZ's, WAN's, etc. • Substantial knowledge of Splunk (or More ❯
CI poly Desired •Experience in building processes for deploying to a Kubernetes based environment using Gitlab and Helm •Understanding of access management and security groups (i.e. IAM, S3 bucket, SSH, VPN, etc.) •Ability to write and use unit and functional testing More ❯
Saint Petersburg, Florida, United States Hybrid / WFH Options
Pitisci & Associates
Experience managing Zero Trust platform (secure access service edge, browser proxy, etc) Network Configuration - Experience with iptables/nftables, WireGuard/OpenVPN, and DNS - Ability to configure and audit SSH, TLS, and firewall rules for least privilege access Zero Trust Model - Understand never trust, always verify and continuous authentication models - Implement device posture checks Identity and Access skills - Integrate with More ❯
as an extension of Tier 3 when resolving complex issues on Endpoint Devices (workstations, mobile devices) Implement and maintain PKI Infrastructures, server certificates, Certificate Authority, Secure DNS (DNS SEC), SSH, PGP, and AWS CLI Access keys. Perform operating system and VMware vSphere and Microsoft HyperV administration, account management, and provisioning activity. Install and setup Enterprise Database systems i.e. Oracle, Microsoft More ❯
Lexington, Massachusetts, United States Hybrid / WFH Options
Encode
access to on-site test hardware. Qualifications & Required Skills: - Active Secret Clearance (or higher). - Strong understanding of networking applications and protocols, including TCP/IP, DNS, NTP, DHCP, SSH, FTP, and HTTP/S (5 years of experience). - Proficiency in software documentation (5 years). - Extensive experience in C/C++ programming (15 years). - Development experience on More ❯
being conducted to a satisfactory level & are evidenced to a required level. * Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. * SSH Key Management. * Certificate management * HSM configuration/installation/support * Incident management * Change management * ITIL * Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Investigo
the operations, aligning with the Crypto strategy and wider departmental goals. Key Responsibilities Manage cryptographic hardware (HSMs - Thales, Entrust, Gemalto, etc.), including installation, configuration, and on-site activities Perform SSH key and certificate management Support cryptographic key lifecycle activities: generation, distribution, storage, recovery, and deletion Maintain accurate documentation and perform regular risk and compliance checks Handle incident, problem, and change More ❯
system utilization Use shell scripting to automate system maintenance tasks Configuring system logging, including remote logging Configure a system to provide networking services, including HTTP/HTTPS, DNS, SMTP, SSH and NTP Qualifications Minimum five to eight years' (5-8) experience in system administration of Linux-based servers and Linux-based workstations High School Diploma required; Bachelros degree preferred Ideal More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
system/application vulnerabilities, and compliance with Department of Defense (DoD) policies and procedures. • Applied knowledge of network topologies, protocols (e.g., TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB), and experience with tools like Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, Security Center. • Capable of attack reconstruction based on network traffic, integrating Threat Intelligence, and familiar with More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯
being conducted to a satisfactory level & are evidenced to a required level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and More ❯