engagements. RFP Responses: Assist in responding to RFIs and RFPs, ensuring alignment with customer requirements and CyberArk capabilities. Qualifications Knowledge of cryptographic security technologies such as SSL/TLS, SSH, PKI, and HSMs . Strong understanding of enterprise IT environments, including Windows Server, Linux/Unix, Active Directory/LDAP, load balancers, web servers, virtualization, and endpoint security . Familiarity More ❯
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Hands-on DevOps delivery experience working on digital or technology projects at a leading consultancy, agency, or government organization. AWS or Azure certification, or willingness to attain More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Birmingham, West Midlands (County), United Kingdom
Syntax Consultancy Ltd
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Experience with Windows Group Policy Objects and access/permissions control via GPO. More ❯
Linux operating systems. MS Active Directory configuration and management. Firewall and switch configuration and patch management. Understanding of network topologies and common network protocols and services (DNS, HTTP(S), SSH, FTP, SMTP). Hands-on DevOps delivery experience working on digital or technology projects at a leading consultancy, agency, or government organization. AWS or Azure certification, or willingness to attain More ❯
Stoke-on-Trent, Staffordshire, UK Hybrid / WFH Options
GivEnergy
in our AWS environment. What We’re Looking For: >3 years’ development experience An understanding and competence in: JavaScript/TypeScript (Node.js) REST APIs, Basic Linux commands, (use case: ssh onto a server to run code) MongoDB AWS (RDS, EC2, ECS, S3, Lambda, DNS, Basic Network routing on AWS) Basic Docker understanding VCS (Git) Automation & CI/CD pipelines ( Github More ❯
with log aggregation tools used for audit log purposes from all sources, including Linux and Windows systems, Networking equipment, and applications Experience with public key infrastructure (PKI), secureshell (ssh) configuration and troubleshooting, sssd, httpd Experience with Amazon Web Services or other cloud technologies Experience deploying SAN storage preferably from IBM (GPFS) 2 , Experience bootstrapping HPE servers, configuring storage, iLO More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols DHCP/DNS Monitoring Systems Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
RHEL, Alma and some legacy CentOS Core internet applications protocols – DHCP/DNS Monitoring Systems – Icinga2/Elastic Stack/InfluxDB/Grafana Application and network security best practices – SSH/Iptables/TLS AWS (EC2/VPS/RDS/EKS/S3) Terraform Databases – PostgreSQL/MySQL CI/CD and DevOps Tools/principles About Us Gigaclear More ❯
STAR 2281 TBD - No LCAT Specified Position Requires ACTIVE TS/SCI Clearance with Polygraph No Level Required Chantilly The maximum number of FTEs is 0.5 (either .5 for a 1-year period or 1.0 for a 6-month period More ❯
Linux-based systems (primarily Ubuntu, CentOS, RHEL, etc.) Troubleshoot and resolve hardware, software, and networking issues in physical and virtual environments Manage user access, permissions, and authentication (e.g., LDAP, SSH, Sudo policies) Monitor system performance and health; perform regular updates, patches, and backups Assist in deployment, configuration, and maintenance of servers and critical applications Document processes, procedures, and configurations in More ❯
Linux, VMware, AWS, Containers, Kubernetes, Docker, Ansible, Terraform, PostgreSQL, Cybersecurity, Monitoring Systems Icinga2 & Elastic Stack, Core Internet Application Protocols – DHCP/DNS, Scripting, Application and Network Security best practices – SSH/Iptables/TLS Previous experience and alignment to Gigaclear’s approach to leading, managing, supporting, training, mentoring, and developing your team is key. Gigaclear is a growing Fibre Broadband More ❯
Linux, VMware, AWS, Containers, Kubernetes, Docker, Ansible, Terraform, PostgreSQL, Cybersecurity, Monitoring Systems Icinga2 & Elastic Stack, Core Internet Application Protocols - DHCP/DNS, Scripting, Application and Network Security best practices - SSH/Iptables/TLS Previous experience and alignment to Gigaclear’s approach to leading, managing, supporting, training, mentoring, and developing your team is key. igaclear is a growing Fibre Broadband More ❯
anomalies to discover new threat actors and taking operational actions to achieve mission requirements. You should be comfortable working in a Linux (CentOS/Debian/Ubuntu) environment, using SSH and being able to conduct regular Linux system administration, configuration and maintenance tasks. You will be able to help improve existing Standard Operating Procedures (SOPs) and documentation. You should have More ❯
Role Description : As an Operational Security Officer for IBM Mainframe Z Series, your primary role is to maintain and improve the overall security posture of the organization's IT infrastructure that is based on IBM Mainframe Z Series technology. You More ❯
network vulnerabilities including: IP spoofing Use of default credentials Open/unused ports Unencrypted communication protocols (e.g., Telnet, SNMPv1) Missing firmware or OS-level patches Enforce secure alternatives like SSH and SNMPv3 , and ensure TLS 1.2/1.3 is implemented for encrypted communications. Apply hardening techniques across firewalls, routers, and switches based on CIS Benchmarks , NIST standards , and industry best More ❯