Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
with a Hybrid Joined Active Directory environment Group Policy Management and Conditional Access Policy Management Experience DNS, DHCP Experience Working knowledge and understand of PKI Services Scripting experience using BAT, PowerShell, C# and VB Scripts Awareness of Change and Release Management Strong communication skills both written and verbal Self-motivated more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
with a Hybrid Joined Active Directory environment Group Policy Management and Conditional Access Policy Management Experience DNS, DHCP Experience Working knowledge and understand of PKI Services Scripting experience using BAT, PowerShell, C# and VB Scripts Awareness of Change and Release Management Strong communication skills both written and verbal Self-motivated more »
following areas (but these are not essential), Proven experience of troubleshooting and problem management Networking & Concepts e., MPLS, VRFs, SDWAN, TLS, Dynamic routing, IPv6, PKI Software and Tools e., Securing Windows or Linux; Network Monitoring Solutions; AAA services such as RADIUS; Network Analysis tools such as Wireshark/Zeek;) Cloud more »
support escalation point for both corporate and industrial control Active Directories Contribute to Active Directory capacity planning, metrics, reporting, domain controller placement. Contribute to PKI capacity planning, reporting, certificate template usage, design. Contribute to Cybersecurity Operations roadmap. Cybersecurity Operations and Directory services advocate for the region Primary resource for CIP more »
the Yocto build system Full software lifecycle including design, design documentation, source control, unit test, integration test, user documentation Desired: Knowledge of PublicKeyInfrastructure systems Knowledge of IPSEC protocol Experience of board functional test design and development Experience of RF calibration procedures Experience using JTAG debuggers more »
years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, Identity and Access Management, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the implementation of key security projects using cutting-edge technologies. … to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with more »