Scripting capabilities (SH/Bash/Python/Perl). • Configuration of common services (DNS/Apache/NGINX/Postfix/Squid/SSH/iptables). • Understanding of clustering services, enabling High Availability failover. • Experience with enterprise hardware and management tools. • Experience working within a strict Change Management more »
network have a good working and implementing knowledge of the following protocols and technologies – IPSec, VPN, TCP/IP, SSL, TLS, IDS/IPS, SSH, SNMP, NTP of security tools and technologies, including firewalls, IDS/IPS, VPN, and SIEM and scripting skills required (Python, Powershell scripting or Shell scripts more »
science organisation or with Science R&D Knowledge of TCP/IP networking, HTTP/REST, APIs and other data transfer mechanisms such as SSH, SFTP, VPN links Knowledge and experience with MS Azure solution architectures (esp. IaaS, PaaS and SaaS based solutions) Experience in MS Azure storage, apps, Azure more »
and execute robust security strategies. The ideal candidate will possess a deep understanding of cloud platforms and be well-versed in security protocols, including SSH and HTTP. Complementary skills that will enhance your role include programming, containerisation, and threat modelling, enabling you to provide a holistic approach to cybersecurity challenges. more »
Ashby-De-La-Zouch, Leicestershire, East Midlands, United Kingdom
CMR & Life Sciences
QNX platforms. Developing best practices, procedures, checklists, and implementing security standards for control systems. Implementing secure network protocols such as SSL/TLS, HTTPS, SSH, SFTP, and secure industrial protocols for PRISMIC control systems. Conducting and maintaining ongoing threat analysis and risk assessment processes to proactively identify and mitigate potential more »
Oracle Linux (Red Hat, CentOS) Systematic problem-solving approach, strong communication skills, a sense of ownership and drive Solid understanding of PKI, mTLS, SSL, SSH Experience with Agile Development (Scrum or Kanban) Experience with production operations and good practices for putting quality code in production and troubleshoot issues when they more »
experience with Microsoft Windows operating systems including user account management, security/system hardening & device control, and patch management. Familiarity with LDAP, RADIUS, TLS, SSH, SFTP, RSA, HTTPS, NERC-CIP, NIST, IEC62443, IEC62351 standards, cyber asset protection regulations and standards, and communication protocols like IEC61850, DNP, IEC(phone number removed more »
Description Methods is a £100M+ IT Services Consultancy who has partnered with a range of central government departments and agencies to transform the way the public sector operates in the UK. Established over 30 years ago and UK-based, we more »
User and Application Support Creation and management of user accounts Account creation Environments Home directories Shells sssd protocol Automounter Linux Security Patching Security Updates SSH Configuration SUDO – Managing SUDO files Managing users and groups in a secure manner File Systems Permissions – How to organize and configure UNIX permissions and groups more »
DescriptionMethods is a 100M+ IT Services Consultancy who has partnered with a range of central government departments and agencies to transform the way the public sector operates in the UK. Established over 30 years ago and UK-based, we apply more »
architecture. Networking concepts such as routing, switching, and transport layer protocols i.e., TCP/IP suite. Common application layer protocols, HTTP/S, DNS, SSH, etc. Active Directory, Microsoft Entra and related authentication/authorization technologies. Modern attack strategies that use social engineering and technological abuse primitives. Utilizing and customizing more »
with at least 7+ years of experience Experienced at Git management and deploying solutions through CD style deployments, alongside more legacy approaches such as SSH and SFTP Confident in client engagement, with the ability to communicate complex technical concepts in an understandable manner Have a deep understanding of how to more »
Understanding of OSI or TCP/IP models Understanding of protocols like TCP/UDP/IP/DNS/DHCP/NAT/SSH Apply now to Callum or call for a confidential discussion. We have a full job spec and benefits package for your review . We are more »
server hardware and operating systems, with experience in Linux and Windows administration. Configure switches and routers, manage protocols like LACP, NTP, Iptables/firewall, SSH, NAT, VPN, and work with virtual machines on VMware or Hypervisor. Requirements: Clean driving license. 5-year employment/gap history for obtaining an airside more »
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
Appreciation of key network technologies/protocols including 4G, 5G, TCP/IP, MPLS, DWDM, MW, OTN, EMSs, NFV/SDN, SSL/TLS, SSH, IP-VPN & SNMPExperience of agile & waterfall delivery methodologies & previous experience in performing impact assessmentsWorried that you don’t meet all the desired criteria exactly? At more »
skills in Java, on REST and SOAP web services, J2EE, Spring, XML, XPATH, JSON, SQL Familiar with other technologies including HTTP, HTTPS, FTP, FTPs, SSH, Tomcat, Jetty, Oracle Database Server Experience working in an Agile environment more »
supporting their work Automation of security controls 5 years + working as a DevSecOps Lead Comfortable with a Linux-based tech stack (managed VMs, SSH, VPNs, firewalls,) Experience with Kubernetes (incl. managed), Terraform, Ansible, Github, Gitlab,, ArgoCD, Image registries Organising and performing penetration testing of our infrastructure, and collaborating with more »
Suite, Nmap, Nessus, Qualys, Metasploit, and others. Strong knowledge of the OWASP Testing Methodology. Solid understanding of security protocols such as SSL/TLS, SSH, and HTTP. Knowledge of cloud security platforms like AWS, Azure, and Google Cloud. Understanding of networking protocols and the OSI Model. Mandatory Soft Skills and more »
Greater London, Grange, United Kingdom Hybrid / WFH Options
Remarkable Jobs
tools like Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit, etc. Strong knowledge of the OWASP Testing Methodology Understanding of security protocols (SSL/TLS, SSH, HTTP) Knowledge of cloud security platforms (AWS, Azure, Google Cloud) Understanding of networking protocols and the OSI Model Security Testing Consultant (Pen Tester) Mandatory Soft more »