SC Legacy Blue Sustain Engineer

Corsham
2 weeks ago
Create job alert

Job Title: SC Cleared Major Platforms LBS Infrastructure Engineer
Duration: Until 31/03/2025 with possible extension beyond this
Location: Corsham
Rate: Up to £625.00 per day based on relevant experience and via an approved umbrella company

Overview

The LBS Infrastructure Engineer sits within an existing technical team and is responsible for designing, installing, configuring and supporting an infrastructure made up of Microsoft Windows Servers and other Microsoft software applications and toolsets on a virtualised Windows Hyper-V platform.

Key responsibilities of the team include:

Installation, configuration, maintenance, administration, and support of Windows servers and related infrastructure within a virtualised environment.
Installation and configuration of Microsoft enterprise products including, but not limited to, Active Directory, Group Policy, SQL, Exchange, Skype, WSUS, PKI and MS Office elements.
Installation, configuration, maintenance, administration, and support of a virtualised environment based on Microsoft Windows Hyper-V platform
Production and review of all levels of design artefacts.
Supporting wider LBS system testing activities.
Working with Service Management to resolve issues.Essential skills, qualifications and experience

In order to deliver this service, it is essential that individuals have a number of technical competencies, including:

Significant hands-on experience in:

The installation, configuration, maintenance, administration and support of Windows server operating systems, especially Windows Server 2016, especially within a virtualised environment.
The design, configuration and administration of Active Directory, preferably in a secure environment.
Working as part of a team to deliver a capability as well as work on their own to design and implement as per high level requirements.
Must be able to produce High and Low Level documentation as well as build instructions.
Produce work packages and report on progress.
Must be able to provide when required, support to Live Services on resolving issues.

Several years' experience in some of the following areas:

Design, configuration, implementation and administration of PKI, DNS, DHCP, Exchange, SharePoint, Skype for Business (experience of Unified Comms from other vendors considered a bonus), WSUS, SQL, Trend (or similar AV products), Proxy, Veeam.Experience in some of the following areas:

The installation, configuration, maintenance, administration and support of a virtual server infrastructure, based on Windows Hyper-V virtualization
Configuring and administering the backup and restore of Windows based systems.
Patching Windows based systems and associated software.
Configuring peripheral devices.
Microsoft Windows client configuration based on Windows 10.
Experience working with PowerShell.
Competency in the Microsoft Office suite of products.Other essential, non-technical, skills, qualifications and experience include:

DV clearance preferred; but candidates holding a current SC clearance and be prepared to undergo DV clearance will be considered.
Delivering against high pressure timelines and in complex organisations.
Writing, analysing and understanding technical requirements.
Working as part of a large technical team.
The ability to identify risks associated with business processes, operations, information security programs and technology projects.
Strong communication skills, both written and verbal.
Strong critical thinking and analytical skills to solve problems and propose new ideas. Desirable skills, qualifications and experience

In order to deliver this service, it is desirable that individuals have:

Technical experience of:
The design and configuration of Two Factor Authentication Solutions.
Experience in installation and configuration of Microsoft Windows 2022 OS
Knowledge of Automation and Orchestration technologies.
Experience of operating and delivering within an Agile Framework.
Knowledge of the Atlassian Toolset - JIRA, Confluence and BitBucket for delivering Agile based projects.
Experience of working within the public sector, preferably Defence, and ideally with Defence Digital (formerly ISS).
A firm grasp of service management tooling and ITIL.
Delivering accredited secure solutions within the UK Public Sector.
Delivering in Agile (SAFE4) and Waterfall projects.If this is the role for you please submit your CV at your earliest convenience. If you have not been contacted within 2 weeks please accept you have not been successful on this occasion

Related Jobs

View all jobs

Security Analyst - SC Cleared

Splunk Core Consultant (SC Cleared)

IDAM Architect - SC Cleared

Security Liaison Manager - SC Clearance Required

Cybersecurity Architect (SC cleared)

SOC Shift Lead

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.