Jump to content

All Activity

This stream auto-updates     

  1. Last week
  2. https://nato.taleo.net/careersection/1/jobdetail.ftl System Administrator (191019) Primary Location Netherlands-The Hague NATO Body NATO Communications and Information Agency (NCI Agency) Schedule Full-time Application Deadline 05-Jan-2020 Salary (Pay Basis) 4,538.44Euro (EUR) Monthly Grade B.5 Clearance Level NS Description NATO offers you more than a job. It gives you a mission: building peace and security for one billion people in Europe and North America. The NATO Communications & Information Agency is leading NATO’s Digital Endeavour. We are NATO’s technology and cyber leaders, helping NATO Nations to communicate and work together in smarter ways. Our work is challenging and meaningful, and you will develop and apply your expertise as part of a dynamic international team of civilian and military professionals. Come and be part of the most successful alliance in history. NATO Communications and Information Agency (NCI Agency) is looking for a System administrator. The Command and Control (C2) Service Line is accountable for planning and executing all lifecycle management activities (design, transition and operations) for Joint/Maritime/Land C2 services (including: subject matter expertise; research and development; software engineering; acquisition; operations and maintenance; and, disposal) in the following C3 Community of Interest (COI) technical service areas: Land; Maritime; Joint; Special Operations; Environmental including Meteorological and Oceanographic (METOC); Civil Military Co-operation (CIMIC); Chemical, Biological, Radiation and Nuclear (CBRN); Operational planning ; Tasking and order services; Situational awareness ; Special C2 services NATO Nuclear Planning System (NNPS), NATO Nuclear Command, Control and Reporting System (NNCCRS), Shared Early Warning (SEW); The Service Line also retains accountability for the acquisition of AirC2IS Increment 1. The C2 Enabling Services Branch is responsible for the full lifecycle support of the Joint COI systems and also for C2 interoperability and standardisation. This includes responsibility for current operational systems including Joint Tactical Chat (JChat); Joint Operations Centre Watch Tool (JOCWatch); Joint Targeting System (JTS)/NATO Joint Targeting System and Joint Time Sensitive Targeting Tool (FAST); and, Network Interoperable Real-time Information Services (NIRIS); as well as the acquisition of future Joint C2 systems including the Combine Joined Operations Functional Services Project (CJOPS) FS. The branch is also responsible for interoperability between C2 systems, including work on tactical data link (TDL) systems. Role Responsibilities Under the direction of an allocated project manager, team leader or system manager, you will perform duties such as the following: Support all phases of IT Service Lifecycle system administration as well as contributing to IT research, software development and acquisition projects with providing technical expertise; Implement, document, and test software using relevant software engineering technologies and methods using the available tools to support the full software lifecycle; Support analysis, implementation and maintenance of authorized software changes, related applications software and the integration/tailoring of vendor supplied components, following established procedures for quality, configuration control, testing, documentation and security; Assist in service transition of systems and services to the operational environment; Support required Cloud system engineering work, including technical duties associated with Cloud deployments, Cloud infrastructure design, planning, management, maintenance and support; Provide expeditious technical support services to the NATO Functional Area Services, including emergency troubleshooting and on-site assistance (at NATO and national sites), to ensure key information systems remain operational; Be responsible for maintenance and upgrading of documentation related to supported systems; Interact with peers on other projects within and between NCI Agency Service Lines, and provide guidance and subject matter expertise Assist in preparation of, and occasionally deliver, briefings and presentations; Assist in preparation of scientific reports; Deputize for higher grade staff, if required; Perform other duties as may be required. Qualifications Required: Vocational training at higher level in a relevant discipline, leading to a professional qualification or equivalent combination of qualifications and experience. A higher educational qualification but less practical experience or a less formal educational background combined with particularly relevant practical experience may also be acceptable; A minimum 8 years of relevant experience in some (but not necessarily all) of the following areas. Experience required: Installation, implementation, large scale deployment, administration, testing and maintenance of software for modern information systems in a networked and distributed environment; Knowledge of operating systems that are currently used for modern information systems, particularly Linux and Windows; Solid experience in and TCP/IP networking techniques, associated standards and protocols; Experience in the deployment and maintenance of Database Servers; Experience in the deployment of endpoint Antivirus and security systems (Host-based firewalls, Data Lost Prevention, etc.) and associated management consoles; Experience in MS Active Directory on-premises deployments and integration or integrations with Cloud systems such as MS Azure; Knowledge and experience in Cloud computing and infrastructure: Scripting, Storage, Virtual machines, Networking, etc; Knowledge in DevOps and associated technologies, processes and tools toolbox; Experience in Business continuity, disaster recovery and backup solutions; Knowledge and experience in the implementation and testing of military security requirements, including security policies; Technical knowledge of and experience in military Command and Control Information Systems or similar civilian systems; Knowledge of Server Virtualization technologies, Virtual Desktop Infrastructure (VDI) and Containers; Writing technical documentation and user guides such as technical notes, training material, reports, and reference documents. It would be considered highly desirable if you are able to display any experience or knowledge of: Knowledge of Command and Control concepts, processes and tools; Knowledge of Security cross-domain information exchange methodologies, tools and techniques; Experience of deployment and maintenance of software products targeted at large end-user customer base; Technical certifications within Linux, Microsoft, Cisco, Cloud technologies; Technical certifications within Microsoft MCITP, MCSA, MCTP or similar; Experience with Server Clustering and Data Center resilience; Experience of systems support and maintenance in the NATO environment; Prior experience of working in an international environment comprising both military and civilian elements; Knowledge of NATO responsibilities and organization, including ACO and ACT) Competencies Required: Working with People - Shows respect for the views and contributions of other team members; shows empathy; listens, supports and cares for others; consults others and shares information and expertise with them; builds team spirit and reconciles conflict; adapts to the team and fits in well. Applying Expertise and Technology - Applies specialist and detailed technical expertise; uses technology to achieve work objectives; develops job knowledge and expertise (theoretical and practical) through continual professional development; demonstrates an understanding of different organisational departments and functions. Writing and Reporting - Writes convincingly; writes clearly, succinctly and correctly; avoids the unnecessary use of jargon or complicated language; writes in a well-structured and logical way; structures information to meet the needs and understanding of the intended audience; Planning and Organising - Sets clearly defined objectives; plans activities and projects well in advance and takes account of possible changing circumstances; identifies and organises resources needed to accomplish tasks; manages time effectively; monitors performance against deadlines and milestones. Travel: Business travel to NATO and national (NATO and non-NATO) facilities as well as frequent travel between the NCIA offices; you may be required to undertake duty travel to operational theatres inside and outside NATO boundaries. Language skills: A thorough knowledge of one of the two NATO languages, both written and spoken, is essential and some knowledge of the other is desirable. NOTE: Most of the work of the NCI Agency is conducted in the English language. Contract NCI Agency normally offers contracts of employment of a definite duration, not exceeding three years. Contracts may be for less than three years as required to support short-term projects, meet uncertainty with respect to the business outlook, staff performance and other factors. Definite duration contracts may be extended for further periods. When extending contracts, the following is taken into consideration: Renewal is in the interest of the Agency; Staff member's desire to remain with the Agency; The financial situation provides sufficient funding for the post held; The skills, competencies and behaviours, potential and work experience of the staff, versus the requirements of the Agency's work and/or availability of funding; Staff member has served the Agency with performance to the required standard as defined by the Agency; Staff member's deployability to operational theatre; Serving civilian members of NATO will be offered a contract in accordance with the NATO Civilian Personnel Regulations. The first six months of definite duration contracts are a probationary period. During this period the staff member's work is assessed to ensure that he/she has the ability to carry out the duties of the post. At or before the end of the probationary period, the staff member will be notified in writing that the appointment is confirmed or terminated or, in exceptional cases, that the probationary period is extended. Please note: Due to the Agency’s transition into a new structure in the near future, this post may be subject to transfer to one of our other locations, as well as to a change of reporting lines. The final decision will be made at the time of a firm offer. The Agency’s recruitment team advises you that due to the large volume of applications it receives the screening process may take up to 2 months. We appreciate your patience
  3. Earlier
  4. https://www.virusbulletin.com/about-vb/job-vacancy/ Virus Bulletin is a small company with a largely remote team based all over Europe that is placed at the heart of the IT security industry. Through its product testing, annual conference and ad hoc activities, Virus Bulletin works with security vendors, researchers and practitioners. As Security Evangelist, you will be the public face of the company. This broad role involves putting together a wide and varied conference programme, writing reports, talking to (prospective) customers, and attending trade shows and conferences. You will also be actively involved in determining the strategy of the company. Though a commercial company, Virus Bulletin cares strongly about ethics and values, making an actual contribution to the industry. As Security Evangelist, you are the person to maintain this ethical profile for the company. We are looking for someone who is passionate about security and has some affinity for the security industry who has some technical understanding of how threats and security products work who can write shorter or longer articles and reports who can work with and lead a remote team who doesn’t mind speaking to people or standing on a conference stage who is flexible and can keep to deadlines. We are not necessarily looking for someone with specific technical skills (though there is the possibility for this role to involve some technical work, this depends on the candidate) who is a native English speaker (all articles Virus Bulletin publishes are edited) who has a specific degree (or a degree at all) who fits a very specific profile: there is some flexibility in the exact job description to match the candidate’s strengths who is based in a very specific location: the job can be done remotely, or from our office in the UK. Preferably, the candidate will be based in Europe though. To apply for this position email recruitment@virusbulletin.com with your CV. Please also contact us if you have any questions about this role.
  5. At the previous post we created an Azure Front Door to scale our web apps across Azure Regions and also publish them only through the Front Door’s URL. At this post we will create Web Application Firewall (WAF) rules, to protect our web apps. To add WAF functionality to the Front Door we need first to create WAF rules and then attach them to the Front Door Create the WAF Rule From the Azure Marketplace search for WAF and create a Web Application Firewall At the “Create a WAF policy” wizard select “Global WAF (Front Door) for policy, provide the subscription and resource group, give a name for the policy and select if you want it to be created enabled or disabled. At the next step select if the policy will prevent the action or just detect and report it. You can change this later too. You can provide a Redirect URL for rules that support redirection. The default status code is 403 but we can change it to e.g. 404. We can also add a custom response body. The next step is the rule. We can select one or more predefined rule sets and then customize at will. To customize, expand the rule set and select a rule. You can enable / disable the rule and you can change the action to Allow, Block, Lod or Redirect. WAF Custom Rule The next step is the custom rules. There’s a lot to customise here. First are the rule type settings. Select status of the rule, enabled or disabled. Select the Rule type between Match and Rate limit. If you select rate limit you will be prompt to set rate limit and threshold. The final rule tupe setting is to set the priority of the rule. Next is the Conditions (If this) and the action (then that). The condition can be Geolocation, IP address, Size or String. After selecting the Match Type the rest options are altered accordingly. The action can be Allow traffic, Deny traffic, Log traffic only or Redirect traffic For the demo I created a rule that will Deny all traffic from The Netherlands, because I can test it from an Azure VM located at the West Europe Region. The next step is to associate the rule to the Front Door. After that assign Tags if needed and create the rule. Once the Rule is ready, a “Front Door WAF policy” resource will be at the selected Resource Group. Inside the Front Door, at the Web application firewall section, you can review the assigned rules. Test 1 From an Azure VM at West Europe Region, I tried to access the Front Door’s URL and we can see my custom 403 body text! Test 2 From my Computer I tested a typical SQL Injection attack from https://www.owasp.org/index.php/Testing_for_SQL_Injection_(OTG-INPVAL-005) . Again my custom 403 page! The post Use Web Application Firewall (WAF) Rules with the Front Door to protect your app appeared first on Apostolidis IT Corner.
  6. At the previous post we created an Azure Front Door to scale our web apps across Azure Regions and also publish them only through the Front Door’s URL. At this post we will create Web Application Firewall (WAF) rules, to protect our web apps. To add WAF functionality to the Front Door we need first to create WAF rules and then attach them to the Front Door Create the WAF Rule From the Azure Marketplace search for WAF and create a Web Application Firewall At the “Create a WAF policy” wizard select “Global WAF (Front Door) for policy, provide the subscription and resource group, give a name for the policy and select if you want it to be created enabled or disabled. At the next step select if the policy will prevent the action or just detect and report it. You can change this later too. You can provide a Redirect URL for rules that support redirection. The default status code is 403 but we can change it to e.g. 404. We can also add a custom response body. The next step is the rule. We can select one or more predefined rule sets and then customize at will. To customize, expand the rule set and select a rule. You can enable / disable the rule and you can change the action to Allow, Block, Lod or Redirect. WAF Custom Rule The next step is the custom rules. There’s a lot to customise here. First are the rule type settings. Select status of the rule, enabled or disabled. Select the Rule type between Match and Rate limit. If you select rate limit you will be prompt to set rate limit and threshold. The final rule tupe setting is to set the priority of the rule. Next is the Conditions (If this) and the action (then that). The condition can be Geolocation, IP address, Size or String. After selecting the Match Type the rest options are altered accordingly. The action can be Allow traffic, Deny traffic, Log traffic only or Redirect traffic For the demo I created a rule that will Deny all traffic from The Netherlands, because I can test it from an Azure VM located at the West Europe Region. The next step is to associate the rule to the Front Door. After that assign Tags if needed and create the rule. Once the Rule is ready, a “Front Door WAF policy” resource will be at the selected Resource Group. Inside the Front Door, at the Web application firewall section, you can review the assigned rules. Test 1 From an Azure VM at West Europe Region, I tried to access the Front Door’s URL and we can see my custom 403 body text! Test 2 From my Computer I tested a typical SQL Injection attack from https://www.owasp.org/index.php/Testing_for_SQL_Injection_(OTG-INPVAL-005) . Again my custom 403 page! The post Use Web Application Firewall (WAF) Rules with the Front Door to protect your app appeared first on Apostolidis IT Corner.
  7. At the previous post we created an Azure Front Door to scale our web apps across Azure Regions and also publish them only through the Front Door’s URL. At this post we will create Web Application Firewall (WAF) rules, to protect our web apps. To add WAF functionality to the Front Door we need first to create WAF rules and then attach them to the Front Door Create the WAF Rule From the Azure Marketplace search for WAF and create a Web Application Firewall At the “Create a WAF policy” wizard select “Global WAF (Front Door) for policy, provide the subscription and resource group, give a name for the policy and select if you want it to be created enabled or disabled. At the next step select if the policy will prevent the action or just detect and report it. You can change this later too. You can provide a Redirect URL for rules that support redirection. The default status code is 403 but we can change it to e.g. 404. We can also add a custom response body. The next step is the rule. We can select one or more predefined rule sets and then customize at will. To customize, expand the rule set and select a rule. You can enable / disable the rule and you can change the action to Allow, Block, Lod or Redirect. WAF Custom Rule The next step is the custom rules. There’s a lot to customise here. First are the rule type settings. Select status of the rule, enabled or disabled. Select the Rule type between Match and Rate limit. If you select rate limit you will be prompt to set rate limit and threshold. The final rule tupe setting is to set the priority of the rule. Next is the Conditions (If this) and the action (then that). The condition can be Geolocation, IP address, Size or String. After selecting the Match Type the rest options are altered accordingly. The action can be Allow traffic, Deny traffic, Log traffic only or Redirect traffic For the demo I created a rule that will Deny all traffic from The Netherlands, because I can test it from an Azure VM located at the West Europe Region. The next step is to associate the rule to the Front Door. After that assign Tags if needed and create the rule. Once the Rule is ready, a “Front Door WAF policy” resource will be at the selected Resource Group. Inside the Front Door, at the Web application firewall section, you can review the assigned rules. Test 1 From an Azure VM at West Europe Region, I tried to access the Front Door’s URL and we can see my custom 403 body text! Test 2 From my Computer I tested a typical SQL Injection attack from https://www.owasp.org/index.php/Testing_for_SQL_Injection_(OTG-INPVAL-005) . Again my custom 403 page! The post Use Web Application Firewall (WAF) Rules with the Front Door to protect your app appeared first on Apostolidis IT Corner.
  8. Καλησπέρα σας, αντιμετωπίζω ένα πρόβλημα με ένα flash disk. Το ειχα ξανα αντιμετωπισει παλαιοτερα αλλά δεν θυμαμαι πως το επιδιορθωσα. Το εβγαλα από έναν υπολογιστή το εβαλα σε άλλον και μου δειχνει όλα τα αρχεια με περιεργα ονόματα και φάκελοι εχουν εξαφανιστεί. Μπορει να βοηθησει καποιος? Ευχαριστώ εκ των προτερων. Εχω κανει check-repair, antivirus scan, εχουν σωθεί ελαχιστα
  9. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190937 Technician (Information Assurance)-190937 Primary Location Belgium-Mons NATO Body NATO CIS Group Schedule Full-time Salary (Pay Basis) : 3,869.44Euro (EUR) Monthly Grade B.4 Description : NCISG HQ is looking for a Technician to provide information assurance technical support to NATO deployable communication and information systems. If you enjoy working in an international environment and can cope with the challenges of frequent exercise support and deployments, this post is for you. GENERAL BACKGROUND: The NATO CIS Group conducts CIS operational planning and provides deployed/deployable CIS services and support in support of NATO military operations and exercises. The NATO CIS Group is located at the Supreme Headquarters Allied Powers Europe (SHAPE) the Headquarters of Allied Command Operations (ACO), one of the two major military commands of the North Atlantic Treaty Organisation (NATO). POST DESCRIPTION: Location: Casteau/Mons, 60 Km south of Brussels (Belgium) Division: J2/6 POST CONTEXT/POST SUMMARY The J2/6 Division is the technical coordination authority for Deployable Communication Information Systems and is responsible for the operational integration, coordination, direction and provision of required technical services for the NATO Communications Information Systems Group and NATO Signal Battalions. The Information Assurance (IA) and Cyber Defense Branch is responsible for all aspects of NATO Communications Information Systems Group organizational security and Deployable Communications Information Systems Information Assurance, to include the planning, coordination and operational integration of Defensive Cyberspace Operations and Cyberspace Intelligence. The Information Assurance and Security Services Section is responsible for Deployable Communication Information Systems Information Assurance and security engineering, and the enforcement of the NATO security policy throughout NATO Communications Information Systems Group. The incumbent is responsible for technical support to all IA activities of NCISG. PRINCIPAL DUTIES The incumbent's duties are: Principal technician supporting NATO CIS Group operational Information Assurance. Assess the performance of IA security controls and ensure Systems and networks comply with security policy, procedures, and technical requirements. Analyze patterns of security non-compliance and take and/or coordinate appropriate actions to minimize security risks. Implement response actions in reaction to security incidents. Supports the implementation of computer and network security projects at all sites within the NATO CIS Group AOR. Supports the provision and delivery of Information assurance and Security awareness training and presentations to the NATO CIS Group. Supports CIS Risk Management process by identifying risks, making assessments, and formulating recommendations to reduce the risks within computer security and IA functions. Supports computer security and IA by implementing procedures and techniques, analysing current practices, installing and operating monitoring tools and Security Audit platforms to evaluate overall Group CIS security with minimal supervision. Provides IA assistance to NATO operations and exercises, which includes support to exercise coordination and planning, pre-deployment configuration checks, and exercise participation. Assists in the daily management of the NATO CIS Group Security Accreditations role coordinating directly with CISP and coordinates with the NSBs to validate accreditation packages prior to L2SAA review. Provides technical support for DCM Security Design and Management. Provides technical support in the areas of: CIS Security measures, Disaster Recovery & Backup, Business Continuity, Risk Management, technical documentation and evaluation of new technologies. Provides support in solving technical issues and the validation of IA requirements. Assists in the coordination of PKI requirements in support of federated NATO operations and exercises. SPECIAL REQUIREMENTS AND ADDITIONAL DUTIES Mandatory Deployment Post. The incumbent may be required to undertake deployments in support of military operations and exercises, and/or TDY assignments, both within and outside NATO boundaries. Such operational deployment may exceed 30 days duration up to 183 days in any period of 547 days, and may be on short notice. For NATO International Civilian Staff, acceptance of an employment contract linked to this post constitutes agreement to deploy in excess of 30 days if required. The incumbent must maintain current knowledge of IA; participate in Security Working Group meetings and service delivery monitoring; contribute to the development of IA policies, procedures and strategy development. The work is normally performed in a Normal NATO office working environment. Normal Working Conditions apply. The risk of injury is categorised as: No Risk. ESSENTIAL QUALIFICATIONS A. Professional/Experience Minimum 1 year experience in network security audit, analysis, and architecture. Minimum 1 year experience in risk-based security assessments and audits. Minimum 1 year experience in computer security tools and vulnerability assessment tools and methodologies. Minimum 2 years of experience in working with the principles and processes of computer and communications security, networking, and the vulnerabilities of modern operating systems and applications. Knowledge of TCP/IP stacks protocols and ports. Minimum 2 years of experience providing information assurance support. B. Education/Training Higher Secondary education and intermediate vocational training which might lead to a formal qualification with 2 years experience, or Secondary education and completed advanced vocational training leading to a professional qualification or professional accreditation with 4 years post related experience. C. Language English - SLP 3232 (Listening, Speaking, Reading and Writing) NOTE: The work both oral and written in this post and in this Headquarters as a whole is conducted mainly in English. DESIRABLE QUALIFICATIONS A. Professional Experience Experience in information systems engineering and maintenance, Experience in computer security, concepts, policies and architectures. Experience in INFOSEC policies and procedures. Professional certifications in IA (GSEC, Security+, CRISK, CISA or similar certifications). Knowledge of security configuration of Microsoft Windows Server 2008/2012 and Windows 10, or newer versions. Knowledge of vulnerabilities management and mitigations. Experience with CIS Certifications and/or Accreditations. Experience with emanations security. ITIL foundation certification ATTRIBUTES/COMPETENCIES A. Personal Attributes The incumbent will need to display a high degree of professionalism and technical expertise in performance of his/her duties. The rapidly changing NATO environment and increasingly constrained resource situation creates a requirement to solve numerous complex problems and challenges, which shall require the incumbent to draw upon a comprehensive ability to reason, analyse, act with persuasion and diplomacy, arrive at an adequate conclusion to ensure the adequate execution of tasking authority over NATO CIS Group in support of all NATO operations. Many of the arising problems will require the ability to exercise excellent judgements to propose solutions based on resources available. The incumbent’s solution of these problems, and his resulting actions, will impact the delivery of DCIS capability to meet SACEUR’s operational tasking. The incumbent must have a strong aptitude for analysis and problem solving. The incumbent works without supervision in accordance with policies and directives, and must possess excellent inter-personal and communication skills, as well as tact, in order to effectively interact with NATO CIS Group Divisions and Deployed HQ's to support the operational tasks. B. Managerial Responsibilities – N/A C. Professional Contacts Regular professional contacts with others inside and/or outside immediate organisation on functional matters. Solicits/gives information and provides advice/guidance. D. Contribution To Objectives Work involves the provision of information or analysis of part of a task assisting others to take action within the organisation. This post reports to : OCG CXOA 0010 - Section Head (IA and Security Services) - A-3. E. Supervisory Responsibilities There are no reporting responsibilities. REMARKS: Duration of contract: Serving staff members will be offered a contract according to the NATO Civilian Personnel Regulations (NCPR). Newly recruited staff will be offered a definite duration contract of three years normally followed by an indefinite duration contract. HOW TO APPLY FOR A NATO CIVILIAN POST AT SHAPE: Applications are to be submitted using NATO Talent Acquisition Platform (NTAP) (https://nato.taleo.net/careersection/2/jobsearch.ftl?lang-en). Applications submitted by other means (e.g. mail, e-mail, fax, etc) are not accepted. NTAP allows adding attachments. A copy of the qualification/certificate covering the highest level of education required by the job description must be provided as an attachment. Essential information must be included in the application form. Particular attention should be given to Education and Experience section of the application form. Each question should be answered completely. Expressions such as “please see attached CV, please see annex / enclosed document” or invitations to follow links to personal webpages are not acceptable and will be disregarded. All answers should be in English (preferably) or in French. Shortlisted candidates will be requested to provide original documentary evidence and a set of copies supporting statements in their applications. Tests and interviews with shortlisted candidates are expected to take place at SHAPE, Mons, Belgium on the 17 and 18 February 2020. Current and past civilians working for NATO or any Coordinated Organization, shall indicate their last grade and step held (next to job title), and specify the name of employing NATO body or Coordinated Organization. Remarks: A) Only nationals from the 29 NATO member states can apply for vacancies at SHAPE. Applications are automatically acknowledged within one working day after submission. In the absence of an acknowledgement please make sure the submission process is completed, or, re-submit the application. C) Qualified redundant staff of the same grade interested in this post should inform this office, via their HR/Personnel Office by not later than vacancy’s closing date. D) Candidates’ individual telephone, e-mail or telefax enquiries cannot be dealt with. All candidates will receive an answer indicating the outcome of their application.
  10. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190978 Primary Location Germany-Wesel NATO Body Joint Force Command Brunssum NLD Schedule Full-time Salary (Pay Basis) : 5,954.40Euro (EUR) Monthly Grade A.2 Description : NOTIFICATION OF A VACANCY AT 1st NATO SIGNAL BATTALION DUTY LOCATION: WESEL, Germany JOB TITLE: Engineer (Information Systems / Functional Area Systems) NATO International Civilian Grade: A-2 POST NUMBER: ODN GXDX 0030 DUE DATE for receipt of applications: 5 January 2020 Post Context 1st NATO Signal Battalion provides Communication and Information System (CIS) services to deployed NATO headquarters. Command Group provides the administrative support for Command and Control of the NSB HQ. The Deployable Communications and Information Systems Engineering Section plans and coordinates with other NATO Signal Battalion Headquarter sections all activities related to Deployable Communications Information Systems engagement. Incumbent serves as the primary CIS Engineer for Information Systems and Functional Area Services (FAS) (FAS = applications). Duties: Advises the NSB Commander for all Deployable Core IS and Community of Interest (CoI) / FAS issues within the NSB’s area of responsibility. Applies configuration management to all applicable hardware, software and network components in the Core IS and CoI / FAS disciplines. Coordinates engineering analysis design and implementation of NSB-assigned systems to include servers, workstations and LAN devices in the IS discipline. Analyses assigned NSB systems and application software and hardware requirements, programming and implementation of technical solutions to meet Core IS customer’s requirements during planning and execution of operations and exercise events. Coordinates CoI F AS implementation, under the overall coordination authority of the NCISG HQ. Responsible for directing and overseeing performance, configuration and security aspects in support of the assigned Core IS and CoI / FAS. Provides guidance and technical support in NSB Area of Responsibility (AOR) in the planning and implementation of system configuration changes, and enhancement suggestions for the assigned Core IS and CoI / FAS. Attends exercise planning conferences to collect functional services requirements for the NSB and, under authority of the Section Head and in coordination with NCISG HQ J2/6 representatives, define and plan the adequate Core IS and CoI / FAS support. Develops required actions to sustain the integrity, interoperability and the availability of the Core IS and CoI/FAS within the NSB AOR, under authority of the Section head and under overall coordination authority of the NCISG HQ. Leads troubleshooting efforts on assigned Core IS and CoI / FAS systems as required. Under authority of the Section head, and in full coordination with NCISG HQ J2/6, initiates Core IS and CoI / FAS authorised software changes, following established procedures for quality, configuration control, testing, documentation and security for assigned Core IS and CoI / FAS systems. Deploys and supports Core IS and CoI / FAS operations within the assigned AOR. Initiates the setup of Core IS and CoI / FAS pre-deployment/exercise hardware and software to ensure proper configuration and operation of assigned Core IS and CoI / FAS. Directs and oversees the training of Level 1 and Level 2 Core IS and CoI / FAS support staff in coordination with NSB Training Office. Coordinates as required with the NCISG HQ J2/6 any technical issue regarding provision of Core IS and CoI / FAS Support within the assigned AOR. Coordinates Core IS and CoI / FAS requirements among the NSB subordinate units (Maintenance & Support Company and Deployable Command Modules). Travel requirement / contract: The Engineer (IS / FAS) may be required to undertake deployments in support of military operations and exercises, and/or TDY (duty travel) assignments, both within and without NATO boundaries. Such operational deployment may be up to a total 6 months (uninterrupted or in shorter periods) in any period of 18 months and may be on short notice. Acceptance of an employment contract linked to this post constitutes agreement to deploy. The work is normally performed in a typical Office environment. Normal Working Conditions apply. The risk of injury is categorised as: No risk / risk might increase when deployed. The successful candidate has the following qualifications Professional Education University Degree and minimum of 2 years related professional experience. OR Higher Secondary Education and completed Advanced Vocational education/training and minimum of 4 years related professional experience. Very Good Command of English language (oral and written). Professional Experience / Knowledge in All Services Lifecycle aspects of IS and FAS (=applications) to achieve effective system development and deployment. Proven ability to convert evolving military operational requirements into both: IS and application requirements. Knowledge of System Analysis principles to direct and guide IS and application development. Broad and sound technical knowledge and experience in distributed IS as they are applied to the modern military management Information and Command and Control Systems. Broad and sound technical knowledge and experience in applications as they are applied to the modern military management Information and Command and Control Systems. Detailed knowledge of architectural design as applied to computer systems. Sound technical knowledge on wide area networks and local area networks. Practical experience in Management and Operation of communications systems supporting deployed HQ. Knowledge of deployed IS and applications Desirable qualifications are: Post Graduate diploma in a CIS Systems Engineering related subject. Chartered Engineer. Prince 2 certification. ITIL certification. Personal Attributes The successful candidate has: Very good communication skills professional judgement excellent interpersonal skills The successful candidate is: a team player who is also able to work independently integer and discrete deployable The successful selected candidate needs to complete a NATO medical examination and obtain a NATO security clearance before an employment offer will be released. The medical examination will take place with our medical consultant and is required to determine if the recommended candidate is fit to perform the duties of the position and is deployable to NATO’s regional areas of operation. Newly recruited staff members will be offered a definite duration contract of 3 years, including a 6 months probationary period. Unless organisational reasons prevent and assuming satisfactory performance, after the 3 year contract has expired staff members will normally be offered an indefinite duration contract. DUE DATE for receipt of applications: 5 January 2020 Serving NATO Civilian Staff applying are requested to inform their Civilian Personnel Office. Applicants are required to apply electronically through NTAP: https://nato.taleo.net/careersection/1/jobsearch.ftl?lang-en Results of the initial screening for this post may be expected by the end of January 2020. Test and interview are planned end of February 2020 and will take place in Wesel, Germany.
  11. Securely scale your Web Apps with Azure Front Door There is a big buzz out there about Azure Front Door. Is it a Load Balancer? A CDN? A Traffic Manager? A Web Application Firewall ? A Reverse Proxy? An Application Gateway? So, what is Azure Front Door? Azure Front Door actually is all the above and more. It is a global service, that routes web traffic based on performance and availability. A Layer 7 multi-region load balancer with Web Application Firewall (WAF) capabilities, DDoS protection & CDN. Azure Front Door is the entry point, the edge, of all Microsoft’s WAN. All Microsoft services, like Office 365 & Bing, are using Azure Front Door. The services that Azure Front door provides are: Accelerate application performance Increase application availability with smart health probes URL-based routing Multi-site hosting URL redirection Session affinity SSL termination Custom Domain & certificate management Security via custom WAF rules DDoS protection URL rewrite IPv6 and HTTP/2 support At Azure Front Door documentation there is a paragraph that can help to understand the difference between Azure Front Door and other publishing / load balancing Azure solutions and where to use each. Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you are looking for a DNS based global routing and do not have requirements for Transport Layer Security (TLS) protocol termination (“SSL offload”) or per-HTTP/HTTPS request, application-layer processing, review Traffic Manager. If you are looking for load balancing between your servers in a region, for application layer, review Application Gateway and for network layer load balancing, review Load Balancer. Your end-to-end scenarios might benefit from combining these solutions as needed. For pricing information, see Front Door Pricing. How to scale your web apps with Front Door Create two simple Azure Web apps. Check this guide for a simple guide on how to create Azure App Service: https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-your-first-web-app/ One at West Europe: and one at North Europe: Using FTP, I deployed an one-page html site at both regions. I change the text of both site to say “This Web Site is located at North Europe Azure Datacenter” and “West Europe” to the other. Then create a Front Door. Search for Front Door at Azure marketplace and Create one. This is a high level diagram of the Front Door with two Web Apps design that we will create The “create a Front Door” wizard will start and we can configure it step by step. First we will create a Frontend host by clicking the + at the Step 1 At the frontend host we will create the URL that our apps will be available. I added the papostolidis.azurefd.net. of course later you can add your custom domain and add a CNAME to route the traffic to the Front Door. Then, at the Backend pools (Step 2), press the + to add the web apps. add a name for the backend pool, like “myapps” and press + ADD a backend to add the apps. Select host type, you can add app service, cloud service, storage and custom host (URL). I selected the app service. Select the subscription and the app service and add the correct ports for http and https traffic. The priority defines if the traffic will be routed to the host with the lower priority number (e.g. 1) and if that host fails will route to the next host with bigger priority number (e.g. 2). If you add the same priority to more than one host then it will follow the weight number. The weight number defines the percentage of requests that will be routed to each host. The same way add the second web app Finally select a path, protocol and interval for the probe that will do health checks to the app to define if it is active or not. The third step is to add the routing rules. At the routing rules you can specify: The accepted protocol, http or https. the frontend host for this rule the patterns that the route will accept, like www.e-apostolidis.gr/mysite/* or just /* ro root. Route type forward or redirect. The backend pool that this rule will direct the traffic The protocol that the traffic will be forwarded. Here we define the SSL Offload if we select HTTPs for frontend accepted protocol and HTTP for backend. URL Rewrite rules Caching, for static content caching like CDN. Once all steps are completed we can move on and create the Front Door When the Front Door is ready, we can see the URL at the Overview. And browse our web app using the Front Door URL: How to protect your web apps with Front Door Right now we scaled our web apps. If we use each app’s URL we can still access the app. The first security step is to lock the web apps to be accessed only through the Front Door URL. Checking the Azure Front Door FAQ page, https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq it lists the Front Door’s address rance. Front Door’s IPv4 backend IP space: 147.243.0.0/16 Go to the App Service, at the Networking section, select “Configure Access Restrictions” Add an allow access restriction with the IP range of the Front Door. Automatically a Deny rule will be created for everything else. Add the rule to both web apps and then try to access the apps with their direct links. Now on, we can access the apps only by using the Front Door URL: This is a high level diagram after the restrictions At the next article, we will see how to add Web Application Firewall (WAF) Rules to Front Door, Stay Tuned!! The post Securely scale your Web Apps with Azure Front Door appeared first on Apostolidis IT Corner.
  12. Securely scale your Web Apps with Azure Front Door There is a big buzz out there about Azure Front Door. Is it a Load Balancer? A CDN? A Traffic Manager? A Web Application Firewall ? A Reverse Proxy? An Application Gateway? So, what is Azure Front Door? Azure Front Door actually is all the above and more. It is a global service, that routes web traffic based on performance and availability. A Layer 7 multi-region load balancer with Web Application Firewall (WAF) capabilities, DDoS protection & CDN. Azure Front Door is the entry point, the edge, of all Microsoft’s WAN. All Microsoft services, like Office 365 & Bing, are using Azure Front Door. The services that Azure Front door provides are: Accelerate application performance Increase application availability with smart health probes URL-based routing Multi-site hosting URL redirection Session affinity SSL termination Custom Domain & certificate management Security via custom WAF rules DDoS protection URL rewrite IPv6 and HTTP/2 support At Azure Front Door documentation there is a paragraph that can help to understand the difference between Azure Front Door and other publishing / load balancing Azure solutions and where to use each. Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you are looking for a DNS based global routing and do not have requirements for Transport Layer Security (TLS) protocol termination (“SSL offload”) or per-HTTP/HTTPS request, application-layer processing, review Traffic Manager. If you are looking for load balancing between your servers in a region, for application layer, review Application Gateway and for network layer load balancing, review Load Balancer. Your end-to-end scenarios might benefit from combining these solutions as needed. For pricing information, see Front Door Pricing. How to scale your web apps with Front Door Create two simple Azure Web apps. Check this guide for a simple guide on how to create Azure App Service: https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-your-first-web-app/ One at West Europe: and one at North Europe: Using FTP, I deployed an one-page html site at both regions. I change the text of both site to say “This Web Site is located at North Europe Azure Datacenter” and “West Europe” to the other. Then create a Front Door. Search for Front Door at Azure marketplace and Create one. This is a high level diagram of the Front Door with two Web Apps design that we will create The “create a Front Door” wizard will start and we can configure it step by step. First we will create a Frontend host by clicking the + at the Step 1 At the frontend host we will create the URL that our apps will be available. I added the papostolidis.azurefd.net. of course later you can add your custom domain and add a CNAME to route the traffic to the Front Door. Then, at the Backend pools (Step 2), press the + to add the web apps. add a name for the backend pool, like “myapps” and press + ADD a backend to add the apps. Select host type, you can add app service, cloud service, storage and custom host (URL). I selected the app service. Select the subscription and the app service and add the correct ports for http and https traffic. The priority defines if the traffic will be routed to the host with the lower priority number (e.g. 1) and if that host fails will route to the next host with bigger priority number (e.g. 2). If you add the same priority to more than one host then it will follow the weight number. The weight number defines the percentage of requests that will be routed to each host. The same way add the second web app Finally select a path, protocol and interval for the probe that will do health checks to the app to define if it is active or not. The third step is to add the routing rules. At the routing rules you can specify: The accepted protocol, http or https. the frontend host for this rule the patterns that the route will accept, like www.e-apostolidis.gr/mysite/* or just /* ro root. Route type forward or redirect. The backend pool that this rule will direct the traffic The protocol that the traffic will be forwarded. Here we define the SSL Offload if we select HTTPs for frontend accepted protocol and HTTP for backend. URL Rewrite rules Caching, for static content caching like CDN. Once all steps are completed we can move on and create the Front Door When the Front Door is ready, we can see the URL at the Overview. And browse our web app using the Front Door URL: How to protect your web apps with Front Door Right now we scaled our web apps. If we use each app’s URL we can still access the app. The first security step is to lock the web apps to be accessed only through the Front Door URL. Checking the Azure Front Door FAQ page, https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq it lists the Front Door’s address rance. Front Door’s IPv4 backend IP space: 147.243.0.0/16 Go to the App Service, at the Networking section, select “Configure Access Restrictions” Add an allow access restriction with the IP range of the Front Door. Automatically a Deny rule will be created for everything else. Add the rule to both web apps and then try to access the apps with their direct links. Now on, we can access the apps only by using the Front Door URL: This is a high level diagram after the restrictions At the next article, we will see how to add Web Application Firewall (WAF) Rules to Front Door, Stay Tuned!! The post Securely scale your Web Apps with Azure Front Door appeared first on Apostolidis IT Corner.
  13. Securely scale your Web Apps with Azure Front Door There is a big buzz out there about Azure Front Door. Is it a Load Balancer? A CDN? A Traffic Manager? A Web Application Firewall ? A Reverse Proxy? An Application Gateway? So, what is Azure Front Door? Azure Front Door actually is all the above and more. It is a global service, that routes web traffic based on performance and availability. A Layer 7 multi-region load balancer with Web Application Firewall (WAF) capabilities, DDoS protection & CDN. Azure Front Door is the entry point, the edge, of all Microsoft’s WAN. All Microsoft services, like Office 365 & Bing, are using Azure Front Door. The services that Azure Front door provides are: Accelerate application performance Increase application availability with smart health probes URL-based routing Multi-site hosting URL redirection Session affinity SSL termination Custom Domain & certificate management Security via custom WAF rules DDoS protection URL rewrite IPv6 and HTTP/2 support At Azure Front Door documentation there is a paragraph that can help to understand the difference between Azure Front Door and other publishing / load balancing Azure solutions and where to use each. Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you are looking for a DNS based global routing and do not have requirements for Transport Layer Security (TLS) protocol termination (“SSL offload”) or per-HTTP/HTTPS request, application-layer processing, review Traffic Manager. If you are looking for load balancing between your servers in a region, for application layer, review Application Gateway and for network layer load balancing, review Load Balancer. Your end-to-end scenarios might benefit from combining these solutions as needed. For pricing information, see Front Door Pricing. How to scale your web apps with Front Door Create two simple Azure Web apps. Check this guide for a simple guide on how to create Azure App Service: https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-your-first-web-app/ One at West Europe: and one at North Europe: Using FTP, I deployed an one-page html site at both regions. I change the text of both site to say “This Web Site is located at North Europe Azure Datacenter” and “West Europe” to the other. Then create a Front Door. Search for Front Door at Azure marketplace and Create one. This is a high level diagram of the Front Door with two Web Apps design that we will create The “create a Front Door” wizard will start and we can configure it step by step. First we will create a Frontend host by clicking the + at the Step 1 At the frontend host we will create the URL that our apps will be available. I added the papostolidis.azurefd.net. of course later you can add your custom domain and add a CNAME to route the traffic to the Front Door. Then, at the Backend pools (Step 2), press the + to add the web apps. add a name for the backend pool, like “myapps” and press + ADD a backend to add the apps. Select host type, you can add app service, cloud service, storage and custom host (URL). I selected the app service. Select the subscription and the app service and add the correct ports for http and https traffic. The priority defines if the traffic will be routed to the host with the lower priority number (e.g. 1) and if that host fails will route to the next host with bigger priority number (e.g. 2). If you add the same priority to more than one host then it will follow the weight number. The weight number defines the percentage of requests that will be routed to each host. The same way add the second web app Finally select a path, protocol and interval for the probe that will do health checks to the app to define if it is active or not. The third step is to add the routing rules. At the routing rules you can specify: The accepted protocol, http or https. the frontend host for this rule the patterns that the route will accept, like www.e-apostolidis.gr/mysite/* or just /* ro root. Route type forward or redirect. The backend pool that this rule will direct the traffic The protocol that the traffic will be forwarded. Here we define the SSL Offload if we select HTTPs for frontend accepted protocol and HTTP for backend. URL Rewrite rules Caching, for static content caching like CDN. Once all steps are completed we can move on and create the Front Door When the Front Door is ready, we can see the URL at the Overview. And browse our web app using the Front Door URL: How to protect your web apps with Front Door Right now we scaled our web apps. If we use each app’s URL we can still access the app. The first security step is to lock the web apps to be accessed only through the Front Door URL. Checking the Azure Front Door FAQ page, https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq it lists the Front Door’s address rance. Front Door’s IPv4 backend IP space: 147.243.0.0/16 Go to the App Service, at the Networking section, select “Configure Access Restrictions” Add an allow access restriction with the IP range of the Front Door. Automatically a Deny rule will be created for everything else. Add the rule to both web apps and then try to access the apps with their direct links. Now on, we can access the apps only by using the Front Door URL: This is a high level diagram after the restrictions At the next article, we will see how to add Web Application Firewall (WAF) Rules to Front Door, Stay Tuned!! The post Securely scale your Web Apps with Azure Front Door appeared first on Apostolidis IT Corner.
  14. Securely scale your Web Apps with Azure Front Door There is a big buzz out there about Azure Front Door. Is it a Load Balancer? A CDN? A Traffic Manager? A Web Application Firewall ? A Reverse Proxy? An Application Gateway? So, what is Azure Front Door? Azure Front Door actually is all the above and more. It is a global service, that routes web traffic based on performance and availability. A Layer 7 multi-region load balancer with Web Application Firewall (WAF) capabilities, DDoS protection & CDN. Azure Front Door is the entry point, the edge, of all Microsoft’s WAN. All Microsoft services, like Office 365 & Bing, are using Azure Front Door. The services that Azure Front door provides are: Accelerate application performance Increase application availability with smart health probes URL-based routing Multi-site hosting URL redirection Session affinity SSL termination Custom Domain & certificate management Security via custom WAF rules DDoS protection URL rewrite IPv6 and HTTP/2 support At Azure Front Door documentation there is a paragraph that can help to understand the difference between Azure Front Door and other publishing / load balancing Azure solutions and where to use each. Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you are looking for a DNS based global routing and do not have requirements for Transport Layer Security (TLS) protocol termination (“SSL offload”) or per-HTTP/HTTPS request, application-layer processing, review Traffic Manager. If you are looking for load balancing between your servers in a region, for application layer, review Application Gateway and for network layer load balancing, review Load Balancer. Your end-to-end scenarios might benefit from combining these solutions as needed. For pricing information, see Front Door Pricing. How to scale your web apps with Front Door Create two simple Azure Web apps. Check this guide for a simple guide on how to create Azure App Service: https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-your-first-web-app/ One at West Europe: and one at North Europe: Using FTP, I deployed an one-page html site at both regions. I change the text of both site to say “This Web Site is located at North Europe Azure Datacenter” and “West Europe” to the other. Then create a Front Door. Search for Front Door at Azure marketplace and Create one. This is a high level diagram of the Front Door with two Web Apps design that we will create The “create a Front Door” wizard will start and we can configure it step by step. First we will create a Frontend host by clicking the + at the Step 1 At the frontend host we will create the URL that our apps will be available. I added the papostolidis.azurefd.net. of course later you can add your custom domain and add a CNAME to route the traffic to the Front Door. Then, at the Backend pools (Step 2), press the + to add the web apps. add a name for the backend pool, like “myapps” and press + ADD a backend to add the apps. Select host type, you can add app service, cloud service, storage and custom host (URL). I selected the app service. Select the subscription and the app service and add the correct ports for http and https traffic. The priority defines if the traffic will be routed to the host with the lower priority number (e.g. 1) and if that host fails will route to the next host with bigger priority number (e.g. 2). If you add the same priority to more than one host then it will follow the weight number. The weight number defines the percentage of requests that will be routed to each host. The same way add the second web app Finally select a path, protocol and interval for the probe that will do health checks to the app to define if it is active or not. The third step is to add the routing rules. At the routing rules you can specify: The accepted protocol, http or https. the frontend host for this rule the patterns that the route will accept, like www.e-apostolidis.gr/mysite/* or just /* ro root. Route type forward or redirect. The backend pool that this rule will direct the traffic The protocol that the traffic will be forwarded. Here we define the SSL Offload if we select HTTPs for frontend accepted protocol and HTTP for backend. URL Rewrite rules Caching, for static content caching like CDN. Once all steps are completed we can move on and create the Front Door When the Front Door is ready, we can see the URL at the Overview. And browse our web app using the Front Door URL: How to protect your web apps with Front Door Right now we scaled our web apps. If we use each app’s URL we can still access the app. The first security step is to lock the web apps to be accessed only through the Front Door URL. Checking the Azure Front Door FAQ page, https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq it lists the Front Door’s address rance. Front Door’s IPv4 backend IP space: 147.243.0.0/16 Go to the App Service, at the Networking section, select “Configure Access Restrictions” Add an allow access restriction with the IP range of the Front Door. Automatically a Deny rule will be created for everything else. Add the rule to both web apps and then try to access the apps with their direct links. Now on, we can access the apps only by using the Front Door URL: This is a high level diagram after the restrictions At the next article, we will see how to add Web Application Firewall (WAF) Rules to Front Door, Stay Tuned!! The post Securely scale your Web Apps with Azure Front Door appeared first on Apostolidis IT Corner.
  15. Securely scale your Web Apps with Azure Front Door There is a big buzz out there about Azure Front Door. Is it a Load Balancer? A CDN? A Traffic Manager? A Web Application Firewall ? A Reverse Proxy? An Application Gateway? So, what is Azure Front Door? Azure Front Door actually is all the above and more. It is a global service, that routes web traffic based on performance and availability. A Layer 7 multi-region load balancer with Web Application Firewall (WAF) capabilities, DDoS protection & CDN. Azure Front Door is the entry point, the edge, of all Microsoft’s WAN. All Microsoft services, like Office 365 & Bing, are using Azure Front Door. The services that Azure Front door provides are: Accelerate application performance Increase application availability with smart health probes URL-based routing Multi-site hosting URL redirection Session affinity SSL termination Custom Domain & certificate management Security via custom WAF rules DDoS protection URL rewrite IPv6 and HTTP/2 support At Azure Front Door documentation there is a paragraph that can help to understand the difference between Azure Front Door and other publishing / load balancing Azure solutions and where to use each. Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you are looking for a DNS based global routing and do not have requirements for Transport Layer Security (TLS) protocol termination (“SSL offload”) or per-HTTP/HTTPS request, application-layer processing, review Traffic Manager. If you are looking for load balancing between your servers in a region, for application layer, review Application Gateway and for network layer load balancing, review Load Balancer. Your end-to-end scenarios might benefit from combining these solutions as needed. For pricing information, see Front Door Pricing. How to scale your web apps with Front Door Create two simple Azure Web apps. Check this guide for a simple guide on how to create Azure App Service: https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-your-first-web-app/ One at West Europe: and one at North Europe: Using FTP, I deployed an one-page html site at both regions. I change the text of both site to say “This Web Site is located at North Europe Azure Datacenter” and “West Europe” to the other. Then create a Front Door. Search for Front Door at Azure marketplace and Create one. This is a high level diagram of the Front Door with two Web Apps design that we will create The “create a Front Door” wizard will start and we can configure it step by step. First we will create a Frontend host by clicking the + at the Step 1 At the frontend host we will create the URL that our apps will be available. I added the papostolidis.azurefd.net. of course later you can add your custom domain and add a CNAME to route the traffic to the Front Door. Then, at the Backend pools (Step 2), press the + to add the web apps. add a name for the backend pool, like “myapps” and press + ADD a backend to add the apps. Select host type, you can add app service, cloud service, storage and custom host (URL). I selected the app service. Select the subscription and the app service and add the correct ports for http and https traffic. The priority defines if the traffic will be routed to the host with the lower priority number (e.g. 1) and if that host fails will route to the next host with bigger priority number (e.g. 2). If you add the same priority to more than one host then it will follow the weight number. The weight number defines the percentage of requests that will be routed to each host. The same way add the second web app Finally select a path, protocol and interval for the probe that will do health checks to the app to define if it is active or not. The third step is to add the routing rules. At the routing rules you can specify: The accepted protocol, http or https. the frontend host for this rule the patterns that the route will accept, like www.e-apostolidis.gr/mysite/* or just /* ro root. Route type forward or redirect. The backend pool that this rule will direct the traffic The protocol that the traffic will be forwarded. Here we define the SSL Offload if we select HTTPs for frontend accepted protocol and HTTP for backend. URL Rewrite rules Caching, for static content caching like CDN. Once all steps are completed we can move on and create the Front Door When the Front Door is ready, we can see the URL at the Overview. And browse our web app using the Front Door URL: How to protect your web apps with Front Door Right now we scaled our web apps. If we use each app’s URL we can still access the app. The first security step is to lock the web apps to be accessed only through the Front Door URL. Checking the Azure Front Door FAQ page, https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq it lists the Front Door’s address rance. Front Door’s IPv4 backend IP space: 147.243.0.0/16 Go to the App Service, at the Networking section, select “Configure Access Restrictions” Add an allow access restriction with the IP range of the Front Door. Automatically a Deny rule will be created for everything else. Add the rule to both web apps and then try to access the apps with their direct links. Now on, we can access the apps only by using the Front Door URL: This is a high level diagram after the restrictions At the next article, we will see how to add Web Application Firewall (WAF) Rules to Front Door, Stay Tuned!! The post Securely scale your Web Apps with Azure Front Door appeared first on Apostolidis IT Corner.
  16. Securely scale your Web Apps with Azure Front Door There is a big buzz out there about Azure Front Door. Is it a Load Balancer? A CDN? A Traffic Manager? A Web Application Firewall ? A Reverse Proxy? An Application Gateway? So, what is Azure Front Door? Azure Front Door actually is all the above and more. It is a global service, that routes web traffic based on performance and availability. A Layer 7 multi-region load balancer with Web Application Firewall (WAF) capabilities, DDoS protection & CDN. Azure Front Door is the entry point, the edge, of all Microsoft’s WAN. All Microsoft services, like Office 365 & Bing, are using Azure Front Door. The services that Azure Front door provides are: Accelerate application performance Increase application availability with smart health probes URL-based routing Multi-site hosting URL redirection Session affinity SSL termination Custom Domain & certificate management Security via custom WAF rules DDoS protection URL rewrite IPv6 and HTTP/2 support At Azure Front Door documentation there is a paragraph that can help to understand the difference between Azure Front Door and other publishing / load balancing Azure solutions and where to use each. Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you are looking for a DNS based global routing and do not have requirements for Transport Layer Security (TLS) protocol termination (“SSL offload”) or per-HTTP/HTTPS request, application-layer processing, review Traffic Manager. If you are looking for load balancing between your servers in a region, for application layer, review Application Gateway and for network layer load balancing, review Load Balancer. Your end-to-end scenarios might benefit from combining these solutions as needed. For pricing information, see Front Door Pricing. How to scale your web apps with Front Door Create two simple Azure Web apps. Check this guide for a simple guide on how to create Azure App Service: https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-your-first-web-app/ One at West Europe: and one at North Europe: Using FTP, I deployed an one-page html site at both regions. I change the text of both site to say “This Web Site is located at North Europe Azure Datacenter” and “West Europe” to the other. Then create a Front Door. Search for Front Door at Azure marketplace and Create one. This is a high level diagram of the Front Door with two Web Apps design that we will create The “create a Front Door” wizard will start and we can configure it step by step. First we will create a Frontend host by clicking the + at the Step 1 At the frontend host we will create the URL that our apps will be available. I added the papostolidis.azurefd.net. of course later you can add your custom domain and add a CNAME to route the traffic to the Front Door. Then, at the Backend pools (Step 2), press the + to add the web apps. add a name for the backend pool, like “myapps” and press + ADD a backend to add the apps. Select host type, you can add app service, cloud service, storage and custom host (URL). I selected the app service. Select the subscription and the app service and add the correct ports for http and https traffic. The priority defines if the traffic will be routed to the host with the lower priority number (e.g. 1) and if that host fails will route to the next host with bigger priority number (e.g. 2). If you add the same priority to more than one host then it will follow the weight number. The weight number defines the percentage of requests that will be routed to each host. The same way add the second web app Finally select a path, protocol and interval for the probe that will do health checks to the app to define if it is active or not. The third step is to add the routing rules. At the routing rules you can specify: The accepted protocol, http or https. the frontend host for this rule the patterns that the route will accept, like www.e-apostolidis.gr/mysite/* or just /* ro root. Route type forward or redirect. The backend pool that this rule will direct the traffic The protocol that the traffic will be forwarded. Here we define the SSL Offload if we select HTTPs for frontend accepted protocol and HTTP for backend. URL Rewrite rules Caching, for static content caching like CDN. Once all steps are completed we can move on and create the Front Door When the Front Door is ready, we can see the URL at the Overview. And browse our web app using the Front Door URL: How to protect your web apps with Front Door Right now we scaled our web apps. If we use each app’s URL we can still access the app. The first security step is to lock the web apps to be accessed only through the Front Door URL. Checking the Azure Front Door FAQ page, https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq it lists the Front Door’s address rance. Front Door’s IPv4 backend IP space: 147.243.0.0/16 Go to the App Service, at the Networking section, select “Configure Access Restrictions” Add an allow access restriction with the IP range of the Front Door. Automatically a Deny rule will be created for everything else. Add the rule to both web apps and then try to access the apps with their direct links. Now on, we can access the apps only by using the Front Door URL: This is a high level diagram after the restrictions At the next article, we will see how to add Web Application Firewall (WAF) Rules to Front Door, Stay Tuned!! The post Securely scale your Web Apps with Azure Front Door appeared first on Apostolidis IT Corner.
  17. Securely scale your Web Apps with Azure Front Door There is a big buzz out there about Azure Front Door. Is it a Load Balancer? A CDN? A Traffic Manager? A Web Application Firewall ? A Reverse Proxy? An Application Gateway? So, what is Azure Front Door? Azure Front Door actually is all the above and more. It is a global service, that routes web traffic based on performance and availability. A Layer 7 multi-region load balancer with Web Application Firewall (WAF) capabilities, DDoS protection & CDN. Azure Front Door is the entry point, the edge, of all Microsoft’s WAN. All Microsoft services, like Office 365 & Bing, are using Azure Front Door. The services that Azure Front door provides are: Accelerate application performance Increase application availability with smart health probes URL-based routing Multi-site hosting URL redirection Session affinity SSL termination Custom Domain & certificate management Security via custom WAF rules DDoS protection URL rewrite IPv6 and HTTP/2 support At Azure Front Door documentation there is a paragraph that can help to understand the difference between Azure Front Door and other publishing / load balancing Azure solutions and where to use each. Azure provides a suite of fully managed load-balancing solutions for your scenarios. If you are looking for a DNS based global routing and do not have requirements for Transport Layer Security (TLS) protocol termination (“SSL offload”) or per-HTTP/HTTPS request, application-layer processing, review Traffic Manager. If you are looking for load balancing between your servers in a region, for application layer, review Application Gateway and for network layer load balancing, review Load Balancer. Your end-to-end scenarios might benefit from combining these solutions as needed. For pricing information, see Front Door Pricing. How to scale your web apps with Front Door Create two simple Azure Web apps. Check this guide for a simple guide on how to create Azure App Service: https://www.e-apostolidis.gr/microsoft/azure/azure-start-point-your-first-web-app/ One at West Europe: and one at North Europe: Using FTP, I deployed an one-page html site at both regions. I change the text of both site to say “This Web Site is located at North Europe Azure Datacenter” and “West Europe” to the other. Then create a Front Door. Search for Front Door at Azure marketplace and Create one. This is a high level diagram of the Front Door with two Web Apps design that we will create The “create a Front Door” wizard will start and we can configure it step by step. First we will create a Frontend host by clicking the + at the Step 1 At the frontend host we will create the URL that our apps will be available. I added the papostolidis.azurefd.net. of course later you can add your custom domain and add a CNAME to route the traffic to the Front Door. Then, at the Backend pools (Step 2), press the + to add the web apps. add a name for the backend pool, like “myapps” and press + ADD a backend to add the apps. Select host type, you can add app service, cloud service, storage and custom host (URL). I selected the app service. Select the subscription and the app service and add the correct ports for http and https traffic. The priority defines if the traffic will be routed to the host with the lower priority number (e.g. 1) and if that host fails will route to the next host with bigger priority number (e.g. 2). If you add the same priority to more than one host then it will follow the weight number. The weight number defines the percentage of requests that will be routed to each host. The same way add the second web app Finally select a path, protocol and interval for the probe that will do health checks to the app to define if it is active or not. The third step is to add the routing rules. At the routing rules you can specify: The accepted protocol, http or https. the frontend host for this rule the patterns that the route will accept, like www.e-apostolidis.gr/mysite/* or just /* ro root. Route type forward or redirect. The backend pool that this rule will direct the traffic The protocol that the traffic will be forwarded. Here we define the SSL Offload if we select HTTPs for frontend accepted protocol and HTTP for backend. URL Rewrite rules Caching, for static content caching like CDN. Once all steps are completed we can move on and create the Front Door When the Front Door is ready, we can see the URL at the Overview. And browse our web app using the Front Door URL: How to protect your web apps with Front Door Right now we scaled our web apps. If we use each app’s URL we can still access the app. The first security step is to lock the web apps to be accessed only through the Front Door URL. Checking the Azure Front Door FAQ page, https://docs.microsoft.com/en-us/azure/frontdoor/front-door-faq it lists the Front Door’s address rance. Front Door’s IPv4 backend IP space: 147.243.0.0/16 Go to the App Service, at the Networking section, select “Configure Access Restrictions” Add an allow access restriction with the IP range of the Front Door. Automatically a Deny rule will be created for everything else. Add the rule to both web apps and then try to access the apps with their direct links. Now on, we can access the apps only by using the Front Door URL: This is a high level diagram after the restrictions At the next article, we will see how to add Web Application Firewall (WAF) Rules to Front Door, Stay Tuned!! The post Securely scale your Web Apps with Azure Front Door appeared first on Apostolidis IT Corner.
  18. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190984 Senior Technician (Air Command and Control System - JFAC Spt)-190984 Primary Location Italy-Poggio Renatico NATO Body NATO Communications and Information Agency (NCI Agency) Schedule Full-time Salary (Pay Basis) : 3,605.34Euro (EUR) Monthly Grade B.4 Description : NATO offers you more than a job. It gives you a mission: bringing together an alliance of 29 diverse nations to build peace and security to more than one billion citizens. At the NCI Agency we are NATO's technology and cyber leaders. We help NATO Nations communicate and work together in smarter ways. Our Vision: A fully digital NATO enterprise that ensures consultation and collective defence. Our Mission: Lead NATO's digital endeavour. The Directorate of Service Operation (DSO) is accountable to plan, install, operate and maintain CIS services throughout the allocated Area of Responsibility (AOR), in static NATO Headquarters, Alliance Operations and Missions and Exercises, and supported Organisations. Service Operations are delivered and managed in close coordination with the Directorates of Applications Services, Infrastructure Services, AirC2 Services and BMD Services. The NCI Agency is looking for a talented Senior Technician (Air Command and Control System – JFAC Spt) to join CIS Support Unit (CSU) Poggio Renatico. If you possess relevant vocational training combined with experience within the area of Systems Administration of complex computer systems and knowledge of AirC2 systems, we would like to meet you! Role responsibilities: Under the direction of the identified Line Manager, you will perform duties such as the following: Install, operate and maintain assigned AMDC2 Systems and software, Databases and other Applications and ICT Platforms (IS), and stay abreast of latest developments in these areas; Support applications and data integrity of assigned ICT Platforms (IS), support IT Service Continuity Management (ITSCM), Business Continuity and Disaster Recovery Plans; Maintain liaison with other CSU internal units, Service Lines and other technical organisations; Document design and configuration of assigned applications and ICT Platforms (IS), and required operating procedures; Implement procedures, tools and techniques for monitoring and managing performance of applications and ICT Platforms (IS), and provide reports as required; Monitor and report on capacity of assigned applications and ICT Platforms (IS); Assist with, and implement, assigned project work packages; Directly support the DACCC Mission through participation in a DACCC Duty Support, which may operate on a 24/7 basis, if required; Directly support AIRCOM Mission through participation in a JFAC Duty Support, which may operate on a 24/7 basis, and in different locations inside and outside NATO boundaries; Deputize for higher-grade staff, if required; Perform other duties as may be required. Person specificationQualifications required: We are looking for a candidate with a Vocational training at a higher level in a relevant discipline, or equivalent, or Diploma of secondary education, and a minimum of 5 years post-related experience. Experience required: In addition to educational requirement, you will also have: Experience within the area of Systems Administration of complex computer systems; Knowledge of AirC2 systems; Ability to take initiative and a flexible approach allowing you to respond reliably and competently to changing requirements in a demanding environment; Excellent command of spoken and written English, with a proven ability to communicate effectively both orally and in writing; Excellent inter-personal skills and the ability to be responsive and sensitive to both external and internal customers and staff. Desirable Experience: The ideal candidate will have all or some of the following: Knowledge of ACCS. Prior experience of working in an international environment comprising both military and civilian elements. Knowledge of NATO responsibilities and organization, including ACO and ACT. Competencies required: We are looking for a person who demonstrates the following behavioural competencies: Working with People - Shows respect for the views and contributions of other team members; shows empathy; listens, supports and cares for others; consults others and shares information and expertise with them; builds team spirit and reconciles conflict; adapts to the team and fits in well; Presenting and Communicating Information - Speaks fluently; expresses opinions, information and key points of an argument clearly; makes presentations and undertakes public speaking with skill and confidence; responds quickly to the needs of an audience and to their reactions and feedback; projects credibility; Writing and Reporting - Writes convincingly; writes clearly, succinctly and correctly; avoids the unnecessary use of jargon or complicated language; writes in a well-structured and logical way; structures information to meet the needs and understanding of the intended audience; Planning and Organising - Sets clearly defined objectives; plans activities and projects well in advance and takes account of possible changing circumstances; identifies and organises resources needed to accomplish tasks; manages time effectively; monitors performance against deadlines and milestones; Achieving Personal Work Goals and Objectives - Accepts and tackles demanding goals with enthusiasm; works hard and puts in longer hours when it is necessary; seeks progression to roles of increased responsibility and influence; identifies own development needs and makes use of developmental or training opportunities. Travel: Business travel to NATO and national (NATO and non-NATO) facilities as well as frequent travel between the NCIA offices; May be required to undertake duty travel to operational theatres inside and outside NATO boundaries. Language skills: A thorough knowledge of one of the two NATO languages, both written and spoken, is essential and some knowledge of the other is desirable. NOTE: Most of the work of the NCI Agency is conducted in the English language. Contract NCI Agency normally offers contracts of employment of a definite duration, not exceeding three years. Contracts may be for less than three years as required to support short-term projects, meet uncertainty with respect to the business outlook, staff performance and other factors. Definite duration contracts may be extended for further periods. When extending contracts, the following is taken into consideration: Renewal is in the interest of the Agency. Staff member's desire to remain with the Agency. The financial situation provides sufficient funding for the post held. The skills, competencies and behaviours, potential and work experience of the staff, versus the requirements of the Agency's work and/or availability of funding. Staff member has served the Agency with performance to the required standard as defined by the Agency, Staff member's deployability to operational theatre. Serving civilian members of NATO will be offered a contract in accordance with the NATO Civilian Personnel Regulations. The first six months of definite duration contracts are a probationary period. During this period the staff member's work is assessed to ensure that he/she has the ability to carry out the duties of the post. At or before the end of the probationary period, the staff member will be notified in writing that the appointment is confirmed or terminated or, in exceptional cases, that the probationary period is extended. What do we offer? Excellent tax-free salary, including (where eligible) expatriation household and children's allowances and additional privileges for expatriate staff. Education allowance for children (where appropriate) and an excellent private health insurance scheme; Generous annual leave and home leave (if eligible). Retirement Pension Plan. To learn more about NCI Agency and our work, please visit our website. Please note: Due to the Agency’s transition into a new structure in the near future, this post may be subject to transfer to one of our other locations, as well as to a change of reporting lines. The final decision will be made at the time of a firm offer. The Agency’s recruitment team advises you that due to the large volume of applications it receives the screening process may take up to 2 months after closing date. We appreciate your patience.
  19. Με γειες !!! :-) Θα ξαναξεκινήσω το blog μου!!! Αλήθεια.. αχχααχχα Καλορίζικη!
  20. Φίλες και φίλοι, Όπως οι περισσότεροι ίσως γνωρίζετε, η πλατφόρμα που υποστηρίζει το autoexec.gr, από το 2014 και πέρα είναι η αναγνωρισμένη πλατφόρμα της Invision Community. H μετάπτωση στην πλατφόρμα αυτή, όπως θα θυμάστε, είχε γίνει επίπονα, όπως όλες οι ματαπτώσεις, από εκείνη της telligent community, η οποία υποστήριξε το αγαπημένο μας autoexec.gr από την δημιουργία του μέχρι το 2014! Η τελέυταία αναβάθμιση, πραγματοποιήθηκε το Σαββατοκύριακο που μας πέρασε και αφορούσε αφενός στον Server που μας φιλοξενεί, αλλά και στην έκδοση του software της πλατφόρμας. Εφαρμόστηκε δηλαδή η τρέχουσα έκδοση του Invision Community που περιλαμβάνει πολλές νέες δυνατότητες όπως και ευκολίες. Στο αμέσως επόμενο χρονικό διάστημα, θα δείτε νέες δυνατότητες να κάνουν την εμφάνιση τους στο autoexec.gr, όπως για παράδειγμα η επιβεβλημένη χρήση του https και των πιστοποιητικών ασφαλείας, έτσι ώστε η επικοινωνία να είναι end-to-end κρυπτογραφημένη. Η ενεργοποίηση του Multi Factor Authentication για τους διαχειριστές. Η ενεργοποίηση πολλαπλών Identity providers, όπως η Microsoft, το LinkedIn, το Twitter και άλλα πολλά. Οι περισσότερες από αυτές τις αλλαγές, θα είναι μιά ευχάριστη έκπληξη στην καθημερινή σας περιήγηση στο autoexec.gr, όμως άλλες, είμαστε βέβαιοι, πως θα σας δυσκολέψουν ή θα σας ενοχλήσουν. Έτσι, στο σημείο αυτό, θα θέλαμε να σας ζητήσουμε, όποια παρατήρηση, όποια ιδέα για κάποια νέα λειτουργία, αλλά και όποιο παράπονο έχετε να μας το μεταφέρετε και εμείς σας υποσχόμαστε πως θα προσπαθήσουμε να το υλοποιήσουμε. Σας ευχαριστούμε, Οι διαχειριστές του autoexec.gr
  21. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190965 Engineer (Systems/System Administration)-190965 Primary Location Netherlands-The Hague NATO Body NATO Communications and Information Agency (NCI Agency) Schedule Full-time Salary (Pay Basis) : 5,781.30Euro (EUR) Monthly Grade A.2 Description : This is a position within the NATO Communications and Information Agency (NCI Agency), an organization of the North Atlantic Treaty Organization (NATO). The NCI Agency is made up of teams of dedicated people from 29 different nations who are technology experts in their chosen fields. Our collective role is to help protect the lives of 1 billion people and contribute to maintaining world peace. The NCI Agency is looking for a talented Engineer (Systems/System Administration) Directorate Air and Missile Defence Command and Control (AMDC2), as part of the NCI Agency, ensures the harmonised planning, implementation, deployment, evolution and support of the Air Command and Control System (ACCS) and other AirC2 assigned programmes, in a way that satisfies the operational requirements and minimizes the military risk, taking into account the NATO political, economic and schedule requirements and using the most suitable industrial and technological solutions. Directorate AMDC2 is the procurement and implementation body of the NCI Agency, charged with the effective planning, execution, delivery into service, evolution and through-life logistic support of NATO’s and assigned national AirC2 systems. The Engineering Branch (ENB) manages, controls, guides and orchestrates all technical aspects of all AirC2-related internal and contracted projects throughout their lifecycle. It provides estimation of the required effort for each project/task and staffs, plans, allocates and manages engineering resources according to agreed priorities. ENB executes overall design responsibility to ensure and harmonize the integrity, technical coherence and interoperability across all AirC2-related based projects throughout product lifecycles (requirements, design, implementation, test support and site support) and across assigned projects. ENB also maintains close coordination with Service Strategy and other key stakeholders across the Agency for technical roadmaps and engineering matters. The Engineering Enabling Section (EES) manages, controls guides and orchestrates all activities of engineering and maintenance resources allocated for Internal CIS support, Documentation and Training. Role Responsibilities Under the direction of Head SES-ISS, you will perform duties such as the following: Provide enterprise administration support to Directorate’s System Engineering and System Test Environments; Co-operate with other Engineering Sections to ensure that required target environment are correctly prepared and configured; Support other Engineering Sections in specifying, designing and implementing new engineering and test environments, and enhancing to existing ones; Install and configure software, data packages and any off-the-shelf components in their target system; Maintain physical and virtual servers and computing environments; Participate as an Operating System (OS) SME in project milestone of Agency projects; Provide training on related OS technology; Participate in daily activities for Second Line Support for systems maintained by EES; When incumbent is assigned to support a project/product, will report to the project leadership on related matters; Liaise with Customer Service Desk for problem resolution, and provide second-line support as required; Deputize for higher grade staff, if required; Perform other duties as may be required. Person Specification We are looking for candidates with a Master of Science (MSc) degree or a Bachelor of Science (BSc) degree at a nationally recognised/certified University in a technical subject, with substantial Information Technology (IT) content or exceptionally, the lack of a university/college degree may be compensated by the demonstration of particular abilities or experience that are of interest to the NCI Agency; that is, at least 10 years extensive and progressive expertise in the duties related to the function of the post. Experience Required In addition to 2 years of experience (Master’s degree) or 4 years of experience (Bachelor’s Degree) in the duties related to the function of the post, we also require the following: Knowledge and experience in network management and system administration functions and technologies; Recent experience in the installation, administration and maintenance of UNIX like (i.e. Solaris, Linux) systems in a network environment; Knowledge of common virtualization and containerization concepts and technologies such as VMWare, HyperV and Docker; Up-to-date knowledge of UNIX operating systems, computer system architectures, client/server, LAN/WAN and network concepts The following will be considered as an advantage Knowledge of, and practical experience in, administering networked systems for different operating systems and their integration; Knowledge of, or practical experience with, IT asset tracking and configuration control tools; Experience of system performance measurement and evaluation; Proof of training in UNIX or Solaris Administration; Knowledge and training in administration of Windows based networks; Prior experience of working in an international environment comprising both military and civilian elements. Knowledge of NATO responsibilities and organization, including ACO and ACT. Competencies Required We are looking for a person who demonstrates the following behavioural competencies: Working with People - Shows respect for the views and contributions of other team members; shows empathy; listens, supports and cares for others; consults others and shares information and expertise with them; builds team spirit and reconciles conflict; adapts to the team and fits in well. Adhering to Principles and Values - Upholds ethics and values; demonstrates integrity; promotes and defends equal opportunities, builds diverse teams; encourages organisational and individual responsibility towards the community and the environment. Relating and Networking - Easily establishes good relationships with customers and staff; relates well to people at all levels; builds wide and effective networks of contacts; uses humour appropriately to bring warmth to relationships with others. Presenting and Communicating Information - Speaks fluently; expresses opinions, information and key points of an argument clearly; makes presentations and undertakes public speaking with skill and confidence; responds quickly to the needs of an audience and to their reactions and feedback; projects credibility. Writing and Reporting - Writes convincingly; writes clearly, succinctly and correctly; avoids the unnecessary use of jargon or complicated language; writes in a well-structured and logical way; structures information to meet the needs and understanding of the intended audience. Applying Expertise and Technology - Applies specialist and detailed technical expertise; uses technology to achieve work objectives; develops job knowledge and expertise (theoretical and practical) through continual professional development; demonstrates an understanding of different organisational departments and functions. Travel Business travel to NATO and national (NATO and non-NATO) facilities as well as frequent travel between the NCI Agency offices; May be required to undertake duty travel to operational theatres inside and outside NATO boundaries. Language Skills A thorough knowledge of one of the two NATO languages, both written and spoken, is essential and some knowledge of the other is desirable. NOTE: Most of the work of the NCI Agency is conducted in the English language. Supervisory/Guidance Duties You may supervise, administer and give professional guidance to staff. Contract NCI Agency normally offers contracts of employment of a definite duration, not exceeding three years. Contracts may be for less than three years as required to support short-term projects, meet uncertainty with respect to the business outlook, staff performance and other factors. Definite duration contracts may be extended for further periods. When extending contracts, the following is taken into consideration: Renewal is in the interest of the Agency. Staff member's desire to remain with the Agency. The financial situation provides sufficient funding for the post held. The skills, competencies and behaviours, potential and work experience of the staff, versus the requirements of the Agency's work and/or availability of funding. Staff member has served the Agency with performance to the required standard as defined by the Agency, Staff member's deployability to operational theatre. Serving civilian members of NATO will be offered a contract in accordance with the NATO Civilian Personnel Regulations. The first six months of definite duration contracts are a probationary period. During this period the staff member's work is assessed to ensure that he/she has the ability to carry out the duties of the post. At or before the end of the probationary period, the staff member will be notified in writing that the appointment is confirmed or terminated or, in exceptional cases, that the probationary period is extended. What do we offer? Excellent tax-free salary, including (where eligible) expatriation household and children's allowances and additional privileges for expatriate staff. Education allowance for children (where appropriate) and an excellent private health insurance scheme; Generous annual leave and home leave (if eligible). Retirement Pension Plan. To learn more about NCI Agency and our work, please visit our website. Please note: Due to the Agency’s transition into a new structure in the near future, this post may be subject to transfer to one of our other locations, as well as to a change of reporting lines. The final decision will be made at the time of a firm offer. The Agency’s recruitment team advises you that due to the large volume of applications it receives the screening process may take up to 2 months. We appreciate your patience.
  22. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190838 Section Head (CIS Support)-190838 Primary Location Italy-Rome NATO Body NATO Defense College Schedule Full-time Salary (Pay Basis) : 5,285.21Euro (EUR) Monthly Grade A.2 Description : SECTION HEAD (CIS SUPPORT), A-2 1. Post Context The Communications & Information Services (CIS) Branch is responsible for the provision of the full range of Information and Technology support to the NDC, including automation, communications, and visual aids. 2. Reporting Lines The incumbent reports to the Branch Head (CIS). The Staff Assistant (CIS Network and Systems) and the Technicians (CIS Network) are reporting directly to this post. 3. Principal Duties The Section Head (CIS Support) is responsible for: - Supporting Branch Head (CIS) in NDC ADP and Communication Systems operations and planning. - Coordinating the activities of the CIS Support Team, managing priorities in accordance with NDC requirements and in coordination with Branch Head. - Providing specialist support for all ADP and Communications issues. - Coordinating ADP and Comms projects. - Maintaining and supervising software, hardware and network integration and interoperability. - Managing and organizing ADP and Communications tasks. - Identifying and customizing COTS products to suit the NDC user’s requirements in the ADP and Communications areas. - Testing and validating all new technical solutions prior implementation for operational use. - Providing ADP/Communications budget inputs. - Supporting the INFOSEC officer in the implementation and management of CIS security services. - Performing configuration control and documentation regarding hardware and software for NDC Information Systems. - Supporting and developing software installation procedures. - Assisting the configuration and development of web portals and related services. - Supporting the NDC connection to the NATO Secret Data Communications Network. - Attending training courses, conferences and seminars relevant to his/her duties. - Providing technical advice to support the: a) Analysis of the Information System's requirements; Writing of functional specifications for all NDC CIS systems requirements and identifying the appropriate technical solutions. 4. Special Requirements and Additional Duties The incumbent may be required to perform additional related duties. 5. Essential Qualifications a. Professional/Experience: - In Team and project management - In system software analysis and programming - Modern data networks technology; system administration experience with Microsoft and UNIX systems and Communications networks - With SharePoint, HTML programming and scripting languages - In network troubleshooting - Microsoft Desktop Operating Systems and Office Application Suites. - In Internet related technology and in the creation and support of web services and online services - Relational Database System design and development - Communications technology, systems and products - In COTS products for system and user support - NATO INFOSEC regulations - ITIL change and configuration management best practices b. Education/Training: Higher secondary education or vocational training in Information or Telecommunication Technology and engineering or similar subjects. Formal ITIL certification. Minimum of five years related professional experience. c. Language Requirements: English SLP 3333 – STANAG 6001. 6. Desirable Qualifications a. Professional/Experience: Knowledge of Java/JavaScript, PHP and in Project Management. b. Education/Training: University degree at a nationally recognized/certified university in a technical subject with substantial Information Technology (IT) content or computer-related areas. Exceptionally, the lack of a university/college degree may be compensated by the demonstration of particular abilities or experience that is/are of interest to NDC; that is, at least 10 years of extensive and progressive expertise in the duties related to the function of the post. c. Language Requirements: French SLP 2222, Italian SLP 2222 – STANAG 6001 7. Civilian Posts Personal Attributes: - Achievement: Works to meet standards - Analytical Thinking: Sees basic relationships - Clarity and |Accuracy: Checks own work - Conceptual Thinking: Sees patterns based on life/work experience - Customer Service Orientation: Takes personal responsibility for correcting problems - Empathy: Reads non/verbal cues and understands meanings - Impact and Influence: Takes multiple actions to persuade - Initiative: Is decisive in a time-sensitive situation - Teamwork: Co-operates Managerial Responsibilities: Supervision of the operation of the organizations automated systems. Professional Contacts: The type of work requires contacts with users, other technical staff, management staff and external firms. Contribution to the Objectives: Organize and support the operations of the automated systems to achieve the Organization’s mission. Assures that whole CIS infrastructure is maintained and functional. 8. Remarks: Security Clearance: NATO Secret 9. Contract Serving NATO civilian staff will be offered a contract according to the NATO Civilian Personnel Regulations. Newly recruited staff will be offered a definite duration contract of normally 2 plus 3 years in duration and followed by an indefinite duration contract. If the successful applicant is seconded from a national administration, he/she will be offered a two year definite duration contract which may be renewed for a further period not exceeding six years and/or the length of the approved secondment. Applications from NATO redundant staff members of the same grade will be considered according to the terms of art. 57.2, Chapter XII to NATO Civilian Personnel Regulations. 10. Additional Information Appointment will be subject to receipt of a Security Clearance (provided by the national authority of the selected candidate) and approval of the candidate’s medical file by the NATO Medical Adviser. Please note that only applications from nationals of NATO member countries can be accepted. Due to the large amount of applications received, telephone or e-mail enquiries cannot be dealt with. In order to follow the status of the vacancy please refer to NDC webpage: www.ndc.nato.int/about/jobs.php NATO is an equal opportunities employer, and does not discriminate on the grounds of gender, race or ethnic origin, religion, nationality, disability, sexual orientation or age, according to the NATO Civilian Personnel Regulations. A written test will be held as part of the selection procedure.
  23. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190939 Job Description - Technician (Database Administration) (190939) Technician (Database Administration)-190939 Primary Location Germany-Ramstein-Miesenbach NATO Body NATO Communications and Information Agency (NCI Agency) Schedule Full-time Salary (Pay Basis) : 4,441.73Euro (EUR) Monthly Grade B.4 Description : Our Vision: A fully digital NATO enterprise that ensures consultation and collective defence. Our Mission: Lead NATO's digital endeavor. The Directorate of Service Operation (DSO) is accountable to plan, install, operate and maintain CIS services throughout the allocated Area of Responsibility (AOR), in static NATO Headquarters, Alliance Operations and Missions and Exercises, and supported Organisations. Service Operations are delivered and managed in close coordination with the Directorates of Applications Services, Infrastructure Services, AirC2 Services and BMD Services. Under coordination of the NCI Agency’s OPS Center, Service Operations Branch (SOB)SOB is locally responsible for the installation, operation, maintenance and administration of assigned IT, Network, Cable, VTC, Voice and Video equipment, as well as all operating system, core and specific application software. SOB ensures physical Security is monitored and maintained, and Cyber Security activities are performed as delegated by Cyber Security SL. The NCI Agency is looking for a talented Database Administrator to join CIS Support Unit (CSU) Ramstein. If you possess relevant vocational training combined with experience within the area of Systems Administration and general background in maintenance of communications and information systems, we would like to meet you! Role Responsibilities: Under the direction of the SOB Branch Head, the post-holder will perform duties such as the following: Responsible for day to day System Administration (SA) of database servers; Installs, operates and maintains assigned Air and Missile Defence Command and Control (AMDC2) Systems and software, Databases and other Applications and Information and Communication Technology (ICT) Platforms (IS) and stays abreast of latest developments in these areas; Supports applications and data integrity of assigned ICT Platforms (IS), supports IT Service Continuity Management (ITSCM), Business Continuity and Disaster Recovery Plans; Maintains liaison with other CSU internal units, Service Lines and other technical organisations; Documents the design and configuration of assigned applications and ICT Platforms (IS) and the required operating procedures; Implements procedures, tools and techniques for monitoring and managing the performance of applications and ICT Platforms (IS) and provides reports as required; Monitors and reports on the capacity of the assigned applications and ICT Platforms (IS); Assists with, and implements assigned project work packages; Directly supports the BMD Mission through participation in a BMD Duty Support Shift, which may operate on a 24/7 basis; Deputize for higher grade staff, if required; Performs other duties as may be required. Person specification Qualifications required: We are looking for a candidate with a Vocational training at a higher level in a relevant discipline, or equivalent, or Diploma of secondary education, and a minimum of 5 years post-related experience. Experience required: In addition to educational requirement, you will also have: At least 5 years extensive and progressive expertise in the duties related to the function of the post; Good knowledge and experience (at least 3 years) of working with AirC2 systems, administering Solaris systems and Oracle databases. Desirable Experience: The ideal candidate will have all or some of the following: Prior experience of working within the communication and infrastructure CIS domain, and Tactical data link services - in particular; experience in network trouble shooting in support of the air specific ICC, and ACCS services; Prior experience of working in an international environment comprising both military and civilian elements; Knowledge of NATO responsibilities and organization, including ACO and ACT. Competencies required: Working with People - Shows respect for the views and contributions of other team members; shows empathy; listens, supports and cares for others; consults others and shares information and expertise with them; builds team spirit and reconciles conflict; adapts to the team and fits in well; Presenting and Communicating Information - Speaks fluently; expresses opinions, information and key points of an argument clearly; makes presentations and undertakes public speaking with skill and confidence; responds quickly to the needs of an audience and to their reactions and feedback; projects credibility; Writing and Reporting - Writes convincingly; writes clearly, succinctly and correctly; avoids the unnecessary use of jargon or complicated language; writes in a well-structured and logical way; structures information to meet the needs and understanding of the intended audience; Planning and Organising - Sets clearly defined objectives; plans activities and projects well in advance and takes account of possible changing circumstances; identifies and organises resources needed to accomplish tasks; manages time effectively; monitors performance against deadlines and milestones; Achieving Personal Work Goals and Objectives - Accepts and tackles demanding goals with enthusiasm; works hard and puts in longer hours when it is necessary; seeks progression to roles of increased responsibility and influence; identifies own development needs and makes use of developmental or training opportunities. Professional Contacts: The post-holder is responsible for: Coordination and cooperation of work with activities in other Service Lines within the NCI Agency; Promotion and maintenance of professional relations with senior officials, both military and civilian, within NATO, the NATO military authorities, and NATO nations - in the area of security accreditation. Supervisory/Guidance Duties: The post-holder may be required to give professional guidance to staff. Travel: Business travel to NATO and national (NATO and non-NATO) facilities as well as frequent travel between the NCIA offices; May be required to undertake duty travel to operational theatres inside and outside NATO boundaries. Language skills: A thorough knowledge of one of the two NATO languages, both written and spoken, is essential and some knowledge of the other is desirable. NOTE: Most of the work of the NCI Agency is conducted in the English language. Contract: NCI Agency normally offers contracts of employment of a definite duration, not exceeding three years. Contracts may be for less than three years as required to support short-term projects, meet uncertainty with respect to the business outlook, staff performance and other factors. Definite duration contracts may be extended for further periods. When extending contracts, the following is taken into consideration: Renewal is in the interest of the Agency. Staff member's desire to remain with the Agency. The financial situation provides sufficient funding for the post held. The skills, competencies and behaviours, potential and work experience of the staff, versus the requirements of the Agency's work and/or availability of funding. Staff member has served the Agency with performance to the required standard as defined by the Agency, Staff member's deployability to operational theatre. Serving civilian members of NATO will be offered a contract in accordance with the NATO Civilian Personnel Regulations. The first six months of definite duration contracts are a probationary period. During this period the staff member's work is assessed to ensure that he/she has the ability to carry out the duties of the post. At or before the end of the probationary period, the staff member will be notified in writing that the appointment is confirmed or terminated or, in exceptional cases, that the probationary period is extended. Please note: Due to the Agency’s transition into a new structure in the near future, this post may be subject to transfer to one of our other locations, as well as to a change of reporting lines. The final decision will be made at the time of a firm offer.
  24. https://vacanciesnew.eda.europa.eu/vacanciesnotice/580 Directorate: Management Team Vacancy title: Chief Information Security Officer (CISO) Contract type: Temporary agent Group: N.A. Grade: AD10 Indicative starting date: 01/04/2020 Level of Security Clearance: SECRET UE/EU SECRET Management of staff: N.A. Location: Brussels Closing date for applications 17/12/2019 1. BACKGROUND The European Defence Agency was established on 12 July 2004, and is governed by Council Decision (CFSP) 2015/1835 defining the statute, seat and operational rules of the European Defence Agency. The Agency has its headquarters in Brussels. The main task of EDA is to support the Council and the Member States in their effort to improve the Union's defence capabilities in the field of crisis management and to sustain the Common Security and Defence Policy (CSDP) as it currently stands and as it develops in the future. The Agency is structured into four directorates. Three operational directorates: Industry, Synergies and Enablers (ISE); Capability, Armament & Planning (CAP); Research, Technology and Innovation (RTI) and the Corporate Services Directorate (CSD). 2. THE AGENCY'S WAY OF WORKING The Agency is an “outward-facing” organisation, constantly interacting with its shareholders, the participating Member States, as well as with a wide range of stakeholders. It works in an integrated way, with multi-disciplinary teams representing all of the Agency’s functional areas, to realise its objectives. Its business processes are flexible and oriented towards achieving results. Staff at all levels need to demonstrate the corresponding qualities of commitment, flexibility, innovation, and team-working; to work effectively with shareholders and stakeholder groups, formal and informal; and to operate without the need for detailed direction. 3. THE MANAGEMENT TEAM The Management Team consists of the Chief Executive (CE), the Deputy Chief Executive (DCE) and the four Directors and is supported by the Policy and Planning Unit and the Media and Communication Unit. 4. DUTIES The European Defence Agency (EDA) is preparing to build and deploy Communication and Information systems (CIS) for the processing of EU unclassified and classified information (EUCI). These systems will be operated and used by EDA in Brussels but will have connections with other unclassified and classified networks operated by EU institutions and by government organisations in EU member states. The project covers all aspects of the implementation, ranging from IT-related activities (such as procurement process, architecture design, vendor management, quality management) to formal accreditation processes, physical security arrangements, document security measures, organisational adjustments, training and awareness activities etc. In order to modernize its handling of information not only from a technical perspective, but also from a policy and process angle, EDA is selecting a Chief Information security Officer to lead the transformation of the organization in all areas related to information security. Reporting directly to the Chief Executive/Deputy Chief Executive, but largely on his own initiative and in close cooperation with the Head of IT and the Head of Security, the CISO will have the following responsibilities: Refine, update and lead the implementation of EDA’s information security policy, considering existing policies and procedures in place for the following layers: personnel security, physical security, security of information, industrial security, exchange of information with third states or international organisations; Define and lead the implementation of EDA’s information security policy, in accordance with other EU-wide policies; Implement and lead appropriate processes to ensure a continuous risk assessment / risk evaluation for information security as mandated by EU Policy for EUCI handling; Oversee classification / declassification of information between security domains, following appropriate policies; Define and lead the implementation of EUCI security management instructions, and establish appropriate monitoring processes, in accordance with the risk management process; EUCI Security lifecycle management; Refine and lead the implementation of effective business continuity / disaster recovery procedures following appropriate EUCI policies; Refine and lead the implementation of effective information security incident management procedures following appropriate EUCI policies; Oversee and lead project management activities on EUCI-related CIS projects; Act as the Agency reference point for all activities related to EUCI handling both internally and externally, i.e. liaise with counterparts in other EU institutions (in particular the EU Council, identified as the Security Accreditation Authority for any information security system in EDA) and member states. Duties may evolve according to development of the EDA’s structure and activities, and the decisions of EDA management. 5. QUALIFICATIONS AND EXPERIENCE REQUIRED a. Conditions for eligibility General be a national of a Member State participating in the Agency; be entitled to his/her full rights as a citizen; have fulfilled any obligations imposed on him/her by the laws concerning military service; produce the appropriate character references as to his/her suitability for the performance of his/her duties; be physically fit to perform his/her duties; have a thorough knowledge of one of the languages of the participating Member States and a satisfactory knowledge of another of these languages to the extent necessary to discharge his/her duties; have no personal interest (financial, family relationship, or other) which could be in conflict with disinterested discharge of his/her duties within the Agency; hold, or be in a position to obtain, a valid Personnel Security Clearance Certificate (national or EU PSC at SECRET UE/EU SECRET level). Personnel Security Clearance Certificate (PSCC) means a certificate issued by a competent authority establishing that an individual is security cleared and holds a valid national or EU PSC, and which shows the level of EUCI to which that individual may be granted access (SECRET UE/EU SECRET), the date of validity of the relevant PSC and the date of expiry of the certificate itself; have a level of education which corresponds to completed university studies attested by a diploma when the normal period of university education is four years or more, or a level of education which corresponds to completed university studies attested by a diploma and appropriate professional experience of at least one year when the normal period of university education is at least three years or be a graduate of a national or international Defence College. Only diplomas that have been awarded in EU Member States or that are the subject of equivalence certificates issued by the authorities in the said Member States shall be taken into consideration. In the latter case, the authority authorised to conclude contracts of employment reserves the right to request proof of such equivalence. b. Essential selection criteria (1) Professional The candidate will be required to demonstrate that he/she has: a consistent track record of successful project delivery in a military or civilian organisation handling classified and unclassified information on a daily basis; a minimum of 10 years of experience in Information Security, in roles of growing responsibility; a minimum of 5 years of experience leading information security teams in medium to large organisations dealing with responsibilities similar to the ones detailed above; a deep understanding of the role of Information Security policy in large organisations; one or more formal certifications in Information Security, such as CISSP (Certified Information Systems Security Professional); detailed knowledge of a formal project management methodology (PMI or PM2 are preferred); detailed knowledge or certified knowledge of information systems governance frameworks (such as COBIT5/COBIT2019, CGEIT) and functions; extensive experience with organisational change management and business transformation in large organisations or military organisations; very good knowledge of ICT and Cyber-security markets structure, challenges, players and state-of-the-art; good understanding of IT systems architectures, security implications, classified systems accreditation process; a very good knowledge of written and spoken English. (2) Personal All staff must be able to fit into the Agency's way of working (see para. 2). Other attributes important for this post include: excellent people networking skills, capable of identifying and establishing successful relationships with key stakeholders and decision-makers; proven ability to establish effective relations at CxO level with senior decision-makers, from both civilian and military environments; excellent communication and presentational skills, both written and oral; ability to work independently and collaboratively; ability to work effectively in a multicultural environment; proven ability to present complex information in an easily understandable way, communicating in plain English and avoiding unnecessary jargon; flexibility and innovativeness; a genuine commitment to the Agency's objectives. c. Desirable The following will be considered an advantage: experience with EUCI handling environments in an international/defence environment; experience with defining, implementing and monitoring Information Security policies in large organisations; experience with managing large Projects with strong impact on the core mission of the organisation; experience with implementation of ICT systems for classified information handling, either at national or international scale; experience with multicultural, multinational environments; experience with ICT systems lifecycle management; hold a valid Personnel Security Clearance Certificate (national or EU PSC at SECRET UE/EU SECRET level). 6. INDEPENDENCE AND DECLARATION OF INTEREST The Chief Information Security Officer (CISO) will be required to make a declaration of commitment to act independently in the Agency’s interest and to make a declaration in relation to interests that might be considered prejudicial to his/her independence. 7. APPOINTMENT AND CONDITIONS OF EMPLOYMENT Recruitment will be subject to approval of the 2020 staff establishment plan by the Agency's Steering Board. The Chief Information Security Officer (CISO) will be appointed by the Chief Executive. Recruitment will be as a member of the temporary staff of the Agency for a four-year period. Renewal is possible within the limits set out in the EDA Staff Regulations. The successful candidate will be recruited as Temporary Agent, grade AD10. The pay for this position consists of a basic salary of 8.876,57€ supplemented with various allowances, including as applicable expatriation or family allowances. The successful candidate will be graded on entry into service according to the length of his/her professional experience. Salaries are exempted from national tax, instead an Agency tax at source is paid. For further information on working conditions please refer to: https://eda.europa.eu/jobs/what-we-offer Failure to obtain the requisite security clearance certificate before the expiration of the probationary period may be cause for termination of the contract. Candidates are advised that part of the recruitment process includes medical analyses and physical check-up with the Agency’s Medical Adviser. Applications are invited with a view to establishing a reserve list for the post of Chief Information Security Officer (CISO) at the EDA. This list is valid until 31/12/2021, and may be extended by decision of the Chief Executive. During the validity of the reserve list, successful candidates may be offered a post in the EDA according to their competences in relation to the specific requirements of the vacant post. Inclusion on the reserve list does not imply any entitlement of employment in the Agency. 8. EQUAL OPPORTUNITIES The EDA is an equal opportunities employer and accepts applications without distinction on the grounds of age, race, political, philosophical or religious conviction, sex or sexual orientation and regardless of disabilities, marital status or family situation. 9. APPLICATION PROCEDURE Candidates must submit their application electronically solely via the EDA website. Applications by any other means (hard copy or ordinary e-mail) will not be accepted. Applications must be submitted no later than midnight. Candidates are reminded that the on-line application system will not accept applications after midnight (Brussels time, GMT+1) on the date of the deadline. When applying, candidates from Ministries of Defence or other governmental entities are encouraged to inform their national administration. A selection panel will be appointed. Please note that the selection panel's internal proceedings are strictly confidential and that any contact with its members is forbidden. Each application will be screened based on the requirements of the job profile stated in the vacancy notice. The most suitable applicants will be called for an interview and a written test. If recruited, you will be requested to supply documentary evidence in support of the statements that you make for this application. Do not send any supporting or supplementary information until you have been asked to do so by the Agency. Please note that once you have created your EDA profile, any correspondence regarding your application must be sent or received via your EDA profile. For any prior enquiry, please refer to the FAQ (Frequently asked questions) section, or send an e-mail to recruitment@eda.europa.eu. 10. DATA PROTECTION Please note that EDA will not return applications to candidates. The personal information EDA requests from candidates will be processed in line with Regulation (EU) N° 2018/1725 of the European Parliament and of the Council of 23 October 2018 on the protection of natural persons with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement of such data, and repealing Regulation (EC) 45/2001 and Decision No. 1247/2002/EC. The purpose of processing personal data which candidates submit is to manage applications in view of possible pre-selection and recruitment at EDA. More information on personal data protection in relation to selection and recruitment can be found on the EDA website: http://www.eda.europa.eu/jobs/dataprotection
  25. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190911 Engineer (Information Systems)-190911 Primary Location Netherlands-Brunssum NATO Body NATO Communications and Information Agency (NCI Agency) Schedule Full-time Salary (Pay Basis) : 5,781.30Euro (EUR) Monthly Grade A.2 Description : NATO offers you more than a job. It gives you a mission: building peace and security for one billion people in Europe and North America. The NATO Communications & Information Agency is leading NATO’s Digital Endeavour. We are NATO’s technology and cyber leaders, helping NATO Nations to communicate and work together in smarter ways. Our work is challenging and meaningful, and you will develop and apply your expertise as part of a dynamic international team of civilian and military professionals. Come and be part of the most successful alliance in history. NATO Communications and Information Agency (NCI Agency) is looking for a Engineer (Information Systems). The Director of Service Operation (DSO) is accountable to plan, install, operate and maintain CIS services throughout the allocated Area of Responsibility (AOR), in static NATO Headquarters, Alliance Operations and Missions and Exercises, and supported Organizations. Service Operations are delivered and managed in close coordination with the Directorates of Applications Services, Infrastructure Services, AirC2 Services and BMD Services. DSO and the CSUs receive support from the Agency’s Enabler functions (General Services, Human Resources, Finance, and Acquisition). NCI Agency CIS Support Unit (CSU) Brunssum, located in Brunssum (NLD) enables end-to-end CIS services as it installs, operates, maintains and supports the full range of CIS capabilities during peacetime, crisis and war throughout its allocated Area of Responsibility (AOR) and as otherwise directed. The Alternate Ops Centre is hosted in Brunssum, resourced by Primary Ops Center and supported by the CSU. The Service Management Branch (SMB) supports the Agency’s Operations Centre, and Service Lines, and is responsible for liaison with all NCI Agency customers in the CSU’s AOR and supports the Commander CSU in the role as NCI Agency representative and provides a single entry point for customers. SMB contributes and/or conducts monitoring and measurement of customer satisfaction. SMB supports the management of all agreements concerning Service Provision, Operations and Exercises within the CSU AOR. SMB supports Service Lines in the implementation and improvement of service management processes. This branch directs, co-ordinates and supervises all activities of CSU’s assigned resources in support of Exercises, Operations, Plans, Requirements, Project and Service Management. SMB reports appropriate Key Performance Indicators to Service Lines on a regular basis. Change Management Section (CMS) is responsible for all aspects of Configuration Management including software license management and software version control. It is responsible for Change and Release Management and Problem Management processes and procedures. Role Responsibilities Under the direction of Head SMB, but largely on own initiative, the incumbent will perform duties such as the following: Manages and/or supports the organization configuration management system and champions the business value and company policies for secure configuration management; Ensures that processes are in place for consistent classification and management of CIs, and for verification and audit of configuration records; Contributes strongly to the business service knowledge management system; Manages the research and development of tools, processes and techniques; Manages configuration items (CIs) and related information, investigates and implements tools, techniques and processes for managing CIs and verifies that related information is complete, current and accurate; Controls IT assets in one or more significant areas, ensuring that administration of the acquisition, storage, distribution, movement and disposal of assets is carried out; Produces and analyses registers and histories of authorized assets (including secure master copies of software, documentation, data, licenses and agreements for supply, warranty and maintenance), and verifies that all these assets are in a known state and location, acts to highlight and resolve potential instances of unauthorized assets such as unlicensed copies of software; As a member of Change advisory Board (CAB) member, advises the board in Configuration management matters related to the implementation of changes; Ensures that relevant NATO and international configuration management standards are appropriately implemented and that best practices are considered Provides technical leadership, coaching, mentoring and training on a regular basis to CSU staff, and CISPOCS, in respect to CM processes and tools; Deputizes for higher grade staff, if required; Performs other duties as may be required. Qualifications Required: A Master of Science (MSc) degree at a nationally recognized/certified University in a related subject (Communication and Information Systems related, scientific or engineering discipline) and 2 years post-related experience in a similar post encompassing configuration management system, knowledge management and IR asset management; Or a Bachelor of Science (BSc) degree at a nationally recognized/certified University in a related subject (Communication and Information Systems related, scientific or engineering discipline) and 4 years post related experience in a similar post encompassing configuration management system, knowledge management and IR asset management; Or exceptionally, the lack of a university/college degree may be compensated by the demonstration of a candidate’s particular abilities or experience that is/are of interest to NCI Agency; that is, at least 10 years extensive and progressive expertise in the duties related to the function of the post; Experience required: Recent experience of working in a leading role; Experience in technical management and operation of Communications and Information Systems; Good general knowledge in the operation and administration of large computer networks, comprised of numerous LAN segments and servers including state of the art operating systems, network architectures and administration principles; System analysis principles in order to direct and guide Information Systems development Knowledge and experience in the preparation and implementation of new or changed services and in management of the change process; Knowledge and experience with conducting and documenting configuration audits, as well as development and implementation of correction and improvement plans. Further it would be considered highly desirable if you are able to display any experience or knowledge of: ITIL Service Transition graduate; Prior experience of working in an international environment comprising both military and civilian elements; Knowledge of NATO responsibilities and organization, including ACO and ACT. Competencies Required: Working with People - Shows respect for the views and contributions of other team members; shows empathy; listens, supports and cares for others; consults others and shares information and expertise with them; builds team spirit and reconciles conflict; adapts to the team and fits in well. Persuading and Influencing - Gains clear agreement and commitment from others by persuading, convincing and negotiating; makes effective use of political processes to influence and persuade others; promotes ideas on behalf of oneself or others; makes a strong personal impact on others; takes care to manage one’s impression on others. Applying Expertise and Technology - Applies specialist and detailed technical expertise; uses technology to achieve work objectives; develops job knowledge and expertise (theoretical and practical) through continual professional development; demonstrates an understanding of different organizational departments and functions. Analyzing - Analyses numerical data and all other sources of information, to break them into component parts, patterns and relationships; probes for further information or greater understanding of a problem; makes rational judgments from the available information and analysis; demonstrates an understanding of how one issue may be a part of a much larger system. Language Skills Most of the work of the NCI Agency is conducted in the English language, and therefore a thorough knowledge of English, both written and spoken, is essential. Travel Occasional business travel to NATO, national (NATO and non-NATO) facilities and between the NCIA offices may be required May be required to undertake duty travel to operational theatres inside and outside NATO boundaries. What do we offer? Excellent tax-free salary, including (where eligible) expatriation household and children's allowances and additional privileges for expatriate staff. Education allowance for children (where appropriate) and an excellent private health insurance scheme. Generous annual leave and home leave (if eligible). Retirement Pension Plan. To learn more about NCI Agency and our work, please visit our website. The Agency’s recruitment team advises you that due to the large volume of applications it receives the screening process may take up to 2 months after closing date. We appreciate your patience.
  26. https://nato.taleo.net/careersection/2/jobdetail.ftl?lang=en&job=190908 Senior Project Manager (Cyber Security)-190908 Primary Location Belgium-Mons NATO Body NATO Communications and Information Agency (NCI Agency) Schedule Full-time Salary (Pay Basis) : 6,746.10Euro (EUR) Monthly Grade A.3 Description : NATO offers you more than a job. It gives you a mission: building peace and security for one billion people in Europe and North America. The NATO Communications & Information Agency is leading NATO’s Digital Endeavour. We are NATO’s technology and cyber leaders, helping NATO Nations to communicate and work together in smarter ways. Our work is challenging and meaningful, and you will develop and apply your expertise as part of a dynamic international team of civilian and military professionals. Come and be part of the most successful alliance in history. Based in Mons, you will join the Agency as we embark on a journey to refresh and transform our cyber security services to support NATO’s Digital Endeavour. You will be responsible for projects delivering cutting edge technologies ensuring the cyber security of NATO’s communication and information systems. You will be supported by a team of bright, motivated tech savvy engineers and scientists who all strongly believe that sky is the limit. Main Role Responsibilities: Lead the management of major procurement projects in the area of Cyber Security; Support reporting and communications with the Cybersecurity Service Line and NCIA’s top management, in order to ensure projects are monitored and controlled across all management levels; Monitor and control project progress to ensure resources are consumed in accordance with the approved budget and within the approved timelines; Identify, plan, request and manage the deployment of resources to meet project milestones and initiate corrective actions when necessary; Stay abreast of technological developments in the area of Cybersecurity; Qualifications & experience required: A Master of Science (MSc) degree at a nationally recognised/certified University in a related discipline with 5 years post related experience; Or a Bachelor of Science (BSc) degree at a nationally recognised/certified University in a related subject with 7 years post related experience; Or exceptionally, the lack of a degree may be compensated by a lower academic qualification combined with the demonstration of particular abilities or experience of relevance to this post, or with a military experience in a related subject; A formal project management qualification such as PRINCE 2 or PMI PMP; Extensive experience in the management of large Cybersecurity projects; Proactive attitude in seeking and maintaining trust from stakeholders; Proven ability to communicate effectively orally and in writing with good briefing skills. Desirable Experience and Education: Extensive experience with the MS-EPM Toolset Knowledge and experience with the practical implementation of large ICT projects in the area of Cyber Security Industry leading certification in the area of Cybersecurity such as CISSP, CISM Prior experience of working in an international environment comprising both military and civilian elements Knowledge and experience with NATO’s procurement process for large ICT projects Competencies required: Deciding and Initiating Action Leading and Supervising Adhering to Principles and Values Relating and Networking Formulating Strategies and Concepts Achieving Personal Work Goals and Objectives What do we offer? Competitive tax-free salary, including (where eligible) expatriation household and children's allowances and additional privileges for expatriate staff Education allowance for children (where appropriate) and an excellent private health insurance scheme Generous annual leave and home leave (if eligible) Retirement Pension Plan 3-Year contract, renewable. To learn more about NCI Agency and our work, please visit our website. A full copy of the job description can be found here
  27. Καλησπέρα Μπορούν pc με winXp Pro όπου είναι σε workgroup αυτή την στιγμή, να κάνουν join σε 2019 Domain Ευχαριστώ
  1. Load more activity
×
×
  • Create New...