current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to … hire security researchers who have historically worked outside of AI, such as in - non-exhaustively - computersecurity, information security, web technology policy, and hardware security. Diverse perspectives and research interests are welcomed. The Team seeks people with skillsets leaning in the direction of either or both of Research Scientist and Research Engineer, recognising that some technical … seniority and experience. Person Specification You may be a good fit if you have some of the following skills, experience and attitudes: Experience working on machine learning, AI, AI security, computersecurity, information security, or some other security discipline in industry, in academia, or independently. Experience working with a world-class research team comprised of More ❯
We are seeking a full-time contractor or employee for a Senior DevSecOps Security Engineer role.Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives. Analyzes user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyze current operational … forms of data input, how data is to be; summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program. Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system.Responsibilities: Supports TIERS Operations, AWS Cloud Migration … and the Authority to Connect project. Applies information security threat intelligence to identify and exploit vulnerabilities across various environments. Performs daily analysis of both on-premises and cloud security operations. Brings experience from large-scale operations and development environments, with knowledge of custodian artifacts and regulatory requirements. Assists IT operations and development teams in meeting industry standards while More ❯
Immediate need for a talented Sr. Security Analystnbsp;This is a 12+ Months Contract opportunity with long-term potential and is located inAtlanta, GA. Please review the job description below and contact me ASAP if you are interested.Job ID: 25-81987 Pay Range: $3646/hour. Employee benefits include, but are not limited to, health insurance (medical, dental, vision … k) plan, and paid sick leave (depending on work locationKey Responsibilities: Responsible for analyzing the information security environment and assisting with the development of security measures to safeguard information against accidental or unauthorized modification, destruction, or disclosure. Work with management, development personnel, risk staff, auditors, facilities, and security department personnel to identify and implement security plans … to ensure that all information assets are appropriately safeguarded, including the following:, software applications, hardware, telecommunications, and computer installations. Determine methods of implementing and enforcing security policies. Responsible for maintaining a high level of user trust and confidence in the groups knowledge of and concern for security of systems, while working on multiple network security projects. More ❯
Position: Security Analyst Location: Tallahassee FL- Onsite Duration: Through 6/30/26 Parking: Parking will be offered if space becomes available; however, the cost of parking payable to the Department or through third-party commercial garages shall be the responsibility of the Contractor. Job/Position Description The Security Analyst is responsible for providing daily support … to the Department's information security infrastructure, including working with the Department and Florida Digital Services (FLDS) staff, and providing Tier 3 information security support for the Department's customers. The Candidate will report directly to the Information Security Operations Manager. The duties and responsibilities of this position are as follows: Assists with planning, implementing, and tuning … the Department's Managed Security Services, Security Information and Events Management (SIEM), and vulnerability management; Supports NextGen Firewall security tools and maintains the site block list; Supports and maintains endpoint detection and response and antivirus software functionality onservers and client systems; Monitors Intrusion Detection/Prevention Systems (IDS/IPS) for information security threats and advises More ❯
of the Role The Head of IT is responsible for providing comprehensive IT services to support academics, staff, students, and visitors across the College, while managing the institution's computer systems and network infrastructure. This role demands adaptability to the rapid evolution of both hardware and software technologies, alongside the growing and diverse needs of the user population. Given … all user groups-staff, students, academics, and visitors-through troubleshooting, helpdesk services, and ensuring the smooth operation of all systems. 2. System and Network Management Overseeing the administration of computer systems, servers, and network infrastructure to ensure optimal performance, security, and uptime. 3. Strategic Planning and Implementation Planning, executing, and managing IT projects, system upgrades, and ensuring that … changes in the academic calendar, emergencies, or periods of peak usage. This includes ensuring IT services are maintained during critical times, such as exams, deadlines, or unforeseen issues. 6. Security Implementing and managing robust security protocols to protect systems, networks, and data. This includes overseeing firewalls, encryption, and access control measures. Essential Skills and Experience A relevant degree More ❯
Binghamton University, State University of New York
more on their research. Reporting to the Research Computing Support Manager, the Research System Administrator designs and implements hardware and software solutions in research environments, with a focus on security and compliance. This role serves as a technical resource for faculty and researchers by identifying appropriate technology solutions and providing comprehensive support, including installation, configuration, troubleshooting, and maintenance of … new research services, such as enabling confidential research by creating a secure environment on campus (NIST 800-171, CMMC). Collaborating with ITS staff and research faculty to review security requirements for research data use agreements or grants. Drafting, reviewing, and updating policies/procedures to fulfill SOC 2 requirements. Providing required evidence to external auditors meeting SOC … compliance needs. Building, maintaining, and analyzing dashboards for auditing, performance, and general security purposes. Working closely with the Research Support team manager as well as the Chief Information Security Officer (CISO) to ensure compliance with all relevant policies and procedures relating to secure research. Requirements: Bachelor's degree in Computer Science or a related field OR Associate More ❯
Atomic Weapons Establishment, Aldermaston, Reading, Berkshire, England
AWE PLC
into different placements within the HPC group. During these placements, you will learn a range of skills, including: Linux operating system administration (installation, configuration and management) Linux shell scripting Computer hardware (building/repairing) Networking File system management Computersecurity concepts System monitoring and fault diagnosis Customer interaction and problem investigation Training is primarily in-house but … one extraordinary mission: keeping the UK safe and secure. The UK’s independent nuclear deterrent has existed for 75 years to deter the most extreme threats to our national security and way of life, helping to guarantee our safety, and that of our NATO allies. Our work is critical. We’re delivering Astraea, the next warhead for the UK More ❯