Baltimore, Maryland, United States Hybrid / WFH Options
Northrop Grumman
Redhat Systems Administrator for a classified government contract. Perform as a Windows Systems Administrator for a classified government contract. Maintain smooth operation of all computer infrastructure in a multi-user computer system environment, including coordination of efforts with systems, software, and electrical design engineers, Information Systems Security … services, manage data storage devices, and implement/upgrade/update virus and malware protection on a routine basis. Create and maintain user and computer accounts and modify file permissions and security access lists. Test new releases of products to ensure compatibility and minimize user impact. Develop and … software, and system components. Interact, meet, discuss, and troubleshoot issues with vendors and evaluate vendor products, services, and suggestions. Adhere to strict Information Systems security guidelines in all cases. Familiarity with DoD STIGs, deploying new STIGs & working with IT/IA to develop POA&Ms for vulnerabilities that cannot more »
To be considered for this opportunity, you'll need the following: Experience of Linux operating systems Scripting skills (preferably Python and Bash) Awareness of computersecurity concepts Able to work independently and unsupervised, as well as part of a team Good communication skills Ability to work fully on … You will be required to prepare a 10-minute presentation in advance. Candidates must be willing and able to obtain and maintain the necessary security clearance for the role. This will be funded by AWE. #LI-KT * Agencies: Please note that we do not out-source our recruitment more »
bristol, south west england, United Kingdom Hybrid / WFH Options
Logiq Consulting
in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, Internal IT Security Analyst (SOC Analyst). The role will be reporting to our Head of Internal Security, and sit within our newly created Internal Security Assurance Practice. The ideal candidate will have current or recent experience working in a government security advisory role, ideally within Defence or Security organisations. Responsibilities As Logiq IT Security Operations Analyst you will work within a close-knit team and be responsible for: Monitoring the company … IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and prioritisation of security incidents and vulnerabilities. Collaborate with other team members to further investigate incidents and propose more »
Nottingham, Ruddington, Nottinghamshire, United Kingdom Hybrid / WFH Options
Kirkland Associates
Software Developer - The Role: Manage, develop & test software systems Ensure interface integrity Continually refine systems and stay ahead of new technological developments Team Mentoring Computersecurity Software Developer - Requirements: C# ASP.NET Webforms ASP.NET MVC Microsoft Visual Studio (2019+) Mobile App Development IT related qualification Software Developer - The Candidate more »
To be considered for this opportunity, you'll need the following: Experience of Linux operating systems Scripting skills (preferably Python and Bash) Awareness of computersecurity concepts Able to work independently and unsupervised, as well as part of a team Good communication skills Ability to work fully on … You will be required to prepare a 10-minute presentation in advance. Candidates must be willing and able to obtain and maintain the necessary security clearance for the role. This will be funded by AWE. #LI-KT * Agencies: Please note that we do not out-source our recruitment more »
Description Leidos Defense Systems is seeking a full-time Penetration Tester - Security Engineer to perform penetration tests on customer systems in the defense, space, cyber, and commercial fields. The ideal candidate will possess strong technical skills, including proficiency in networking, operating systems, and programming, as well as the ability … threats against customer systems, networks, and assets including identifying and analyzing cyber threats actors and/or activities. Qualifications: Bachelor's degree in Cyber Security, Computer Science, Computer Engineering, Electrical Engineering, or related Technical Degree. Four years of experience in penetration testing/red teams or related … security field, or a Master's degree in a related field with + two years of experience. Proficient with Linux (preferably Kali, Parrot, or similar distros) and Windows Operating systems Experience with using scripting languages such as bash, python, etc. Strong background in computersecurity, administration, forensics more »