or related discipline from an accredited college or university (or 14 years total ISSO experience) • Certification: DoD 8570 compliance with IAM Level I or higher (CAP, CND, GSLC, CISM, CISSP, or equivalent) • Clearance: Active security clearance with ability to maintain Technical Expertise • Proficiency with security assessment and authorization tools, particularly LatteArt, ScanBoy, Biscotti, Sear, and Exacta • Deep understanding of More ❯
Qualifications Active Top Secret/Sensitive Compartmented Information (TS/SCI) with CI Polygraph. Bachelor's degree or equivalent training and experience. Minimum of 12 years of relevant experience. CISSP, CompTIA Security+, or other equivalent security certification. Hands-on experience with the SPLUNK platform. Strong communication skills-oral, written, and interpersonal. Proven problem-solving skills and ability to prioritize More ❯
experience with IA vulnerability assessments and tools such as NMap, ACAS/Nessus, and SCAP utilities. - Must meet IAT/IAM Level II certification requirements (e.g., Security+ CE, CAP, CISSP). - Solid communication and interpersonal skills to facilitate collaboration across technical and leadership teams. - U.S. Citizenship and possession of at least Secret-level security clearance. Preferred Qualifications: - Bachelor's More ❯
Support ongoing cycles of integration, deployment, monitoring, and feedback Required Qualifications 3-10 years of relevant experience in computer/network security design, analysis, testing, and implementation Security+ certification CISSP or NSA equivalent certification IAM Level II compliance (DoD 8570.01) and familiarity with Risk Management Framework (RMF) Strong background in DevSecOps practices and Linux environments Effective communicator across technical More ❯
compliance frameworks (RMF, NIST SP 800-53, 800-207, 8140/8570). IAM/DoD Certification IAT Level II (e.g., Security+ CE, SSCP, GSEC) Preferred: Advanced Certs (Preferred)CISSP, ISSAP, ISSEP, ISSMP, CISM, CAP Experience supporting DoD or Federal government environments. Familiarity with Zero Trust Network Access (ZTNA) and continuous authentication models. Strong communication skills with ability to More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
skills, both written and verbal Ability to plan, organise and follow through on assigned tasks and complete with little or no prompting from management Excellent attention to detail Attained CISSP or similar certification About us: AJ Bell is one of the fastest-growing investment platform businesses in the UK offering an award-winning range of solutions that caters for More ❯
Salford, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
skills, both written and verbal Ability to plan, organise and follow through on assigned tasks and complete with little or no prompting from management Excellent attention to detail Attained CISSP or similar certification About us: AJ Bell is one of the fastest-growing investment platform businesses in the UK offering an award-winning range of solutions that caters for More ❯
management, and stakeholder engagement skills. Strong analytical, problem-solving, and decision-making abilities. Ability to produce clear, concise, and executive-ready risk reporting. Professional certifications desirable (e.g., CRISC, CISM, CISSP, CISA). Who we are At Pearson, our purpose is simple: to help people realize the life they imagine through learning. We believe that every learning opportunity is a More ❯
oriented, dependable, flexible, open-minded individual with an eagerness to learn with demonstrated strong work ethic • Demonstrated forward thinking and proactive problem-solving skills • CCNA and/or CCNP, CISSP, Security+ certification Preferred Qualifications: • Experience working in an acquisition program office environment, with documentation, protocols, formats, and deadlines Why Join Cyber Defense Technologies? At CDT, we offer a collaborative More ❯
Science, Cybersecurity, or related field -Demonstrated technical proficiency in RMF processes, A&A toolsets and secure system operations -Proficiency in threat and vulnerability management PREFERRED QUALIFICATIONS: -Certifications such as CISSP, CISM or IAM II -Experience managing accreditation packages for cross domain solutions, cloud environments, or tactical systems -Excellent communication skills for interfacing with clients and leadership on security posture More ❯
Secret Clearance Preferred Skills: Familiarity with federal security compliance frameworks (e.g., NIST 800-53, FISMA) Exposure to GRC platforms, scripting, or ticketing systems Interest in certifications such as Security+, CISSP, or Certified Ethical Hacker (CEH) Education: Bachelor's Degree Salary More ❯
security risks, recommending proportionate improvements. Review existing controls and propose enhancements to strengthen resilience. Support business development by cultivating strong client relationships. Essential Skills & Experience Recognised industry certifications (e.g. CISSP, CISM, CISA). Demonstrable experience in a cyber security role. Strong understanding of informationsecurity standards, frameworks, and best practices. Knowledge of informationsystems (e.g. cloud, access control, networking More ❯
security risks, recommending proportionate improvements. Review existing controls and propose enhancements to strengthen resilience. Support business development by cultivating strong client relationships. Essential Skills & Experience Recognised industry certifications (e.g. CISSP, CISM, CISA). Demonstrable experience in a cyber security role. Strong understanding of informationsecurity standards, frameworks, and best practices. Knowledge of informationsystems (e.g. cloud, access control, networking More ❯
travel required Desired Qualifications: - Experience supporting US Navy ship systems and virtualizing Hull, Mechanical, and Electrical (HM&E) systems. - Advanced certifications in technical areas such as CCNA, NCAP, CISSP, VCP, NCDA, CCA, RHCSA, Azure Fundamentals, or similar. - Experience implementing, operating, and optimizing secure virtualization, storage, data protection, and networking solutions. - Knowledge of integrating virtualization with cybersecurity monitoring tools and More ❯
Ullingswick, Herefordshire, UK Hybrid / WFH Options
Telent
understand the latest threats, know your way around security frameworks, and can turn complex risks into clear actions. Key Requirements: Hold one or more recognised security qualifications such as CISSP, CISM, CCSP, or CISMP Good technical and technical security knowledge across all security domains Knowledge and working experience of working with both Azure, CISCO and Fortinet Ability to articulate More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
ANISTAR Technologies
requirements. Ensure compliance with applicable security frameworks such as NIST, FISMA, and FedRAMP. Qualifications Bachelor's degree in computer science, InformationSecurity Relevant industry certifications such as CompTIA Security+, CISSP, CEH, or GIAC. 3-5 years of experience in cybersecurity roles, with hands-on experience in security assessment, monitoring, and incident response. Proficiency in security tools and technologies, including More ❯
associated certification and accreditation documentation Hands on experience in manual hardening and system compliance Must possess Security Certification in accordance with DoD 8570.01-M IAT-III or DoD 8140 (CISSP or equivalent) Compliant Certification Qualifications We Prefer: An advanced degree in STEM with 5+ years of engineering experience Familiar with NIST Risk Management Framework as described in NIST Special More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Oliver James
Experience managing cross-functional teams (5-15 people), across different locations and levels of experience. Desirable Qualifications Previous consulting experience or working with enterprise clients. Relevant industry certifications (e.g. CISSP, CISM, GCIH, GCIA, Microsoft Security , or other SANS/GIAC accreditations). Experience with DevOps tooling (e.g. Git, Azure DevOps, Jenkins, Kubernetes, Ansible). Knowledge of role-based access More ❯
Cybersecurity or related field preferred. Demonstrated technical proficiency in RMF process, A&A toolsets and secure system operations. Proficiency in threat and vulnerability management. PREFERRED QUALIFICATIONS: Certifications such as CISSP, CISM, or IAM II Experience managing accreditation packages for cross-domain solutions, cloud environments, or tactical systems. Excellent communication skills for interfacing with clients and leadership on security posture More ❯
RiskRecon). Experience working with GRC platforms (e.g., Drata, Vanta, OneTrust). Previous involvement in regulatory audits across frameworks such as NYSDFS, MAS, APRA, Lloyd's, etc. Certifications (Preferred) CISSP, CISA, CISM, or equivalent professionalsecurity certifications. More ❯
and cyber defense technologies. • Communication: Strong ability to produce clear, concise technical reports, and provide briefings to clients and leadership. • Security: Experience working on classified projects. Preferred Qualifications: • Certifications: CISSP, CEH, or other relevant cybersecurity certifications. • Experience: Experience supporting DoD or federal cybersecurity initiatives, particularly in classified environments. • Problem-Solving: Ability to analyze complex security problems and offer innovative More ❯
appropriate solutions. Detail and deadline oriented, and able to work with limited supervision. PREFERRED JOB REQUIREMENTS Certification/Licensure Certification in relevant GRC discipline (e.g., CISA, CISM, CCSP, CRISC, CISSP)or IT governance frameworks (e.g., ITIL). Work Experience Experience working in large and complex IT environments Experience working in regulated or audited environments Knowledge/Skills/Abilities More ❯
leading complex, multi-team cybersecurity projects . Bonus: knowledge of virtualisation (VMware, Nutanix), networking (Extreme), IT operations . ?? Why Join Us? Structured progression into senior leadership. Funded training & certifications (CISSP, CISM, CEH, and more). Work on high-impact, high-profile security projects . Continuous professional and personal development. ? Who You Are Collaborative, transparent, and proactive. Motivated by delivering More ❯
cybersecurity role Strong expertise in Splunk or similar SIEM tools Familiarity with Flexera for vulnerability management Understanding of firewalls, network protocols, intrusion detection/prevention systems Relevant certifications (e.g., CISSP, CEH, Splunk) advantageous Must be eligible for Developed Vetting (DV) clearance , requiring 10 years continuous UK residency Please Note: All offers will be subject to standard pre-employment checks More ❯
network telemetry. Strong understanding ofzero-trust networking, compliance frameworks, and security policies. Excellent leadership, communication, and stakeholder management skills. Preferred Qualifications: Certifications:CCIE, AWS/Azure/GCP Networking, CISSP, or equivalent. Experience withKubernetes networking, Terraform, Ansible, and SDN. Strong problem-solving abilities, with a data-driven approach to network optimization. Who You'll Work With Work Environment & Additional More ❯