a varied and interesting workload, but we can nurture your inquisitive nature and help you create change in the workplace - making it better for all. Logiq Consulting are Cyber Security and Information Assurance experts. We specialise in providing leading edge consultancy to high-threat clients, as well as delivering a range of security services and products throughout the … Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in a SOC environment and/or have a strong … focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and prioritisation of security incidents and vulnerabilities. Collaborate with other More ❯
OSR communicates directly with civil engineer and communications squadrons as an interface back to the core team at Tyndall AFB, FL. Specific tasks include the following: Responsible for Cyber Security of Civil Engineer (CE) owned FRCS: - Appointed in writing by the Enterprise Information System Security Manager (ISSM) as the Information System Security Officer (ISSO) for the CE … control system Community of Interest Network Enclave (COINE). - Responsible for creating and maintaining a complete and accurate inventory FRCS and components. - Assist CES personnel with security control implementation and assessment of FRCS. - Register systems in Enterprise Mission Assurance Support Service (eMASS) with all necessary artifacts to attain Authority to Operate (ATO). - Recognize potential, successful, and unsuccessful intrusion … event detail and summary information. - Assist with implementation of counter-measures or mitigating controls. - Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. - Perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans More ❯
OSR communicates directly with civil engineer and communications squadrons as an interface back to the core team at Tyndall AFB, FL. Specific tasks include the following: Responsible for Cyber Security of Civil Engineer (CE) owned FRCS: - Appointed in writing by the Enterprise Information System Security Manager (ISSM) as the Information System Security Officer (ISSO) for the CE … control system Community of Interest Network Enclave (COINE). - Responsible for creating and maintaining a complete and accurate inventory FRCS and components. - Assist CES personnel with security control implementation and assessment of FRCS. - Register systems in Enterprise Mission Assurance Support Service (eMASS) with all necessary artifacts to attain Authority to Operate (ATO). - Recognize potential, successful, and unsuccessful intrusion … event detail and summary information. - Assist with implementation of counter-measures or mitigating controls. - Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. - Perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans More ❯
Cybersecurity Policy and Compliance Certified Professional Client: U.S. Army Location: Fort Belvoir, VA Clearance: Top Secret • Responsible for providing support of A&A, Access Only, and other Cybersecurity/Computer Network Defense (CND) Compliance and Auditing processes and inspections for all enterprise systems and networks. • Reviews and ensures the validity and accuracy of all documentation. • Leads and performs compliance … reviews of computersecurity plans, performs risk assessments, and performs and validates security test evaluations and audits. • Analyzes and defines security requirements for information protection for enterprise systems and networks. • Assists in the development of security policies. • Analyzes the sensitivity of information and performs vulnerability and risk assessments based on the defined sensitivity and information More ❯
Cohere is seeking a DevOps Engineer. The duties of this position include: Serving as a member of the team supporting the installation, optimization, integration, troubleshooting, backup, recovery, modification, security, and upgrading of IT systems and components Architect and design CI/CD support systems that will be used by all application within the organization Designing and implementing systems that … of supported software, as they become available Working with other staff to recommend and design system architectures and topologies from both general and specific perspectives Work with organization Information Security personnel to ensure that security best practices are adopted and implemented within the code deliver and deployment processes Reviewing and confirming application code conforms to Enterprise standards Support … your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
environments designing, developing, and supporting new database models or providing complex enhancements to the existing database for mission critical systems. This position requires an active TS/SCI Poly security clearance. To succeed in this role, you should have a passion for data and innovative theories and additional familiarity with the following: Create data dictionaries and business glossaries to … principles, and policies for data strategy and architecture. Build a framework that encourages integration of policy, procedure, system help, training, and other useful resources. Help maintain the integrity and security of the database including data encryption. Conducts special studies and investigations pertaining to development of new information systems to meet current and projected needs Plans and prepares technical reports … Minimize database downtime and manage parameters to provide fast query responses Determine, enforce and document database environment, policies, procedures and standards Perform tests and evaluations regularly to ensure data security, privacy, and integrity Monitor database performance, implement changes and apply new patches and versions when required Prepare and present plans and changes to Technical Review Board Utilize monitoring and More ❯