delivering programmes in complex environments - ideally in consulting Ability to work with all levels of stakeholders, from technical teams to the board Relevant certifications (e.g., CISSP, CISM, CISA, MSc CyberSecurity) are a plus The package Salary up to £80k Hybrid working with a London base Clear career progression and world-class training The chance to work on high-profile More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
their strategic priorities, across all sectors, including: Digital Acceleration and Transformation Enterprise Enablement Big Data and Analytics Applications Rationalization Cloud Modernization Sourcing and Ecosystem Optimization Contract and Cost Optimization Cybersecurity and Resilience Due to its current success, Gartner is in the process of expanding its high-performance EMEA Cybersecurity Resilience Consulting practice and is seeking a Director for UKI. We … help leading organizations and their executives, CIOs, and CISOs collaborate and optimize their cybersecurity resilience defensibility in an evolving digital and uncertain world. Gartner's trusted data-driven insights give executives confidence to prioritize and make informed decisions about cybersecurity resilience. In today's world, a consulting firm that incorporates security as part of its "DNA", (with the ability to … technology initiatives) has relevance to the most important strategic decisions any business will make. We work with clients to: Prioritize what to accelerate and where to invest to improve cybersecurity resilient while enabling the business Enable culture hacks to accelerate change and embed security throughout the organization Support digital momentum and value realization in a secure manner What you'll More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
ensuring alignment with program requirements and timelines. Coordinate defect tracking, triage, and resolution in collaboration with development and operations teams. Ensure compliance with Section 508 accessibility standards and DoD cybersecurity testing requirements. Implement quality gates within CI/CD pipelines and promote test automation for scalable releases. Conduct regression, performance, integration, and user acceptance testing (UAT) as part of the … such as Selenium, JIRA, TestRail, Postman, or equivalent Strong knowledge of Agile development, DevSecOps practices, and automated testing frameworks Familiarity with Section 508/WCAG accessibility standards and DoD cybersecurity compliance Excellent analytical, communication, and documentation skills More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
DSO) responsibilities for Bear River in coordination with DoD stakeholders. Maintain proactive client communication, end user training, resolve issues, and foster strong long-term relationships. Ensure full compliance with cybersecurity requirements, including NIST SP 800-171, DFARS, and DISA STIGs. This includes ensuring the security of all SQL database systems and data as well as the security configuration of the … stability and security of the ITS/DMM application. Participate in the planning and execution of application upgrades and enhancements. Required Qualifications: Bachelor's degree in IT, Computer Science, Cybersecurity, or a related discipline. IAT Level III certification (e.g., CISSP, CASP+) per DoD 8570 guidelines. At least 5 years of experience in IT engineering, administration, or secure program support, with More ❯
consumers. You'll Bring These Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an More ❯
/III level, or equivalent. Strong capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
london (city of london), south east england, united kingdom
Slaughter and May
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
for managing and optimizing cloud-native platforms, automating infrastructure deployments, and ensuring secure and reliable operations across multiple environments. You'll work closely with software developers, system administrators, and cybersecurity teams to streamline delivery of secure, scalable applications within classified environments. Key Responsibilities: Design, implement, and manage secure, scalable AWS infrastructure in support of mission systems Automate deployment, monitoring, and More ❯
Job Title: CyberSecurity Analyst (Contract) Contract Rate: Negotiable (Inside IR35) Shift Pattern (Day/Night) Location: Andover, Hampshire Security Clearance: ** Current valid SC clearance required ** Eligibility: ** UK eyes only ** About the Role: This is a brilliant opportunity to join our growing team at CND. We are looking for an experienced Security Analyst. This role offers a great shift pattern More ❯
Job Title: CyberSecurity Analyst (Contract) Contract Rate: Negotiable (Inside IR35) Shift Pattern (Day/Night) Location: Andover, Hampshire Security Clearance: ** Current valid SC clearance required ** Eligibility: ** UK eyes only ** About the Role: This is a brilliant opportunity to join our growing team at CND. We are looking for an experienced Security Analyst. This role offers a great shift pattern More ❯
including Integrated Sensor Architecture (ISA) and JICD • Create software estimates and examine vendor proposals related to software engineering • Conduct full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates Minimum Requirements • Documented experience with software tools, including Photon, Salvage, Visual Studio, Eclipse … including product definition, requirements, design, integration & test, and system software deployment for a DOD acquisition program office • Experience conducting full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates • Experience developing software estimates and review of vendor technical proposals • Must Be knowledgeable More ❯