audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. The Critical Power Group is responsible for maintaining, servicing, and troubleshooting UPS systems, batteries, and other critical infrastructure equipment. Our technicians are factory trained on most major UPS manufacturers More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include providing security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
control implementations. Translating and synthesizing complex concepts and architectures into clear body-of-evidence artifacts, including System Security Plans (SSPs) and architecture diagrams. Representing the company and providing credible cybersecurity expertise in government assessments and audits. If you are interested in learning more about this opportunity, please apply below, and I will contact you to discuss the role further. More ❯
applications, integrating front-end technologies like HTML, CSS, and JavaScript Connect secure application interfaces with classified DoD infrastructure and data systems Manage backend databases with a focus on performance, cybersecurity, and data integrity Implement secure coding practices aligned with DoD compliance standards using tools like Fortify and SonarQube Conduct code reviews, testing, and debugging within Agile development teams Document system … architecture and workflows to ensure audit readiness Collaborate with systems engineers, cybersecurity teams, and program managers to deliver mission-ready software tools Required Qualifications Bachelor's degree + 3-10 years of experience in Computer Science, Software Engineering, or a related field Active Interim Top Secret security clearance required Hands-on experience with: Java, JavaScript, HTML, CSS for full stack … Apply today and develop the systems that power national defense. Who is Caribou Thunder? Caribou Thunder is a Woman-Owned Small Business (WOSB) and trusted defense contractor delivering engineering, cybersecurity, and integration support across the Department of Defense and Intelligence Community. We serve programs in over a dozen U.S. states and OCONUS. Why Caribou Thunder? • Mission Impact - Your work supports More ❯
with in-depth experience that is clearly related to the position. Degree must be in computer science or a related field, engineering electrical engineering, systems engineering, mathematics, computer forensics, cybersecurity, information technology, information assurance, and information security. More ❯
Accountabilities Collaboration with stakeholders to understand their security requirements in business processes and IT projects, to enhance overall risk management. Execution of risk assessments to identify and prioritise potential cybersecurity threats that could impact the banks operations and data and guide the implementation of mitigation strategies and communicate findings to relevant findings to relevant senior stakeholders. Collaboration with business units … monitoring of security controls across the banks IT systems to ensure the effectiveness of controls and mitigation of risk. Execution of training content and sessions to educate employees, enhance cybersecurity awareness and provide guidance on safe online practices. Management of complex cybersecurity incidents by collaborating with IT teams and response experts to effectively resolve cases through analysis, expertise support and … project supervision. Identification of emerging cybersecurity trends, threats, and new technologies to address potential risks by advocating the adoption of new security solutions. Vice President Expectations To contribute or set strategy, drive requirements and make recommendations for change. Plan resources, budgets, and policies; manage and maintain policies/processes; deliver continuous improvements and escalate breaches of policies/procedures If More ❯
secure, scalable Java-based web applications with HTML, CSS, and JavaScript Integrate applications with DoD infrastructure and manage backend services and databases Apply secure coding principles aligned with DoD cybersecurity compliance standards Conduct unit testing, debugging, and peer code reviews to ensure software quality Participate in Agile development workflows and deploy software using CI/CD pipelines and Kubernetes orchestration … Create and maintain technical documentation to support traceability and audit readiness Collaborate with cybersecurity, systems engineering, and program management teams to deliver compliant, mission-ready software Required Qualifications Bachelor's degree in Computer Science, Software Engineering, or related technical field 1-3 years of hands-on experience in full stack software development Active Interim Top-Secret clearance required Experience with … software that protects national interests and empowers our armed forces. Who is Caribou Thunder? Caribou Thunder is a Woman-Owned Small Business (WOSB) and trusted defense contractor delivering engineering, cybersecurity, and integration support across the Department of Defense and Intelligence Community. We serve programs in over a dozen U.S. states and OCONUS. Why Caribou Thunder? • Impactful Work - Build software that More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Motability Operations
Description Reporting to the Application Security Team Lead, this role provides product security expertise to digital product and engineering teams as part of the CyberSecurity function. This is a hands-on engineering position - not just advisory. You'll actively contribute to code, set up and integrate security tooling, respond to product-related security incidents, and work directly on solutions. … working knowledge of the OWASP Top Ten, common application security frameworks and best practices, and threat modelling techniques is critical. Hands-on Minimum Criteria Experience in a hands-on CyberSecurity focused role, primarily in the application security domain. Alternatively, candidates with strong hands-on application development role with a demonstratable level of cybersecurity knowledge and its application within More ❯
Employment Type: Permanent, Part Time, Work From Home
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Motability Operations
Description Reporting to the Application Security Team Lead, this role provides product security expertise to digital product and engineering teams as part of the CyberSecurity function. This is a hands-on engineering position - not just advisory. You'll actively contribute to code, set up and integrate security tooling, respond to product-related security incidents, and work directly on solutions. … working knowledge of the OWASP Top Ten, common application security frameworks and best practices, and threat modelling techniques is critical. Hands-on Minimum Criteria Experience in a hands-on CyberSecurity focused role, primarily in the application security domain. Alternatively, candidates with strong hands-on application development role with a demonstratable level of cybersecurity knowledge and its application within More ❯
Employment Type: Permanent, Part Time, Work From Home
based web applications supporting classified DoD environments • Lead integration of front-end frameworks with secure DoD infrastructure and backend systems • Oversee backend and database development, ensuring availability, integrity, and cybersecurity compliance • Implement and enforce secure coding practices using Fortify, SonarQube, and DoD secure software development standards • Conduct advanced debugging, testing (including Selenium), and performance tuning while mentoring junior developers • Document … software architecture, workflows, and compliance checkpoints to support audit readiness • Collaborate with cybersecurity, systems engineering, and program management teams to deliver mission-critical software solutions Required Qualifications • Bachelor's degree + 15 years Computer Science, Engineering, or related field • Active Interim Top Secret clearance required • Deep expertise in: Full stack Java development and secure architecture DevSecOps practices in defense or … defense contractor supporting mission-critical programs across the Department of Defense and Intelligence Community. With a presence in over a dozen states and OCONUS, we specialize in software engineering, cybersecurity, systems integration, and satellite communications. Why Caribou Thunder? • Strategic Impact: Work on next-gen DoD platforms with real-world defense applications • Top-Tier Roles: SME opportunities on high-clearance programs More ❯
of our Service's work, this is a key role for our IT team and for the Financial Ombudsman Service. Key responsibilities Leading the governance and implementation of our cybersecurity and information strategy and the supporting governance framework, ensuring that security is considered in all our organisation's initiatives and that governance is aligned to the overall organisational governance More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
will provide senior-level systems engineering support, guiding technical efforts across multiple domains and ensuring alignment with MDA objectives. A background that includes exposure to secure system development and cybersecurity-informed engineering practices is preferred. Perform integrated analysis and evaluation of DoG test events including Flight Tests, Ground Tests, and System Integration Check Out (SICO) activities Participate in and support … working groups, and forums Apply engineering tools such as DOORS, Windchill, and Qlik for analysis and coordination Support efforts related to system security, including compliance tracking or integration of cybersecurity inputs into engineering processes Required: Master's degree in a Science, Technology, Engineering or Math (STEM) field Minimum of 12+ years of relevant systems engineering or technical experience for missile … engineering processes and procedures Demonstrate understanding of system architecture and system Experience with MDA system elements (e.g., Patriot, THAAD, Aegis, C2BMC) Familiarity with secure development practices, configuration management, and cybersecurity-informed engineering Knowledge of the Enterprise Task Management System 2 (ETMS2) and experience managing Congressional or routine taskers Ability to operate independently and communicate effectively across diverse technical teams Proficiency More ❯
standards. Evaluates and creates artifacts which demonstrate system configuration, procedures, etc. Assist and educate users to ensure they operate the systems securely. Required Qualifications: • Experience in the areas of cybersecurity, compliance, systems engineering, or information technology. • Bachelor's degree in a related field (may substitute additional experience for education). • Has or able to obtain required DODM 8570.01-M baseline More ❯
and availability of IT systems. Coordinate and manage IT projects, including system upgrades, network improvements, and integration of new technologies, ensuring projects are delivered on time. Implement and monitor cybersecurity measures, ensuring that all IT systems comply with industry regulations and organizational policies. Basic Qualifications (Required Skills/Experience): A current Full Scope intelligence Poly (FSP). System Administration experience … STIGs), to ensure IT devices are properly configured and secured. Skilled in hardening systems across various platforms by applying STIGs to mitigate vulnerabilities and comply with military and federal cybersecurity requirements. Drug Free Workplace: At Encode, we believe that our employees are our greatest asset, and we are committed to fostering a supportive and inclusive work environment. We offer a More ❯