Permanent Cybersecurity Job Vacancies

1,676 to 1,700 of 3,438 Permanent Cybersecurity Jobs

ISSO 2 102-024 with Security Clearance

Oklahoma City, Oklahoma, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 2 102-170 with Security Clearance

Duluth, Minnesota, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 2 102-029 with Security Clearance

Dayton, Ohio, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

UPS Tech 4- Chicago, IL with Security Clearance

Chicago, Illinois, United States
M.C. Dean
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. The Critical Power Group is responsible for maintaining, servicing, and troubleshooting UPS systems, batteries, and other critical infrastructure equipment. Our technicians are factory trained on most major UPS manufacturers More ❯
Employment Type: Permanent
Salary: USD 43 Hourly
Posted:

ISSO 2 102-147 with Security Clearance

Minot, North Dakota, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 2 102-096 with Security Clearance

Washington, Washington DC, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 1 102-192 with Security Clearance

Warner Robins, Georgia, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 3 102-139 with Security Clearance

Bossier City, Louisiana, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 3 102-180 with Security Clearance

Albuquerque, New Mexico, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include providing security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 3 102-210 with Security Clearance

Fort Walton Beach, Florida, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 3 102-177 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO 3 102-201 with Security Clearance

Colorado Springs, Colorado, United States
IC-CAP
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSE with Security Clearance

Washington, Washington DC, United States
Hybrid / WFH Options
OMW Consulting
control implementations. Translating and synthesizing complex concepts and architectures into clear body-of-evidence artifacts, including System Security Plans (SSPs) and architecture diagrams. Representing the company and providing credible cybersecurity expertise in government assessments and audits. If you are interested in learning more about this opportunity, please apply below, and I will contact you to discuss the role further. More ❯
Employment Type: Permanent
Salary: USD 185,000 Annual
Posted:

Full Stack Java Developer II with Security Clearance

Omaha, Nebraska, United States
Caribou Thunder, LLC
applications, integrating front-end technologies like HTML, CSS, and JavaScript Connect secure application interfaces with classified DoD infrastructure and data systems Manage backend databases with a focus on performance, cybersecurity, and data integrity Implement secure coding practices aligned with DoD compliance standards using tools like Fortify and SonarQube Conduct code reviews, testing, and debugging within Agile development teams Document system … architecture and workflows to ensure audit readiness Collaborate with systems engineers, cybersecurity teams, and program managers to deliver mission-ready software tools Required Qualifications Bachelor's degree + 3-10 years of experience in Computer Science, Software Engineering, or a related field Active Interim Top Secret security clearance required Hands-on experience with: Java, JavaScript, HTML, CSS for full stack … Apply today and develop the systems that power national defense. Who is Caribou Thunder? Caribou Thunder is a Woman-Owned Small Business (WOSB) and trusted defense contractor delivering engineering, cybersecurity, and integration support across the Department of Defense and Intelligence Community. We serve programs in over a dozen U.S. states and OCONUS. Why Caribou Thunder? • Mission Impact - Your work supports More ❯
Employment Type: Permanent
Salary: USD 85,000 Annual
Posted:

Systems Vulnerability Analyst (Principal) with Security Clearance

Maryland, United States
FUSE Engineering
with in-depth experience that is clearly related to the position. Degree must be in computer science or a related field, engineering electrical engineering, systems engineering, mathematics, computer forensics, cyber security, information technology, information assurance, and information security. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Security Solutions Engineer

Knutsford, Cheshire, United Kingdom
Barclays
Accountabilities Collaboration with stakeholders to understand their security requirements in business processes and IT projects, to enhance overall risk management. Execution of risk assessments to identify and prioritise potential cybersecurity threats that could impact the banks operations and data and guide the implementation of mitigation strategies and communicate findings to relevant findings to relevant senior stakeholders. Collaboration with business units … monitoring of security controls across the banks IT systems to ensure the effectiveness of controls and mitigation of risk. Execution of training content and sessions to educate employees, enhance cybersecurity awareness and provide guidance on safe online practices. Management of complex cybersecurity incidents by collaborating with IT teams and response experts to effectively resolve cases through analysis, expertise support and … project supervision. Identification of emerging cybersecurity trends, threats, and new technologies to address potential risks by advocating the adoption of new security solutions. Vice President Expectations To contribute or set strategy, drive requirements and make recommendations for change. Plan resources, budgets, and policies; manage and maintain policies/processes; deliver continuous improvements and escalate breaches of policies/procedures If More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Full Stack Java Developer Junior with Security Clearance

Omaha, Nebraska, United States
Caribou Thunder, LLC
secure, scalable Java-based web applications with HTML, CSS, and JavaScript Integrate applications with DoD infrastructure and manage backend services and databases Apply secure coding principles aligned with DoD cybersecurity compliance standards Conduct unit testing, debugging, and peer code reviews to ensure software quality Participate in Agile development workflows and deploy software using CI/CD pipelines and Kubernetes orchestration … Create and maintain technical documentation to support traceability and audit readiness Collaborate with cybersecurity, systems engineering, and program management teams to deliver compliant, mission-ready software Required Qualifications Bachelor's degree in Computer Science, Software Engineering, or related technical field 1-3 years of hands-on experience in full stack software development Active Interim Top-Secret clearance required Experience with … software that protects national interests and empowers our armed forces. Who is Caribou Thunder? Caribou Thunder is a Woman-Owned Small Business (WOSB) and trusted defense contractor delivering engineering, cybersecurity, and integration support across the Department of Defense and Intelligence Community. We serve programs in over a dozen U.S. states and OCONUS. Why Caribou Thunder? • Impactful Work - Build software that More ❯
Employment Type: Permanent
Salary: USD 75,000 Annual
Posted:

Application Security Engineer

Edinburgh, Midlothian, Scotland, United Kingdom
Hybrid / WFH Options
Motability Operations
Description Reporting to the Application Security Team Lead, this role provides product security expertise to digital product and engineering teams as part of the Cyber Security function. This is a hands-on engineering position - not just advisory. You'll actively contribute to code, set up and integrate security tooling, respond to product-related security incidents, and work directly on solutions. … working knowledge of the OWASP Top Ten, common application security frameworks and best practices, and threat modelling techniques is critical. Hands-on Minimum Criteria Experience in a hands-on Cyber Security focused role, primarily in the application security domain. Alternatively, candidates with strong hands-on application development role with a demonstratable level of cyber security knowledge and its application within More ❯
Employment Type: Permanent, Part Time, Work From Home
Posted:

Application Security Engineer

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Motability Operations
Description Reporting to the Application Security Team Lead, this role provides product security expertise to digital product and engineering teams as part of the Cyber Security function. This is a hands-on engineering position - not just advisory. You'll actively contribute to code, set up and integrate security tooling, respond to product-related security incidents, and work directly on solutions. … working knowledge of the OWASP Top Ten, common application security frameworks and best practices, and threat modelling techniques is critical. Hands-on Minimum Criteria Experience in a hands-on Cyber Security focused role, primarily in the application security domain. Alternatively, candidates with strong hands-on application development role with a demonstratable level of cyber security knowledge and its application within More ❯
Employment Type: Permanent, Part Time, Work From Home
Posted:

Full Stack Java Developer SME with Security Clearance

Omaha, Nebraska, United States
Caribou Thunder, LLC
based web applications supporting classified DoD environments • Lead integration of front-end frameworks with secure DoD infrastructure and backend systems • Oversee backend and database development, ensuring availability, integrity, and cybersecurity compliance • Implement and enforce secure coding practices using Fortify, SonarQube, and DoD secure software development standards • Conduct advanced debugging, testing (including Selenium), and performance tuning while mentoring junior developers • Document … software architecture, workflows, and compliance checkpoints to support audit readiness • Collaborate with cybersecurity, systems engineering, and program management teams to deliver mission-critical software solutions Required Qualifications • Bachelor's degree + 15 years Computer Science, Engineering, or related field • Active Interim Top Secret clearance required • Deep expertise in: Full stack Java development and secure architecture DevSecOps practices in defense or … defense contractor supporting mission-critical programs across the Department of Defense and Intelligence Community. With a presence in over a dozen states and OCONUS, we specialize in software engineering, cybersecurity, systems integration, and satellite communications. Why Caribou Thunder? • Strategic Impact: Work on next-gen DoD platforms with real-world defense applications • Top-Tier Roles: SME opportunities on high-clearance programs More ❯
Employment Type: Permanent
Salary: USD 140,000 Annual
Posted:

Chief Information Security Officer

London, United Kingdom
Hybrid / WFH Options
Financial Ombudsman Service
of our Service's work, this is a key role for our IT team and for the Financial Ombudsman Service. Key responsibilities Leading the governance and implementation of our cyber security and information strategy and the supporting governance framework, ensuring that security is considered in all our organisation's initiatives and that governance is aligned to the overall organisational governance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Business Information Security Officer

Haarlemmermeer, Noord-Holland, Netherlands
Schiphol Group
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Defense of Guam Senior Systems Engineer with Security Clearance

Huntsville, Alabama, United States
BlueHalo
will provide senior-level systems engineering support, guiding technical efforts across multiple domains and ensuring alignment with MDA objectives. A background that includes exposure to secure system development and cybersecurity-informed engineering practices is preferred. Perform integrated analysis and evaluation of DoG test events including Flight Tests, Ground Tests, and System Integration Check Out (SICO) activities Participate in and support … working groups, and forums Apply engineering tools such as DOORS, Windchill, and Qlik for analysis and coordination Support efforts related to system security, including compliance tracking or integration of cybersecurity inputs into engineering processes Required: Master's degree in a Science, Technology, Engineering or Math (STEM) field Minimum of 12+ years of relevant systems engineering or technical experience for missile … engineering processes and procedures Demonstrate understanding of system architecture and system Experience with MDA system elements (e.g., Patriot, THAAD, Aegis, C2BMC) Familiarity with secure development practices, configuration management, and cybersecurity-informed engineering Knowledge of the Enterprise Task Management System 2 (ETMS2) and experience managing Congressional or routine taskers Ability to operate independently and communicate effectively across diverse technical teams Proficiency More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO with Security Clearance

Cambridge, Massachusetts, United States
Draper
standards. Evaluates and creates artifacts which demonstrate system configuration, procedures, etc. Assist and educate users to ensure they operate the systems securely. Required Qualifications: • Experience in the areas of cybersecurity, compliance, systems engineering, or information technology. • Bachelor's degree in a related field (may substitute additional experience for education). • Has or able to obtain required DODM 8570.01-M baseline More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

System Administrator with Security Clearance

Herndon, Virginia, United States
Encode
and availability of IT systems. Coordinate and manage IT projects, including system upgrades, network improvements, and integration of new technologies, ensuring projects are delivered on time. Implement and monitor cybersecurity measures, ensuring that all IT systems comply with industry regulations and organizational policies. Basic Qualifications (Required Skills/Experience): A current Full Scope intelligence Poly (FSP). System Administration experience … STIGs), to ensure IT devices are properly configured and secured. Skilled in hardening systems across various platforms by applying STIGs to mitigate vulnerabilities and comply with military and federal cybersecurity requirements. Drug Free Workplace: At Encode, we believe that our employees are our greatest asset, and we are committed to fostering a supportive and inclusive work environment. We offer a More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Cybersecurity
10th Percentile
£27,000
25th Percentile
£36,250
Median
£57,500
75th Percentile
£75,000
90th Percentile
£95,000