Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as More ❯
of domain-related issues. • Support integration with identity services (e.g., Azure AD, ADFS, LDAP) as required. • Manage DNS, DHCP, and certificate services within the Windows domain environment. • Collaborate with cybersecurity teams to apply STIGs, hardening policies, and ensure compliance with government security standards. • Provide technical guidance and mentoring to junior administrators. • Participate in on-call rotations and respond to critical More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Michael Page
or equivalent). Demonstrable experience working on technical projects and managing stakeholders. Demonstrable experience of working within security standards and frameworks Desirable criteria: Degree in Computer Science, Information Technology, CyberSecurity or technical related field. Professional Membership (e.g. BCS, CITP) or a willingness to obtain within 12 months of taking up post SC Clearance before taking up post (will be More ❯
U.S. Citizen Must hold an active Department of Defense Top Secret Clearance and be SCI eligible. 8 - 10 years or more on-the-job related experience in IT/CyberSecurity/Software/Service Desk/Field Technician is required. Certifications in one or more of the following: Linux, Network+, Security +, Hardware + Must have completed at least More ❯
degree in computer science, Software Engineering, Information Technology, or a related field and 2-6 years of relevant experience is a plus but not always required. A degree in Cybersecurity and/or IT Management is a plus but not required. 2-5 years of experience in software testing, system administration, or IT operations. Experience in an enterprise IT environment More ❯
with cloud platforms (AWS, Azure, Google Cloud). Strong scripting and automation skills (PowerShell, Bash, Python). Experience with Active Directory, Group Policy, and identity management solutions. Understanding of cybersecurity best practices and compliance standards. Strong troubleshooting and problem-solving abilities. Excellent communication and teamwork skills.Preferred Qualifications: Industry certifications such as CompTIA Security+, Microsoft Certified: Azure Administrator, AWS Certified SysOps More ❯
Required Qualifications: • Bachelor's degree in computer science, Software Engineering, Information Technology, or a related field and 8-12 years relevant experience. A master's degree in software engineering, Cybersecurity, or IT Management, or a related field and 6-10 years of relevant experience is a plus but not always required. • Minimum 5+ years of experience providing IT technical support More ❯
all classified shipments. Education and Experience: B.S. in Computer Science, Information Security, or related field, or 7 years practical IT/IS experience preferred 5+ years of experience in cybersecurity, with a focus on compliance frameworks, preferred In-depth knowledge of NIST 800-53, NIST SP 800-171, NIST SP 800-172, and CMMC Required Skills: Experience installing, configuring, and More ❯
all classified shipments. Education and Experience: B.S. in Computer Science, Information Security, or related field, or 7 years practical IT/IS experience preferred 5+ years of experience in cybersecurity, with a focus on compliance frameworks, preferred In-depth knowledge of NIST 800-53, NIST SP 800-171, NIST SP 800-172, and CMMC Required Skills: Experience installing, configuring, and More ❯
Laurel, Maryland, United States Hybrid / WFH Options
TEKsystems c/o Allegis Group
with varying degrees of technical experience. • NIST RMF Assessment and Authorization (A&A) experience. • Experience with operating IT security tools, such as ACAS, HBSS, DISA STIGs • Prior experience working Cybersecurity in accordance with US Government (USG), Department of Defense (DOD) • Experience with the ServiceNow application. Preferred Qualifications • ServiceNow Platforms modules: Discovery, Event Management, Scripting, Service Mapping, Business Rules, Script Includes More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
please email . Who are the client? Our client is a well-established and security-focused Managed Service Provider (MSP) based in London, delivering enterprise-level infrastructure, networking, and cybersecurity projects. With a focus on Microsoft technologies, they support a broad and loyal client base across finance, legal, and professional services. Their culture is built on technical excellence, collaboration More ❯
smooth IT access setup and deactivation. Manage licensing, user accounts, and group permissions within Microsoft 365. Proactively monitor system health, conduct Level 1-3 incident analysis, and escalate identified cybersecurity risks. Participate in incident management activities, including major incident response calls, adhering to ITIL support practices. Maintain and enhance network infrastructure, ensuring optimal performance and security. Identify and implement More ❯
Brighton, East Sussex, United Kingdom Hybrid / WFH Options
Ideal
Europe, earning a reputation for delivering smart, real-world solutions using only the best technology vendors in the business. With expertise in Connectivity, Networks, Smart Buildings, Advanced Wi-Fi, Cybersecurity and Managed IT Services, we proudly support a diverse client base across the public and private sectors. We’re passionate about continuous learning and invest heavily in our people, supporting More ❯
an ITIL environment. Networking Skills : Fundamental understanding of networking concepts (TCP/IP, DNS, Firewalls) to address connectivity problems and work efficiently with network teams. Security Awareness : Knowledge of cybersecurity best practices and an understanding of security measures in hosted and on-premises environments. Monitoring and Analytics : Experience with monitoring tools (e.g. PRTG and Zabbix) to proactively identify and address More ❯
Minorities/Females/Disabled/Veterans employer, is an established Service-Disabled Veteran-Owned Small Business (SDVOSB) Department of Defense, government contractor with core competencies in Information Assurance, CyberSecurity and Systems Engineering. With offices on both the East and West coasts and an inviting culture, opportunity abounds for the right individual! Software/Container Security Engineer More ❯
all import/export requirements, consulting with facility import/export personnel as required. Other Skills and Abilities Within six months of hire, you must obtain and maintain a cybersecurity certification Security + or equivalent. A Linux+, Network+, COMSEC Custodian or other similar certifications are preferred but not required. Other Qualifications Applicant must have a current security clearance and be More ❯
VMware credentials Why Join Cyber Defense Technologies? At CDT, we offer a collaborative and inclusive work environment where your expertise in System Administration can help shape the future of cybersecurity and engineering solutions. You'll have the autonomy to shape the lab infrastructure while supporting critical engineering workflows in a collaborative, mission-driven environment. Compensation and Benefits: • Competitive salary based More ❯
professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As Information Security Officer , you’ll lead the implementation of the organisation’s cybersecurity plans. Act as subject matter expert on information security across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and More ❯
professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As Information Security Officer , you’ll lead the implementation of the organisation’s cybersecurity plans. Act as subject matter expert on information security across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and More ❯
professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As Information Security Officer , you’ll lead the implementation of the organisation’s cybersecurity plans. Act as subject matter expert on information security across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and More ❯
professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As Information Security Officer , you’ll lead the implementation of the organisation’s cybersecurity plans. Act as subject matter expert on information security across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and More ❯
london (city of london), south east england, united kingdom
TPP Recruitment
professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As Information Security Officer , you’ll lead the implementation of the organisation’s cybersecurity plans. Act as subject matter expert on information security across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and More ❯
identify malicious patterns using Judiciary tools (e.g. Volatility). Analysis results documented in forensics report. Additional forensics/malware analysis activities may include: Perform efficient and prioritized identification of cybersecurity threats and incidents with an emphasis on clear articulation of the potential threat(s) and actualized risks associated with such threats and incidents. Objectively measure reduction of adversary dwell More ❯
Summary: The Lead Technical Architect for CyberSecurity at CB5 Solutions, LLC owns the entirety of service design, delivery, and operational performance for services in this technical vertical. This strategic and hands-on role leads the design, evolution, and governance of secure network architectures across enterprise and cloud environments. The Lead Architect drives optimization of existing security infrastructure, implements best … into actionable technical strategies, embeds Zero Trust principles, and delivers technical excellence across government and commercial environments. Key Responsibilities: • Develop and maintain the technical vision, strategy, and roadmap for CyberSecurity services, aligning with business goals and IT strategy. • Define and maintain architectural standards, patterns, and guidelines for cybersecurity systems and secure network solutions. • Design and maintain secure, scalable network … across cloud, hybrid, and on-premise environments. • Lead implementation of Zero Trust Network Architecture (ZTNA), microsegmentation, and identity-aware access controls. • Ensure adherence to standard service delivery lifecycle and cybersecurity frameworks (NIST, ISO, RMF). • Provide technical leadership and guidance to Architecture and Engineering teams. • Develop and implement automation and Infrastructure as Code (IaC) solutions for network provisioning, configuration, and More ❯