adequately addressed in all aspects of enterprise architecture, including reference models, segment and cloud solution architectures, and the resulting systems supporting those missions and business processes. • Serves as a cybersecurity SME for cybersecurity architecture policies and procedures. • Provides cybersecurity management support to Program Management Offices for emerging information systems through the acquisition lifecycle and, where applicable, into sustainment. • Provides technical … support and guidance to facilitate the identification and integration of cybersecurity controls at the onset of the acquisition lifecycle for emerging cloud capabilities. • Serves as a principal liaison for enterprise-level boundary defense initiatives to ensure consistent and sufficient identification and implementation of applicable cybersecurity controls in concert with the agency cybersecurity and cloud architecture and NIST security guidelines. • Provides … oversight for the design and implementation of enterprise-level cybersecurity solutions providing standards for access control capabilities across the enterprise. • Develops technical solutions to complex problems. Minimum Qualifications: • Knowledge of cloud-native software development. • Expertise of how to conduct cloud operations in AWS or Azure. • Formal general security certification (e.g., CompTIA Security+, Cloud Security Alliance - Certificate of Cloud Security Knowledge More ❯
We are seeking a skilled and motivated Cloud Security Engineer to join our growing cybersecurity team supporting federal clients. The ideal candidate will have strong cloud security architecture knowledge, hands-on experience with major cloud platforms, and the ability to implement best practices across hybrid and multi-cloud environments. New Award 5 Years Hybrid 2 days Onsite 3 days from … and agency-specific requirements Document policies, procedures, and configurations to support audits and ATO processes Support vulnerability and risk assessments of cloud-based system Bachelor's Degree in Cybersecurity, Information Technology, or related field from a U.S.-accredited institution 5+ years of experience specifically in cloud security Relevant certifications such as: CISSP, CISM, CEH AWS Security Specialty or Azure SecurityMore ❯
TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: If you are looking for a position that is different from your normal network/cybersecurity position, please keep reading. We are looking for Network Security Engineers who are familiar with both network defense and offensive techniques to support ongoing operations and secure our customers … management and familiarity with network penetration testing and offensive security. Candidates should have a minimum of 7+ years of experience as a Network Engineer, System Engineer or in the CyberSecurity field as a hands-on penetration tester. Candidates with fewer years of experience will be considered on a case-by-case basis, depending on technical skill level. JOB SUMMARY … include performing network packet inspection, traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of information security practices. • Experience using virtual infrastructure (e.g., vSphere). • Experience in a cyber-security role such as network defense, penetration testing and network forensics. • Experience in either the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure. • Proven ability More ❯
Government/Military Clearance Required: TS/SCI with Polygraph Full-Time Fully Funded $130,000-$150,000 (Depending on Experience) Overview: Helm Point Solutions is a woman-owned cybersecurity and physical security firm supporting the nation's most critical systems and infrastructure. We're seeking experienced Information Systems Security Engineers (ISSEs) to support vital intelligence operations that directly impact … national security. You'll join a skilled cybersecurity team responsible for strengthening the systems that protect the country's most sensitive missions-delivering standardized, scalable security solutions across multiple teams and environments. What You'll Do: • Conduct security assessments to identify vulnerabilities and ensure IA compliance. • Define, verify, and validate system security requirements and contribute to the design of security … architectures. • Implement and integrate IA and cybersecurity solutions across complex technical environments. • Support architects and developers in applying security policies and enterprise security solutions. • Identify, assess, and mitigate risks throughout the program lifecycle. • Apply advanced knowledge in risk management, incident handling, intrusion detection, and security engineering. • Support certification and accreditation activities within NSA/CSS NISCAP, DoD RMF, and NIST More ❯
Assurance (IA) Architecture Analysis and Security Engineering Support. The ISSE will perform in a consultant like role providing technical knowledge, expertise and advice to our customer. Responsibilities Include: Conduct cybersecurity risk assessments and provide prioritized risk mitigation recommendations in support of the customer's mission. Support the design, implementation, and operation of real-time capabilities to discover, detect, analyze, and … threats and vulnerabilities. Analyze candidate architectures by evaluating against defined security requirements to identify security gaps and provide recommended mitigation strategy. Research and evaluate candidate emerging technologies to determine cybersecurity effectiveness. Aid stakeholders through the development, refinement, delivery, and implementation o f innovative solutions and capabilities. Engage stakeholders to ensure security objectives, protection needs, security requirements and associated validation methods … ability to present briefing to senior level DoD officials in both prepared briefings and/or in ad hoc discussions. Expertise in the Risk Management Framework (RMF) and conducting cybersecurity risk assessments Expertise in network technology and systems security engineering. Experience in identifying, researching, characterizing, and documenting security weaknesses related to operating systems, software applications, firmware, network hardware components, as More ❯
environment. Excellent communication skills with the ability to convey complex security concepts to diverse audiences. Desired Qualifications: CISSP, CAP, Security+, or equivalent DoD 8570 certification. Prior experience as a cybersecurity trainer, technical instructor, or curriculum developer. Experience with AWS, Azure, or other cloud-based systems in a classified environment. Familiarity with adult learning principles and instructional design methodologies. Work Environment More ❯
No Tentative Start Date: ASAP Compensation/Hourly Rate: Negotiated during the final interview Position Description: We are seeking a highly skilled Information Systems Security Engineer (ISSE) to provide cybersecurity support as a member of a Risk Management Framework (RMF) Team. The candidate should possess an expert knowledge of RMF/Authority to Operate (ATO) package requirements and eMASS. The More ❯
May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure May respond to computer security breaches and viruses Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses DevSecOps Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Ensure the More ❯
Role: CyberSecurity Consultant Location: Leeds, West Yorkshire Salary: £60,000 - £75,000 PLUS 25 Days Holiday, Vendor Certifications, International Travel, Private Pension About the Company: Our client, a global leader in Sustainability Consulting, is looking for a Cybersecurtiy Consultant to join their growing Information Security Team. This exciting role provides an opportunity to shape and strengthen security practices across … the organization. If you are passionate about cybersecurity, have a strong technical background, and thrive in a fast-paced environment, we want to hear from you. Position Overview: As a Cybersecurity Consultant, you will collaborate with the IT Security Team to advise, develop, and maintain security processes and policies. Your expertise will guide the organization in enhancing security capabilities across … principles. Excellent communication skills, with the ability to explain complex security concepts to non-technical stakeholders in a clear, accessible manner. How to Apply: If you're an experienced Cybersecurity Consultant looking to make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds More ❯
global leader in Public Safety Technology & Services to find a certified Security Auditor. This is a fantastic opportunity to join a company that's setting the highest standards in cybersecurity and security compliance. You'll play a key role in ensuring compliance with leading security frameworks, preparing for and conducting audits, and contributing to security operations. You'll be joining … GDPR, DORA, Cyber Essentials & more. Prepare teams for external audits and manage the audit process end-to-end. Monitor changes in compliance frameworks and maintain alignment. Support the CyberSecurity Operations Centre (CSOC) in incident monitoring and response. Develop and maintain policies, procedures, and security documentation. Collaborate with IT & Security teams to identify and remediate vulnerabilities. What We're Looking … with a global organisation. Work alongside some of the best minds in the industry. This is a unique chance to be part of a company that's innovating in cybersecurity and compliance at a global scale. Hit apply to upload your CV Spectrum IT Recruitment (South) Limited is acting as an Employment Agency in relation to this vacancy. More ❯
ConSol Partners are seeking a Information Security Business Lead for an exciting raw materials & chemical manufacturer - in its London office! This role will design, implement, and oversee a comprehensive cyber-security strategy tailored to industrial operations. This role is critical to safeguarding IT and OT environments, intellectual property, and ensuring compliance with global standards. Key Responsibilities: Develop and execute the … enforcement of security policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incident response plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training … across departments. Requirements: Degree in Cybersecurity, Information Security, or related field. Proven experience in manufacturing, energy, chemicals, or similar sectors. 15 years of experience in a deeply-technical hands on role, and high level stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. More ❯
ConSol Partners are seeking a Information Security Business Lead for an exciting raw materials & chemical manufacturer - in its London office! This role will design, implement, and oversee a comprehensive cyber-security strategy tailored to industrial operations. This role is critical to safeguarding IT and OT environments, intellectual property, and ensuring compliance with global standards. Key Responsibilities: Develop and execute the … enforcement of security policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incident response plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training … across departments. Requirements: Degree in Cybersecurity, Information Security, or related field. Proven experience in manufacturing, energy, chemicals, or similar sectors. 15 years of experience in a deeply-technical hands on role, and high level stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. More ❯
ConSol Partners are seeking a Information Security Business Lead for an exciting raw materials & chemical manufacturer - in its London office! This role will design, implement, and oversee a comprehensive cyber-security strategy tailored to industrial operations. This role is critical to safeguarding IT and OT environments, intellectual property, and ensuring compliance with global standards. Key Responsibilities: Develop and execute the … enforcement of security policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incident response plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training … across departments. Requirements: Degree in Cybersecurity, Information Security, or related field. Proven experience in manufacturing, energy, chemicals, or similar sectors. 15 years of experience in a deeply-technical hands on role, and high level stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. More ❯
london (city of london), south east england, united kingdom
ConSol Partners
ConSol Partners are seeking a Information Security Business Lead for an exciting raw materials & chemical manufacturer - in its London office! This role will design, implement, and oversee a comprehensive cyber-security strategy tailored to industrial operations. This role is critical to safeguarding IT and OT environments, intellectual property, and ensuring compliance with global standards. Key Responsibilities: Develop and execute the … enforcement of security policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incident response plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training … across departments. Requirements: Degree in Cybersecurity, Information Security, or related field. Proven experience in manufacturing, energy, chemicals, or similar sectors. 15 years of experience in a deeply-technical hands on role, and high level stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. More ❯
ConSol Partners are seeking a Information Security Business Lead for an exciting raw materials & chemical manufacturer - in its London office! This role will design, implement, and oversee a comprehensive cyber-security strategy tailored to industrial operations. This role is critical to safeguarding IT and OT environments, intellectual property, and ensuring compliance with global standards. Key Responsibilities: Develop and execute the … enforcement of security policies across IT and OT environments. Conduct risk assessments and implement proactive threat mitigation measures. Oversee Microsoft 365 security, endpoint protection, email security, and other key cybersecurity tools. Manage incident response plans and investigations, coordinating with internal teams and external partners. Ensure compliance with standards like ISO 27001, GDPR, and NIST frameworks. Promote security awareness and training … across departments. Requirements: Degree in Cybersecurity, Information Security, or related field. Proven experience in manufacturing, energy, chemicals, or similar sectors. 15 years of experience in a deeply-technical hands on role, and high level stakeholder engagement. Strong knowledge of cybersecurity frameworks, ICS/OT security, and risk management. Hands-on experience with Microsoft 365 security tools, EDR, and related technologies. More ❯
dependent space mission systems. • Identifies, assesses, and implements mitigations to risk within local cyberspace terrain deemed critical to mission accomplishment. • Develops mission thread data to support USSF mission owners, cybersecurity personnel, defensive cyber operators and program offices in assessing acceptable risks to missions caused by cybersecurity deficiencies in systems and programs. • Utilizes all information collected to create and deliver … USSF mission capabilities. • Must have CISSP OR Security+ and meet one of the following qualifications: GICSP or GCED or PenTest+ or GSEC OR a B.S. degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science, from an ABET accredited or Center for Academic Excellence designated institution. • Willing to travel approximately 25%. • TS/SCI Required More ❯
are looking for a dedicated Network Security Specialist to join our growing onsite delivery team in Newport News. The successful candidate will be responsible for monitoring and maintaining our cybersecurity tools, researching vulnerabilities, risks, and events, and supporting multiple projects across the customer portfolio as part of a hybrid agile delivery team. Key Responsibilities: -Monitor and maintain cybersecurity … and mitigation techniques. -Familiarity with RMF 800-53 and DISA STIGs. -Provide regular reports on security status and incidents. Basic Qualifications: -Bachelor's degree in computer science, Information Technology, CyberSecurity, or a related field, or equivalent combination of education and work experience -3 years of experience in managing and operating security tools such as Splunk, McAfee/Trelix ESM … a US citizen who possesses a current Secret w/SSBI clearance. -Must live a commutable distance from the client site in Newport News, VA. Preferred Qualifications: -Certifications in Cybersecurity (CISSP, CISA, CISM etc.) -Familiarity with agile teams -Experience standing up and accrediting information systems under DCSA cognizance -Prior experience in a SOC (Security Operations Center) environment -Strong understanding of More ❯
Security Consultant to join their growing Information Security Team. This exciting role provides an opportunity to shape and strengthen security practices across the organization. If you are passionate about cybersecurity, have a strong technical background, and thrive in a fast-paced environment, we want to hear from you. Position Overview: As an Information Security Consultant, you will collaborate with the … How to Apply: If you're an experienced Information Security Consultant looking to make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Our client is seeking a Cybersecurity Threat Handler to join the Engineering and Technology Information Security team. 3 days in office in London Salary is up to £80k base Responsibilities Acting as a hands-on expert and builder for cloud-based technologies, ensuring security, performance, operability, and scale. Assisting as an internal specialist, facilitating the implementation of modern Front End … related field, or equivalent combination of education and work experience. 5+ years of experience in engineering and technology, preferably in Financial Services, Technology, or a related field. Experience analyzing cybersecurity incidents using industry standard frameworks such as Cyber Kill Chain and MITRE ATT&CK. Experience handling cybersecurity incidents at each stage of the incident lifecycle, including initial analysis, triage, containment … security events within endpoint protection platforms like CrowdStrike Falcon. Ability to liaise effectively with SOC Analysts and Threat Hunters from our Managed Detection and Response vendor. Understanding of current cybersecurity threats, typical signs of attacks, and approaches to prevent and mitigate such incidents. 2+ years of experience with AWS or other hyperscale cloud provider implementation. More ❯
Our client is seeking a Cybersecurity Threat Handler to join the Engineering and Technology Information Security team. 3 days in office in London Salary is up to £80k base Responsibilities Acting as a hands-on expert and builder for cloud-based technologies, ensuring security, performance, operability, and scale. Assisting as an internal specialist, facilitating the implementation of modern Front End … related field, or equivalent combination of education and work experience. 5+ years of experience in engineering and technology, preferably in Financial Services, Technology, or a related field. Experience analyzing cybersecurity incidents using industry standard frameworks such as Cyber Kill Chain and MITRE ATT&CK. Experience handling cybersecurity incidents at each stage of the incident lifecycle, including initial analysis, triage, containment … security events within endpoint protection platforms like CrowdStrike Falcon. Ability to liaise effectively with SOC Analysts and Threat Hunters from our Managed Detection and Response vendor. Understanding of current cybersecurity threats, typical signs of attacks, and approaches to prevent and mitigate such incidents. 2+ years of experience with AWS or other hyperscale cloud provider implementation. More ❯
Our client is seeking a Cybersecurity Threat Handler to join the Engineering and Technology Information Security team. 3 days in office in London Salary is up to £80k base Responsibilities Acting as a hands-on expert and builder for cloud-based technologies, ensuring security, performance, operability, and scale. Assisting as an internal specialist, facilitating the implementation of modern Front End … related field, or equivalent combination of education and work experience. 5+ years of experience in engineering and technology, preferably in Financial Services, Technology, or a related field. Experience analyzing cybersecurity incidents using industry standard frameworks such as Cyber Kill Chain and MITRE ATT&CK. Experience handling cybersecurity incidents at each stage of the incident lifecycle, including initial analysis, triage, containment … security events within endpoint protection platforms like CrowdStrike Falcon. Ability to liaise effectively with SOC Analysts and Threat Hunters from our Managed Detection and Response vendor. Understanding of current cybersecurity threats, typical signs of attacks, and approaches to prevent and mitigate such incidents. 2+ years of experience with AWS or other hyperscale cloud provider implementation. More ❯
Our client is seeking a Cybersecurity Threat Handler to join the Engineering and Technology Information Security team. 3 days in office in London Salary is up to £80k base Responsibilities Acting as a hands-on expert and builder for cloud-based technologies, ensuring security, performance, operability, and scale. Assisting as an internal specialist, facilitating the implementation of modern Front End … related field, or equivalent combination of education and work experience. 5+ years of experience in engineering and technology, preferably in Financial Services, Technology, or a related field. Experience analyzing cybersecurity incidents using industry standard frameworks such as Cyber Kill Chain and MITRE ATT&CK. Experience handling cybersecurity incidents at each stage of the incident lifecycle, including initial analysis, triage, containment … security events within endpoint protection platforms like CrowdStrike Falcon. Ability to liaise effectively with SOC Analysts and Threat Hunters from our Managed Detection and Response vendor. Understanding of current cybersecurity threats, typical signs of attacks, and approaches to prevent and mitigate such incidents. 2+ years of experience with AWS or other hyperscale cloud provider implementation. More ❯
london (city of london), south east england, united kingdom
McCabe & Barton
Our client is seeking a Cybersecurity Threat Handler to join the Engineering and Technology Information Security team. 3 days in office in London Salary is up to £80k base Responsibilities Acting as a hands-on expert and builder for cloud-based technologies, ensuring security, performance, operability, and scale. Assisting as an internal specialist, facilitating the implementation of modern Front End … related field, or equivalent combination of education and work experience. 5+ years of experience in engineering and technology, preferably in Financial Services, Technology, or a related field. Experience analyzing cybersecurity incidents using industry standard frameworks such as Cyber Kill Chain and MITRE ATT&CK. Experience handling cybersecurity incidents at each stage of the incident lifecycle, including initial analysis, triage, containment … security events within endpoint protection platforms like CrowdStrike Falcon. Ability to liaise effectively with SOC Analysts and Threat Hunters from our Managed Detection and Response vendor. Understanding of current cybersecurity threats, typical signs of attacks, and approaches to prevent and mitigate such incidents. 2+ years of experience with AWS or other hyperscale cloud provider implementation. More ❯
join our team at Annapolis Junction, Maryland. This role in a high-stakes CYBER organization demands a TS/SCI clearance with FS Poly and strong systems management and cybersecurity skills. You will maintain and secure mission-critical systems and networks, ensuring seamless operations for global initiatives. Your expertise in system configurations, incident resolution, and regulatory compliance will be essential … monitors policies and standards for allocation related to the use of computing resources. System Operations: Administer day-to-day operations, including configurations, upgrades, and patches of servers and networks. Cybersecurity Management: Enforce security protocols and monitor system vulnerabilities in a classified environment. Incident Response: Quickly diagnose issues and drive effective resolutions to minimize downtime. Collaboration & Documentation: Work with cross-functional … IAT Level 2 Certification Required CompTIA Security+ CompTIA CySA+ GIAC Security Essentials (GSEC) Cisco Certified Network Associate Security (CCNA Security) Certified Information Systems Security Professional (CISSP) Associate Global Industrial CyberSecurity Professional (GICSP) Proven experience in systems administration and network security within mission-critical environments. Security Clearance: Active TS/SCI clearance with FS Poly. Preferred Requirements IAT Level More ❯
O&R) Team; however, this role may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams. This role is also responsible for coordinating with both the Cybersecurity Services Section and other sections or divisions within the organization. Job Duties: -Perform network security monitoring and incident response for a large organization -Coordinate with other government agencies to record … detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cybersecurity/incident response events; architecting, engineering, developing and implementing cybersecurity/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software … NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. -3 years of penetration testing experience for networks, web applications, and enterprise systems. -2 years of experience with Federal cybersecurity standards, industry best practices and guidelines. -Bachelor's degree in computer science, information systems analysis, science/technology, information management, computer engineering, or electrical/electronic engineering or equivalent combination More ❯