embedded systems engineering JCIDS, DJSIG, NIACAP, FIPS 140-2 or 140-3, NSA certification High assurance crypto systems Govt advisory/assistance as SETA/A&AS contractor in cybersecurity-related role Agile development processes Other security or technical certifications: CISA, CISM, CEH, CPT, MCSE, CCNA, Red Hat, Network+, SANS GIAC, Security+, CCNP Security, etc. Experience with TEMPEST, Anti-Tamper More ❯
embedded systems engineering JCIDS, DJSIG, NIACAP, FIPS 140-2 or 140-3, NSA certification High assurance crypto systems Govt advisory/assistance as SETA/A&AS contractor in cybersecurity-related role Agile development processes Other security or technical certifications: CISA, CISM, CEH, CPT, MCSE, CCNA, Red Hat, Network+, SANS GIAC, Security+, CCNP Security, etc. Experience with TEMPEST, Anti-Tamper More ❯
embedded systems engineering JCIDS, DJSIG, NIACAP, FIPS 140-2 or 140-3, NSA certification High assurance crypto systems Govt advisory/assistance as SETA/A&AS contractor in cybersecurity-related role Agile development processes Other security or technical certifications: CISA, CISM, CEH, CPT, MCSE, CCNA, Red Hat, Network+, SANS GIAC, Security+, CCNP Security, etc. Experience with TEMPEST, Anti-Tamper More ❯
embedded systems engineering JCIDS, DJSIG, NIACAP, FIPS 140-2 or 140-3, NSA certification High assurance crypto systems Govt advisory/assistance as SETA/A&AS contractor in cybersecurity-related role Agile development processes Other security or technical certifications: CISA, CISM, CEH, CPT, MCSE, CCNA, Red Hat, Network+, SANS GIAC, Security+, CCNP Security, etc. Experience with TEMPEST, Anti-Tamper More ❯
embedded systems engineering JCIDS, DJSIG, NIACAP, FIPS 140-2 or 140-3, NSA certification High assurance crypto systems Govt advisory/assistance as SETA/A&AS contractor in cybersecurity-related role Agile development processes Other security or technical certifications: CISA, CISM, CEH, CPT, MCSE, CCNA, Red Hat, Network+, SANS GIAC, Security+, CCNP Security, etc. Experience with TEMPEST, Anti-Tamper More ❯
INFOSEC) posture of the environment. Demonstrated experience monitoring and assessing networking systems and solutions proactively for performance degradation and tuning and optimization opportunities. Shall meet the Cyber IT/Cybersecurity Workforce (CSWF) Network Operations Specialist (441); Intermediate Level for SECNAV M-5239.2 compliance. More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Network Engineer 1 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
INFOSEC) posture of the environment. Demonstrated experience monitoring and assessing networking systems and solutions proactively for performance degradation and tuning and optimization opportunities. Shall meet the Cyber IT/Cybersecurity Workforce (CSWF) Network Operations Specialist (441); Intermediate Level for SECNAV M-5239.2 compliance. Desired Qualifications Strongly desired to be CCNP Routing and Switch, CCNP Collaboration, and CCNP Security Certified. Technical More ❯
with Infrastructure as Code (IaC). Experience with scripting languages such as Bash, PowerShell, Batch, and Python. Experience with networking and virtualization. Experience with Terraform and Ansible. Experience with cybersecurity tools, network configurations, and operational tools. Knowledge of operating systems, including Windows and Linux, application behaviors, and network traffic analysis Experience in a fast-paced environment and working with flexible … and DevOps. Experience with container technologies such as Kubernetes and Docker. Knowledge of penetration testing or red team operations. Experience utilizing and development with Splunk. Experience with Nutanix. Defensive CyberSecurity Operations. $175,000 - $200,000 a year The pay range for this job, with multi-levels, is a general guideline only and not a guarantee of compensation or salary. More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Deployment Network Specialist to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
reporting outputs with enterprise risk management and control frameworks. Strong knowledge of risk management frameworks (e.g., NIST, ISO 27001, COBIT) and control environments. Deep understanding of IT general controls, cybersecurity principles, and technology risk domains. Proven experience in risk analytics, data visualization, and reporting (e.g., using Power BI, Tableau, or similar tools). Familiarity with GRC platforms and risk … data management practices. Experience in a risk management, IT audit, or cybersecurity role within a financial services or regulated environment. Experience: Educated to degree level or equivalent. Hold professional qualifications in a related subject for example, CRISC, CISSP, CISM, CISA 7 years + experience in technology or cyber risk management role with a focus on analytics and controls Experience More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Network Engineer 5 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
operations. • Collaborate with cross-functional teams to ensure network and security policies are consistently applied. Basic Qualifications o Bachelor's degree in computer science, Engineering, Software Development, Information Technology, CyberSecurity, or related field and 6 years of related experience. Additional years of experience and cyber certifications may be considered in lieu of degree. o Familiar with the management, operational More ❯
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
This is an excellent opportunity to play a key role in advancing the company's security posture by delivering Governance, Risk, and Compliance (GRC) initiatives and embedding the NIST CyberSecurity Framework (CSF) across the business. Key skills/responsibilities: Deliver day-to-day GRC activities, including designing and implementing security controls and managing information security risks Interpret and apply More ❯
Experience providing strategic level technical analysis and developing strategies that leverage EW EMS Architecture in support of balance spectrum repurposing across Naval, DoD, Cyber, and IC stakeholders Understanding of cybersecurity specifications such as Risk Management Framework (RMF), STIGs and other government security specifications and guidelines Knowledge of cybersecurity technology and trends Proficient in Atlassian toolset to include Confluence More ❯
change delivery teams to promote secure-by-design approaches, identify security requirements, and ensure a secure environment. Support and review product and project security throughout the development lifecycle, highlighting cybersecurity risks to stakeholders. To be successful as a Senior Security Consultant, you should have experience with: Identifying, mitigating, and remediating security weaknesses in technology solutions. Infrastructure and platform security. … Stakeholder management and communication skills to influence solutions. Additional valued skills include: Formal CyberSecurity qualifications such as Degree/Master's or CISSP. Experience securing Cloud and Big Data platforms. Experience with securing Generative AI solutions. The role is based in our Knutsford office. Purpose of the role: Enable 'secure by design' supporting change programs, designing and implementing secure More ❯
Air Force, and Army, in addition to our Fortune 150 clients and state partners. We specialize in secure cloud implementations (AWS, Azure, Google), agile software development, and full-spectrum cybersecurity solutions. At GoldenTech, we invest in our people, their careers, and the missions they serve. Position Overview GoldenTech is seeking a Senior VTC Engineer with expert-level knowledge of video More ❯
and communicate progress status updates and weekly status updates on all technical risk assessment reports, cases describing potential security concerns and mitigations to enhance security posture. Required Skills: 1. CyberSecurity Support: 2. Demonstrated experience analyzing IT systems for cybersecurity vulnerabilities. 3. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and … Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cybersecurity vulnerabilities. 5. Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232. 6. Demonstrated experience with multiple OS's, including Windows … experience ensuring appropriate risk mitigation considerations, risks and vulnerabilities are well understood and appropriately mitigated. 13. Demonstrated experience analyzing procurement processes of hardware, software and services to comply with cybersecurity and operational needs. 14. Demonstrated experience creating concise and well-structured written assessments. 15. Certifications: CISSP Certification. Desired Skills: 1. CyberSecurity Support 2. Demonstrated experience with the Sponsor More ❯
places security at the heart of everything it does. Working closely with the Head of Security Architecture and Engineering, you'll orchestrate a talented team while collaborating directly with cybersecurity lawyers who advise on hundreds of incidents globally, providing unique insights that few organisations can offer. Key Responsibilities Strategic Leadership : Develop and maintain comprehensive security architecture strategies across diverse technology … to work on high-profile, industry-shaping matters First-rate training and development programs Inclusive, supportive working environment Flexible working arrangements focused on wellbeing optimisation Collaboration with world-class cybersecurity legal experts This role offers the perfect blend of technical leadership, strategic influence, and career development in one of the worlds most respected professional services environments. To apply, please submit More ❯
places security at the heart of everything it does. Working closely with the Head of Security Architecture and Engineering, you'll orchestrate a talented team while collaborating directly with cybersecurity lawyers who advise on hundreds of incidents globally, providing unique insights that few organisations can offer. Key Responsibilities Strategic Leadership : Develop and maintain comprehensive security architecture strategies across diverse technology … to work on high-profile, industry-shaping matters First-rate training and development programs Inclusive, supportive working environment Flexible working arrangements focused on wellbeing optimisation Collaboration with world-class cybersecurity legal experts This role offers the perfect blend of technical leadership, strategic influence, and career development in one of the world's most respected professional services environments. To apply, please More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cybersecurity transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a … Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST CyberSecurity & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy Information Assurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP … in business growth and bid development is desirable. What We’re Looking for: Essential Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cybersecurity certification. Desirable Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable. Chartered or Principal status via the UK CyberSecurity Council for Risk Management. IEng or More ❯
newport, wales, united kingdom Hybrid / WFH Options
Logiq
making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cybersecurity transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a … Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST CyberSecurity & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy Information Assurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP … in business growth and bid development is desirable. What We’re Looking for: Essential Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cybersecurity certification. Desirable Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable. Chartered or Principal status via the UK CyberSecurity Council for Risk Management. IEng or More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Logiq
making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cybersecurity transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a … Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST CyberSecurity & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy Information Assurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP … in business growth and bid development is desirable. What We’re Looking for: Essential Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cybersecurity certification. Desirable Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable. Chartered or Principal status via the UK CyberSecurity Council for Risk Management. IEng or More ❯
bradley stoke, south west england, united kingdom Hybrid / WFH Options
Logiq
making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cybersecurity transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a … Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST CyberSecurity & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy Information Assurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP … in business growth and bid development is desirable. What We’re Looking for: Essential Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cybersecurity certification. Desirable Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable. Chartered or Principal status via the UK CyberSecurity Council for Risk Management. IEng or More ❯
you'll enable our customers to securely integrate and automate their cloud environments, leading deployments of Palo Alto Networks' Cortex XSOAR platform to accelerate detection, response, and integration across cybersecurity tools. You'll serve as a trusted consultant, guiding customers through complex deployments, developing strategic automation workflows, and driving continuous improvement through real-time support and innovation. You'll collaborate … playbook customization Linux/Unix command-line proficiency and basic network troubleshooting Experience managing complex automated security solutions in large environments Deep understanding of security threats, internet protocols and cybersecurity tools and applications Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals Detailed experience in the installation, configuration, operation and documentation … of security solutions to prevent cybersecurity threats Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers Experience with RMF, STIGs, SCAP, or NIST frameworks Ability to document and explain complex security processes clearly Relevant certifications such as Security+, CEH, CISSP, GCIA are a plus Up to 30% domestic travel may be required More ❯