Rochester, Kent, South East, United Kingdom Hybrid / WFH Options
Technical Placements
use of modern software management tools like Atlassian Jira, you will improve software quality, streamline workflows and boost development efficiency. Moreover, you will play a pivotal role in advancing cybersecurity initiatives, addressing the increasing demands of the market and continue to innovate. You will be able to create great products that you can take pride in knowing have a positive More ❯
LAN/WAN/WLAN, cloud services (Azure & AWS), domain services, servers, hosting, EUC, and security tooling. Monitor infrastructure lifecycle management and define/deliver continuous improvement projects. Drive cybersecurity standards and compliance, managing risk, vulnerabilities, and adherence to frameworks such as ISO27001, NIST, PCI-DSS and GDPR. Manage and optimise third-party relationships, including managed service providers, ensuring contractual More ❯
guidance Deputise for the Group DPO during absences, including representing the function at senior forums and signing off on key decisions Qualifications Bachelor's degree in Data Protection, Law, Cybersecurity, Information Technology, or related field Professional certification such as CIPP/E, CIPM, or ISO27001 Lead Implementer Skills and Knowledge In-depth understanding of GDPR, DPA 2018, ISO27001, and related More ❯
projects • Maintain appropriate process procedures, compliance and service level monitoring, performance reporting and vendor management. • Implementing best practices around data security, privacy, and compliance for the teams compliance with cybersecurity and data protection and supporting along with BI lead • Strong stakeholder management will be required for maintaining relationships with our business users to clarify and influence requirements. Including liaising More ❯
Role The OCM Lead Consultant will serve as a key driver on complex consulting projects, delivering strategic change across areas such as ERP, data, AI, cloud, managed IT services, cybersecurity, and the digital workplace. Reporting to the UK&I OCM Director, this position plays a critical role in aligning people, processes, and technology to ensure the success of major transformation More ❯
acquired MAYA Design, a Pittsburgh-based digital design and innovation lab, to grow our capabilities around technology and design. We support our clients' total digital transformation through technology, design, cybersecurity, and risk management & financial engineering capabilities. And together with BCG, BCG Platinion's interdisciplinary team of technical experts enable customized technical solutions and accelerate delivery value through new business platforms More ❯
digital transformation journey and developing creative solutions to overcome them. · Risk Management: Strong risk management skills are essential for identifying and mitigating risks associated with digital transformation, such as cybersecurity threats, data privacy concerns, and regulatory compliance issues. Vendor Management: Proficiency in managing relationships with external vendors and partners, including contract negotiations, performance monitoring, and ensuring alignment with organizational goals More ❯
digital transformation journey and developing creative solutions to overcome them. · Risk Management: Strong risk management skills are essential for identifying and mitigating risks associated with digital transformation, such as cybersecurity threats, data privacy concerns, and regulatory compliance issues. Vendor Management: Proficiency in managing relationships with external vendors and partners, including contract negotiations, performance monitoring, and ensuring alignment with organizational goals More ❯
or authorization to test (ATT) for low to moderate information systems. Solid communication, written, and presentation skills to brief senior leadership Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field At least one of the following: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Governance, Risk and Compliance (CGRC), Certified in Risk More ❯
May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure May respond to computer security breaches and viruses Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses DevSecOps Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Ensure the More ❯
Position Title: CyberSecurity Threat Hunter, Tier 3 Location: USCENTCOM MacDill AFB Department: CyberSecurity Operations Cell (CSOC) Position Overview: The Tier 3 CyberSecurity Threat Hunter is a senior-level role responsible for proactively identifying, investigating, and mitigating advanced cyber threats within the organization's network. The ideal candidate will leverage extensive experience in threat intelligence, incident response, and … and incident response capabilities. • Training and Mentorship: Provide guidance and mentorship to junior threat hunters and security analysts, fostering a culture of continuous improvement. Qualifications: • Bachelor's degree in cybersecurity, Information Technology, or a related field; or 10 years relevant experience in cybersecurity and information technology. Additional Qualifications: • Active Top-Secret Clearance with SCI eligibility • Required Certifications … Compliance; additional certifications are a plus to include CTIA, GCIH, GCFI, CYSA, CISSP • Minimum of 5 years of experience in cybersecurity, with a focus on threat hunting. • Strong knowledge of attack vectors, malware analysis, and cyber threat intelligence frameworks including the MITRE ATT&CK framework to enhance threat detection, response capabilities, and alignment with organizational security strategies. • Proficiency in More ❯
Wiltshire, South West, United Kingdom Hybrid / WFH Options
Experis UK
detail-driven Technical Security Architect with 2-3 years' experience and a passion for designing secure, scalable solutions? We're looking for a proactive individual to join our growing cybersecurity team. You'll help shape and implement robust security architecture across enterprise environments, embedding best practice from design to delivery. What you'll do: Design and document secure architectures (HLDs More ❯
Analyst, you will: Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
Analyst, you will: Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
Albuquerque, New Mexico, United States Hybrid / WFH Options
TEKsystems c/o Allegis Group
activities, configuration, and data load work on the client site. Will relocate the right candidate. Responsibilities: - Support a government AWS cloud instance of Siemens' Teamcenter application - Work closely with Cybersecurity professionals to ensure all elements of the infrastructure and application remain hardened against cyber-attacks - Maintenance patching, and upgrades to the core Siemens Teamcenter application - Configure interfaces/integrations of More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. Responsibilities Job Duties and Responsibilities: The Systems Administrator 2 is responsible for the day-to-day management, maintenance, and support of the organization's IT infrastructure, including servers, virtualization More ❯
Familiarity with identity and access management (IAM) concepts and tools. • Experience with encryption techniques and cryptographic protocols. • Understanding of containerization technologies like Docker and Kubernetes. • In-depth understanding of cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments More ❯
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
Program Manager and Government Cyber Assurance Director to determine and prioritize business strategies. You will help execute critical and strategic missions across multifunctional teams including but not limited to cybersecurity subject matter experts, strategic communications and other key personnel. This role requires excellent organizational skills, a solid understanding of agile methodologies, and the ability to develop metrics and schedules. More ❯
effectively to non-technical stakeholders. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 4+ Years of experience in networking administration. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). Knowledge of network protocols, firewalls More ❯
off-chain systems. Security Culture & Collaboration Promote a security-first culture across product, data, legal, and compliance. Represent Fuse externally in customer, regulatory, and industry engagements. 5+ years in cybersecurity, with prior leadership or CISO experience. Deep understanding of cloud security (especially AWS), application security, and modern DevSecOps. Proven experience securing systems involving digital assets, cryptographic components, or distributed infrastructure. More ❯
Washington, Washington DC, United States Hybrid / WFH Options
MAGNUS Management Group
are ISO 9001, ISO 27001, ISO 20000, ISO 56002 & CMMI L3 SVC + SSD certified, and we provide expert consulting services in areas such as Information Technology, Management Consulting, CyberSecurity and Data Science. We leverage cutting-edge technologies, best practices and a creative technological edge to keep our clients ahead of the curve. Role Description Determines, develops, or manages More ❯
root-cause analysis for system and software issues. Develop automated scripts and tools to streamline monitoring, deployment, and maintenance tasks. Implement updates, patches, and system enhancements as required. Apply cybersecurity principles and practices to ensure system and software security. Ensure compliance with applicable security, regulatory, and organizational standards. Conduct risk assessments and support mitigation strategies. Work closely with software developers More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
MITRE
the public interest, with no commercial conflicts to influence what we do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're making a difference every day-working for a safer, healthier, and more secure nation and world. Our workplace reflects our values. We More ❯