Milton Keynes, Buckinghamshire, England, United Kingdom
Proactive Appointments
We are seeking a talented CyberSecurity/SOC Manager to join a highly skilled CyberSecurity SOC team within a leading internationally advanced technology solution provider As SOC Manager you must be capable and experienced to lead the day-to-day operations of our Security Operations Centre. This is a hands-on, with on-call role that requires strong More ❯
CyberSecurity Engineer - Essex Are you the kind of person who sees a suspicious login attempt and thinks "Not on my watch" ? Do you get a buzz from outsmarting hackers, securing systems, and keeping businesses safe? If yes, read on, this might be your perfect next move. What you'll be up to: Designing, building, and maintaining secure systems that More ❯
Essex, South East, United Kingdom Hybrid / WFH Options
LJ Recruitment Limited
CyberSecurity Engineer - Essex Are you the kind of person who sees a suspicious login attempt and thinks 'Not on my watch' ? Do you get a buzz from outsmarting hackers, securing systems, and keeping businesses safe? If yes, read on, this might be your perfect next move. What you'll be up to: Designing, building, and maintaining secure systems that More ❯
Evaluation Document (SED) CDRLs. Multiple programs is highly desirable. o Working knowledge of Type 1, Suite A, Suite B, and Commercial Cryptographic algorithms (Symmetric and Asymmetric). Experience with Cybersecurity and Risk Management Framework Cybersecurity Credential (e.g., CISSP) Experience using Cameo Systems Modeler for systems architecture, design, and requirements traceability. More ❯
this task include assessing network compliance against controls listed in NIST 800-53 and creating A&A packages. Perform assessment, compliance, and validation of IT systems to support the Cybersecurity program at USSOCOM, its Component Commands, TSOCs, and deployed forces. Execute a comprehensive assessment, compliance and validation of customer networks to ensure compliance with regulations and security and standards. The … Track A&A status of SIE governed ISs. Ensure these artifacts and documentation are available in the USSOCOM-chosen automated tool. - Advise stakeholders on the adequacy of implementation of cybersecurity requirements. - Provide DoD & IC RMF subject matter expertise to USSOCOM, its Component Commands, TSOCs, deployed forces and their delegates, including other Contractors, and assist with the development and execution of More ❯
achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering … by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and … security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Build Cybersecurity into systems deployed to operational environments. Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise More ❯
achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering … by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and … security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Build Cybersecurity into systems deployed to operational environments. Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise More ❯
/CD), continuous feedback, and continuous operations cycle May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline 3 and 10 years More ❯
achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering … efforts of engineering staff to design, develop, engineer and implement solutions to security requirements Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives Serve as the Program's ISSM Enable the Government with the development and implementation of DoD IT security services Collaborate with engineers on systems integration and life cycle requirements … incident management, and PKI and authorization services. Bachelor's degree in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required. In lieu of a Bachelor's degree, an additional 4 years of work-related experience may be substituted. Certifications More ❯
achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering … efforts of engineering staff to design, develop, engineer and implement solutions to security requirements Interact with customers, IT staff, and high-level corporate officers to define and achieve required Cybersecurity objectives Serve as the Program's ISSM Enable the Government with the development and implementation of DoD IT security services Collaborate with engineers on systems integration and life cycle requirements … incident management, and PKI and authorization services. Bachelor's degree in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required. In lieu of a Bachelor's degree, an additional 4 years of work-related experience may be substituted. Certifications More ❯
To be eligible for this position you must hold an active TS/SCI clearance with Polygraph. Education: Bachelors (Computer engineering, Computer Science, Electrical Engineering, Information systems, Information Technology, Cybersecurity, or a closely related discipline) Required Experience: 8+ years Desired Skills and Qualifications: Demonstrated strong technical skills and analytic abilities, as well as experience performing system security analysis and risk More ❯
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Unipart
Head of Cybersecurity Governance Risk and Compliance Location: Mainly remote based working in the UK with travel to Oxford, Cowley (OX4 2GQ) occasionally Contract: Permanent Hours: Full time Salary: £70,000 per annum, plus car/car allowance Benefits: 33 days holiday, pension, life assurance, employee assistance programme, wellbeing support, and flexible benefits scheme About the Job As our Head … of Cybersecurity Governance Risk and Compliance youll work closely with business and technology teams, helping to articulate and communicate the InfoSec governance program, identify risks and evaluate and help implement controls and improvements. As part of your key responsibilities youll: Manage the day to day of the function and team Support the management of Information Security governance for the organisation … feel included, safe and confident to be the best version of yourself and do your best work every day. You may also have experience in the following: Head of Cybersecurity GRC, Head of Information Security Governance, Cybersecurity Governance Lead, GRC Manager (Cybersecurity), Information Security Risk Manager, Senior GRC Consultant (Cybersecurity), Cybersecurity Risk and Compliance Lead, Information Security Compliance Manager, Head More ❯
Greener Future We are a leading provider of renewable electricity and are passionate about accelerating the UKs transition to a sustainable energy future. As part of our commitment to cybersecurity, compliance, and operational resilience, we are seeking a skilled IT & Cyber Essentials Coordinator to manage our internal systems and lead the implementation and maintenance of our Cyber Essentials certification. This … and software asset registers. Oversee device hardening, firewall configuration, endpoint protection, and patch management. Coordinate internal readiness for Cyber Essentials assessments and liaise with external assessors. Develop and enforce cybersecurity policies, processes, and end-user awareness training. Monitor access controls and ensure least-privilege principles are applied consistently. Essential Skills & Experience: Proven experience in IT support, systems administration, or information More ❯
standard tools such as ACAS (Tenable.sc), AWS Inspector, and DISA STIG frameworks. The engineer is responsible for identifying, analyzing, and driving remediation of security vulnerabilities in alignment with DoD cybersecurity standards and Risk Management Framework (RMF) requirements. Core Responsibilities: Lead enterprise-wide vulnerability scanning, analysis, and reporting using ACAS for traditional infrastructure and AWS Inspector for cloud-hosted assets Interpret … timely ingestion of findings into eMASS Provides mentorship to junior analysts and contributes to standard operating procedures and policy refinement Minimum Qualifications: 10+ years of hands-on experience in cybersecurity operations Demonstrated expertise with ACAS (Tenable.sc/Nessus), AWS Inspector, and DISA STIGs Solid understanding of NIST SP 800-53 controls and RMF processes Hands-on expertise with compliance systems More ❯
high-growth Cyber team is seeking a Cyber Strategy Consultant to support large-scale transformation programmes across public and private sector clients. You'll gain exposure to the full cybersecurity lifecycle-from risk assessments and regulatory frameworks to cyber maturity and strategic delivery. Key Responsibilities Support cyber transformation projects, governance assessments, and maturity roadmaps Assist with cyber strategy documentation and … to reports, client workshops, presentations, and stakeholder engagement Develop knowledge of security concepts, risk appetite alignment, and digital resilience What We're Looking For Degree or equivalent experience in Cybersecurity, InfoSec, or Risk Management Passion for cyber strategy, transformation, and business risk Some familiarity with regulatory standards and control frameworks Strong problem-solving and stakeholder communication skills Ability to work More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Anson Mccade
and managing technical security operations. Excellent communication skills with an ability to explain complex threats to both technical and non-technical stakeholders. A relevant degree or equivalent experience in cybersecurity, computer science, or related discipline. Line management and mentoring experience within a SOC or cyber threat team. Must hold DV clearance (or be eligible to obtain it). For more More ❯
Qualifications: Bachelor's degree in Computer Science, Engineering, or a related field (Master's degree preferred). TS/SCI Clearance Minimum of 8 years of relevant experience in cybersecurity, network development, network security, and/or enterprise systems First-hand experience with research and/or development of secure platforms, security software for endpoints, and information security software systems … organizational skills, attention to detail, and reliability Familiarity with general systems engineering principles for management of complex systems development Desired Qualifications: Experience with classified network accreditation and required DOD cybersecurity activities Experience with Clandestine or Covert Operations (Desired) Experience with Cyber Operations (Desired) Experience working with Special Access Programs (SAPs)/CAPs Experience with Agile development methodologies. More ❯
a career move that will put you at the heart of a global financial institution? Then bring your skills in legal analysis, problem solving and communication to Citi's Cybersecurity Legal Team. By Joining Citi, you will become part of a global organisation whose mission is to serve as a trusted partner to our clients by responsibly providing financial services … that enable growth and economic progress. Team/Role Overview The Cybersecurity Legal Team is a global team that provides Citi businesses and functions with legal counsel on all matters related to cybersecurity. The primary responsibility of this role is to provide legal support, advice, and guidance, in coordination with the Cybersecurity Legal Team and under the supervision of the … Cybersecurity Legal group manager, on cybersecurity matters across Citi, with a particular emphasis on Citi's UK, Europe, and Middle East and Africa clusters. This role requires a pragmatic, proactive attorney with thorough understanding of cybersecurity, combined with a solid conceptual/practical grounding in the laws and regulations for the geographies in which we operate. What you'll do More ❯
success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital … improving, protecting, and defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system … to an Associate's degree Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security) Position requires active Security Clearance with appropriate Polygraph Pay Range: COMPETITIVE The RealmOne pay range for this job level is a general More ❯
Southlake, Texas, United States Hybrid / WFH Options
Charles Schwab
the finance industry together. Schwabs Cybersecurity organization is the first line of defense for Schwab. The Lead Engineer of Cryptography will play a key role on a team of cybersecurity data protection subject matter experts and engineers to create, implement, and maintain cryptography controls using on-prem, SaaS, and IaaS cloud-based solutions to reduce risk and enforce Schwabs … applying complex algorithms, mathematical models, and encryption techniques to protect sensitive data from unauthorized access, ensuring data integrity and confidentiality within an organization. This role requires expertise in the cybersecurity industry. Responsibilities Include, but not Limited to: Design, analyze, and implement various cryptographic algorithms like symmetric encryption (AES), asymmetric encryption (RSA), digital signatures, and key management protocols based on organizational … create meet their needs as products evolve. Communicate extensively with Data Protection Product and engineering teams across the organization. Drive complex technical initiatives to full delivery leveraging knowledge of Cybersecurity practices, software engineering principles, agile frameworks, and customer engagement. Lead team to design, build, and maintain infrastructure to meet the organizations requirements and ensure high availability. Applying adept understanding More ❯
Papillion, Nebraska, United States Hybrid / WFH Options
Charles Schwab
the finance industry together. Schwabs Cybersecurity organization is the first line of defense for Schwab. The Lead Engineer of Cryptography will play a key role on a team of cybersecurity data protection subject matter experts and engineers to create, implement, and maintain cryptography controls using on-prem, SaaS, and IaaS cloud-based solutions to reduce risk and enforce Schwabs … applying complex algorithms, mathematical models, and encryption techniques to protect sensitive data from unauthorized access, ensuring data integrity and confidentiality within an organization. This role requires expertise in the cybersecurity industry. Responsibilities Include, but not Limited to: Design, analyze, and implement various cryptographic algorithms like symmetric encryption (AES), asymmetric encryption (RSA), digital signatures, and key management protocols based on organizational … create meet their needs as products evolve. Communicate extensively with Data Protection Product and engineering teams across the organization. Drive complex technical initiatives to full delivery leveraging knowledge of Cybersecurity practices, software engineering principles, agile frameworks, and customer engagement. Lead team to design, build, and maintain infrastructure to meet the organizations requirements and ensure high availability. Applying adept understanding More ❯
Omaha, Nebraska, United States Hybrid / WFH Options
Charles Schwab
the finance industry together. Schwabs Cybersecurity organization is the first line of defense for Schwab. The Lead Engineer of Cryptography will play a key role on a team of cybersecurity data protection subject matter experts and engineers to create, implement, and maintain cryptography controls using on-prem, SaaS, and IaaS cloud-based solutions to reduce risk and enforce Schwabs … applying complex algorithms, mathematical models, and encryption techniques to protect sensitive data from unauthorized access, ensuring data integrity and confidentiality within an organization. This role requires expertise in the cybersecurity industry. Responsibilities Include, but not Limited to: Design, analyze, and implement various cryptographic algorithms like symmetric encryption (AES), asymmetric encryption (RSA), digital signatures, and key management protocols based on organizational … create meet their needs as products evolve. Communicate extensively with Data Protection Product and engineering teams across the organization. Drive complex technical initiatives to full delivery leveraging knowledge of Cybersecurity practices, software engineering principles, agile frameworks, and customer engagement. Lead team to design, build, and maintain infrastructure to meet the organizations requirements and ensure high availability. Applying adept understanding More ❯
Phoenix, Arizona, United States Hybrid / WFH Options
Charles Schwab
the finance industry together. Schwabs Cybersecurity organization is the first line of defense for Schwab. The Lead Engineer of Cryptography will play a key role on a team of cybersecurity data protection subject matter experts and engineers to create, implement, and maintain cryptography controls using on-prem, SaaS, and IaaS cloud-based solutions to reduce risk and enforce Schwabs … applying complex algorithms, mathematical models, and encryption techniques to protect sensitive data from unauthorized access, ensuring data integrity and confidentiality within an organization. This role requires expertise in the cybersecurity industry. Responsibilities Include, but not Limited to: Design, analyze, and implement various cryptographic algorithms like symmetric encryption (AES), asymmetric encryption (RSA), digital signatures, and key management protocols based on organizational … create meet their needs as products evolve. Communicate extensively with Data Protection Product and engineering teams across the organization. Drive complex technical initiatives to full delivery leveraging knowledge of Cybersecurity practices, software engineering principles, agile frameworks, and customer engagement. Lead team to design, build, and maintain infrastructure to meet the organizations requirements and ensure high availability. Applying adept understanding More ❯
the finance industry together. Schwabs Cybersecurity organization is the first line of defense for Schwab. The Lead Engineer of Cryptography will play a key role on a team of cybersecurity data protection subject matter experts and engineers to create, implement, and maintain cryptography controls using on-prem, SaaS, and IaaS cloud-based solutions to reduce risk and enforce Schwabs … applying complex algorithms, mathematical models, and encryption techniques to protect sensitive data from unauthorized access, ensuring data integrity and confidentiality within an organization. This role requires expertise in the cybersecurity industry. Responsibilities Include, but not Limited to: Design, analyze, and implement various cryptographic algorithms like symmetric encryption (AES), asymmetric encryption (RSA), digital signatures, and key management protocols based on organizational … create meet their needs as products evolve. Communicate extensively with Data Protection Product and engineering teams across the organization. Drive complex technical initiatives to full delivery leveraging knowledge of Cybersecurity practices, software engineering principles, agile frameworks, and customer engagement. Lead team to design, build, and maintain infrastructure to meet the organizations requirements and ensure high availability. Applying adept understanding More ❯
Lone Tree, Colorado, United States Hybrid / WFH Options
Charles Schwab
the finance industry together. Schwabs Cybersecurity organization is the first line of defense for Schwab. The Lead Engineer of Cryptography will play a key role on a team of cybersecurity data protection subject matter experts and engineers to create, implement, and maintain cryptography controls using on-prem, SaaS, and IaaS cloud-based solutions to reduce risk and enforce Schwabs … applying complex algorithms, mathematical models, and encryption techniques to protect sensitive data from unauthorized access, ensuring data integrity and confidentiality within an organization. This role requires expertise in the cybersecurity industry. Responsibilities Include, but not Limited to: Design, analyze, and implement various cryptographic algorithms like symmetric encryption (AES), asymmetric encryption (RSA), digital signatures, and key management protocols based on organizational … create meet their needs as products evolve. Communicate extensively with Data Protection Product and engineering teams across the organization. Drive complex technical initiatives to full delivery leveraging knowledge of Cybersecurity practices, software engineering principles, agile frameworks, and customer engagement. Lead team to design, build, and maintain infrastructure to meet the organizations requirements and ensure high availability. Applying adept understanding More ❯