and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
KeyCloak, AD, PKI) • Operating systems: Linux, Windows, Red Hat Enterprise Linux • Version control systems: GitLab, GitHub • Knowledge of Mobile Device Management, firewalls (Forcepoint, Apache Tomcat) • Deep understanding of DoD cybersecurity standards (STIGs, SCAP, RMF) • Active Sec+ or equivalent IAT Level II Certification Location: Mary Esther, Florida Onsite expectation: Onsite Clearance Level: TS/SCI - Client can onboard candidates with a More ❯
performed at Schriever SFS, CO. Working indoors in an office environment. Potentially exposed to electrical or mechanical hazards, elevated work areas, and confined spaces. Must comply with all applicable cybersecurity and DoD information assurance policies. May require occasional travel or support contingency operations. May involve rotating shifts or on-call duty in support of 24/7 mission requirements. SPECIAL More ❯
fast-paced environment. Preferred APMP or Shipley certification or training in proposal pricing Familiarity with government cost accounting standards (CAS) and DCAA compliance Experience with pricing for Health IT, cybersecurity, or other specialized federal sectors Experience with FP&A tools and systems Concept Plus is an Affirmative Action/Equal Opportunity Employer. As such, we will give your application full More ❯
Systems Engineer Mid Mid-Level $73,000-$90,000 Newport News, VA U.S. Citizenship Required - Active Secret Clearance (TS/SCI Preferred) Drive innovation in Joint Command and Control-support GCCS-J sustainment and modernization with systems engineering expertise that More ❯
Systems Engineer Jr Entry Level $60,000-$72,000 Newport News, VA U.S. Citizenship Required - Active Secret Clearance (TS/SCI Preferred) Launch your engineering career-support Joint Command and Control by defining requirements and collaborating with senior engineers to More ❯
We have an outstanding career opportunity for a CyberSecurity Lead to join a leading Company located in the Honolulu, HI (On-Site) surrounding area. Location: Honolulu, HI (On-Site) Clearance: TS/SCI • At start date, must possess current IAM Level III Certification. One or more of the following certifications in ACTIVE status are acceptable. o GSLC - GIAC Security … Leadership Certification o CISM - Certified Information Security Manager o CISSP - Certified Information Systems Security Professional (or Associate) • 10+ years' knowledge of DoD and Army cybersecurity policy. • 3+ years' CyberSecurity planner and/or Defense Cyberspace Operations (DCO) experience. • 3+ years' program management experience and the ability to conduct Joint level network planning. • Experience with Army tactical communications systems. • Experience More ❯
On-site Immediate Hire Join Synertex LLC and bring your expertise to a mission that matters. We're looking for a Cyber Policy Analyst with a strong background in cybersecurity compliance, policy development, and stakeholder engagement to support our Department of Defense customer. If you're passionate about national security, information assurance, and translating policy into action-this opportunity is … for you. RESPONSIBILITIES Develop cyberspace plans, strategies, and policies to ensure compliance with Executive Orders, statutes, and national directives. Manage cybersecurity compliance efforts including metric tracking and FISMA-related reporting. Create and deliver periodic and ad-hoc training materials to support policy awareness and implementation. Maintain and organize the Directorate's SharePoint repository containing formal OCIO policies and technical documentation. … support for formal technical documents and briefings. Collaborate with stakeholders to track task progress, assign priorities, and brief senior leadership. REQUIREMENTS 4+ years of progressive, hands-on experience in cybersecurity roles (e.g., cyber analyst, ISSO, policy consultant, SOC analyst, etc.) Experience developing or modifying cybersecurity plans and policies based on National, IC, or DoD standards Strong technical documentation skills (e.g. More ❯
CEdge has an opportunity for a CyberSecurity Engineer (Senior Level), located in St Louis,MO If you are ready to work alongside World Renowned Technology experts, and carry the skills below, this is the opportunity that will inevitably take your career to unbelievable levels! This position requires a TS/SCI Security Clearance CyberSecurity Engineer (Senior) Overall Assignment … Description: The N2W CyberSecurity Engineer will serve as a member of the N2W Active IT and project team, providing systems engineering, security engineering, and project management expertise. The N2W CyberSecurity Engineer will support the overall goals/objectives of the NGA Technical Security Program, specifically, cybersecurity requirements required to support the National Security Information (NSI) compliance. The … N2W CyberSecurity Engineer will support the development and documentation of the N2W Active IT CyberSecurity architecture, roadmaps and investments. The CyberSecurity Engineer will act as a technical point of contact for many of the N2W activities, work with other teams to complete studies/research, develop concept of operations (CONOPS) in support of establishing new capabilities, and More ❯
Enablement, Logistics, and Training. Founded in 2019, Swift supports Civilian, Defense, and Intelligence Community customers across the country and around the globe. We are looking for a Network/CyberSecurity Engineer to join a dynamic program providing unique technology expertise to multiple mission areas across software development, data engineering, technical integration, network engineering, and quick reaction development. The technical … into total systems solutions that acknowledge technical, schedule, and cost constraints Establish, document, and maintain system baselines and configuration management items Integrate new architectural features into existing infrastructures; design cybersecurity architectural artifacts; provide architectural analysis and relate existing system to future needs and trends; embed advanced forensic tools and techniques for attack reconstruction; provide engineering recommendations; and resolve integration … testing issues Requirements: Bachelor's degree in Computer Science or related field (advanced degree preferred); equivalent experience may be substituted 10+ years of demonstrated combined network engineering experience and cybersecurity experience Knowledge of ICDs related to cybersecurity including (e.g., ICD 503) Ability to present technical approaches and findings clearly and effectively Ability to coordinate with multiple stakeholders concurrently More ❯
ensure a comprehensive understanding of the threat landscape and response to any incidents. Working within the security operations centre (SOC), the primary responsibility is to rapidly investigate and document cybersecurity incidents within the organisation. Key Responsibilities: (not limited to) Monitor and analyse network traffic, system logs, and other data sources to identify potential security incidents. Investigate alerts and suspicious activity … and implement security plans, policies, and training to prepare the organization to respond efficiently and effectively to cyber threats. Qualifications: Proven experience operating in a SOC or a related cybersecurity role. In-depth knowledge of cyber threats, threat intelligence frameworks and cybersecurity best practice. Strong analytical and problem-solving skills. GIAC Certified Incident Handler Bachelor's or Master … s degree in CyberSecurity or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling your contribution at 10% - totalling 15% 14 x salary Life Insurance linked to membership of the Retirement Savings Plan "Choices" flexible benefit scheme options including corporate gym memberships More ❯
ensure a comprehensive understanding of the threat landscape and response to any incidents. Working within the security operations centre (SOC), the primary responsibility is to rapidly investigate and document cybersecurity incidents within the organisation. Key Responsibilities: (not limited to) Monitor and analyse network traffic, system logs, and other data sources to identify potential security incidents. Investigate alerts and suspicious activity … and implement security plans, policies, and training to prepare the organization to respond efficiently and effectively to cyber threats. Qualifications: Proven experience operating in a SOC or a related cybersecurity role. In-depth knowledge of cyber threats, threat intelligence frameworks and cybersecurity best practice. Strong analytical and problem-solving skills. GIAC Certified Incident Handler Bachelor's or Master … s degree in CyberSecurity or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling your contribution at 10% - totalling 15% 14 x salary Life Insurance linked to membership of the Retirement Savings Plan 'Choices' flexible benefit scheme options including corporate gym memberships More ❯
Lutterworth, Leicestershire, East Midlands, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
Software Development Manager - Cybersecurity - Hybrid role - Amazing opportunity Excellent salary + Pension + Health + stock options + hybridworking- 2 days in the office per week. This is an excellent opportunity for an experienced Software Development Manager whois looking for a new challenge with an innovative global marketing leading company at the cutting-age of developing cybersecurity solutions. … Scrum, sprint planning, backlog grooming, and release management. Proficiency in risk management, resource allocation, and stakeholder communication. Knowledge of secure software development practices essential with any experience of the cybersecurity industry desirable. Understanding of ISO 9001/ISO 27001 quality standards. You will need to be able to assess the skills of team members including C# and so a background More ❯
Our Mission At Palo Alto Networks® everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and … we’re looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values … and incident responders with deep technical expertise and extensive experience in investigations, data breach response, digital forensics, and information security. With a proven track record of delivering mission-critical cybersecurity solutions, we work swiftly to provide effective incident response, attack readiness, and remediation plans, focusing on long-term support to enhance our clients’ security posture. Job Description Your Career Unit More ❯
across industries that matter. As one of the worlds leading organizations, they bring a strong track record delivering complex transformation within regulated environments. With deep experience across cloud architecture, cybersecurity, and digital strategy, they combine hands-on technical ability with strategic thinking and stakeholder engagement. The Opportunity: As a Manager in the IAM practice, you won’t just implement technology More ❯
across industries that matter. As one of the worlds leading organizations, they bring a strong track record delivering complex transformation within regulated environments. With deep experience across cloud architecture, cybersecurity, and digital strategy, they combine hands-on technical ability with strategic thinking and stakeholder engagement. The Opportunity: As a Manager in the IAM practice, you won’t just implement technology More ❯
across industries that matter. As one of the worlds leading organizations, they bring a strong track record delivering complex transformation within regulated environments. With deep experience across cloud architecture, cybersecurity, and digital strategy, they combine hands-on technical ability with strategic thinking and stakeholder engagement. The Opportunity: As a Manager in the IAM practice, you won’t just implement technology More ❯
across industries that matter. As one of the worlds leading organizations, they bring a strong track record delivering complex transformation within regulated environments. With deep experience across cloud architecture, cybersecurity, and digital strategy, they combine hands-on technical ability with strategic thinking and stakeholder engagement. The Opportunity: As a Manager in the IAM practice, you won’t just implement technology More ❯
london (city of london), south east england, united kingdom
Entasis Partners
across industries that matter. As one of the worlds leading organizations, they bring a strong track record delivering complex transformation within regulated environments. With deep experience across cloud architecture, cybersecurity, and digital strategy, they combine hands-on technical ability with strategic thinking and stakeholder engagement. The Opportunity: As a Manager in the IAM practice, you won’t just implement technology More ❯
We are seeking an experienced and technically grounded Product Owner to lead the development of traditional software and artificial intelligence-based capabilities across our cybersecurity solutions. This role focuses on building trustworthy, explainable, and performant software and AI features-while ensuring compatibility with deployment environments that may restrict the use of cloud-based or internet-connected AI services. You will … positioning and long-term AI strategy. Use Case Identification and Validation Identify high-value software and AI use cases in the context of intelligent file protection and the broader cybersecurity landscape. Validate feasibility with stakeholders, ensuring solutions are viable without reliance on cloud-based AI inferencing or LLM endpoints. Gather and elicit model requirements from defined use cases to enable … to translate complex data insights into actionable requirements. Excellent communication and stakeholder management skills. Comfortable working in a fast-paced, iterative, and agile environment. Preferred Experience: Solid understanding of cybersecurity concepts such as threat detection, SIEM, anomaly detection, and incident response. Experience with tools for tracking ML models in production (e.g., MLflow). We encourage you to apply even More ❯
Our client, a growing enterprise seeking to enhance its IT operations, is looking for an experienced Senior Infrastructure & Security Engineer to take ownership of 3rd-line infrastructure and cybersecurity support. This hands-on role requires deep technical competency, project experience, and a proactive attitude, ensuring stability, security, and efficiency in the company’s IT environment. As part of IT Operations … IT framework, leveraging Microsoft 365 and Azure (with AWS experience as a nice-to-have). Key Responsibilities Provide 3rd-line infrastructure and security support, ensuring system reliability and cybersecurity best practices. Design and implement cloud-based and on-premise IT solutions, supporting Azure and Microsoft 365 environments. Collaborate with 1st and 2nd line engineers, offering mentorship and technical leadership. … the IT environment. Work within a customer-facing role, ensuring IT systems align with business needs. Participate in infrastructure transformation initiatives, aligning with enterprise-level standards. Ensure compliance with cybersecurity and regulatory frameworks while implementing risk mitigation strategies. Key Requirements Proven experience in senior infrastructure and security engineering roles. Strong technical competency in cloud and cybersecurity, ideally within an enterprise More ❯
Our client, a growing enterprise seeking to enhance its IT operations, is looking for an experienced Senior Infrastructure & Security Engineer to take ownership of 3rd-line infrastructure and cybersecurity support. This hands-on role requires deep technical competency, project experience, and a proactive attitude, ensuring stability, security, and efficiency in the company’s IT environment. As part of IT Operations … IT framework, leveraging Microsoft 365 and Azure (with AWS experience as a nice-to-have). Key Responsibilities Provide 3rd-line infrastructure and security support, ensuring system reliability and cybersecurity best practices. Design and implement cloud-based and on-premise IT solutions, supporting Azure and Microsoft 365 environments. Collaborate with 1st and 2nd line engineers, offering mentorship and technical leadership. … the IT environment. Work within a customer-facing role, ensuring IT systems align with business needs. Participate in infrastructure transformation initiatives, aligning with enterprise-level standards. Ensure compliance with cybersecurity and regulatory frameworks while implementing risk mitigation strategies. Key Requirements Proven experience in senior infrastructure and security engineering roles. Strong technical competency in cloud and cybersecurity, ideally within an enterprise More ❯
and similar platforms. Educational Background: University degree in Computer Science or equivalent field. Meet Grouper We are our customers' trusted partner in the exciting world of safeguarding data, strengthening cybersecurity, and strategic consulting. We lead the way in ensuring data integrity, securing information, and navigating regulatory compliance with confidence. With a blend of technical expertise and clever thinking, we redefine More ❯
Experience in HRIS and/or GRC (Governance, Risk, Compliance) organisations is advantageous. Meet Grouper We are our customers' trusted partner in the exciting world of safeguarding data, strengthening cybersecurity, and strategic consulting. We lead the way in ensuring data integrity, securing information, and navigating regulatory compliance with confidence. With a blend of technical expertise and clever thinking, we redefine More ❯