DemandTrendPermanent Cybersecurity Job Vacancies

826 to 850 of 3,264 DemandTrendPermanent Cybersecurity Jobs

Security Engineer with Security Clearance

Washington, Washington DC, United States
Golden Tech Systems Inc
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cyber security solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Officer (ISSO) with Security Clearance

Clarksburg, West Virginia, United States
Paradyme Management
and ensure ongoing compliance Technical Experience or Knowledge Minimum of 6+ years of security experience as an ISSO or equivalent position Demonstrate experience with the following tools: JCAM (Joint Cybersecurity Authorization Management) Telos Xacta GitLab More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineering & Operation Lead CISSP Required with Security Clearance

Boulder, Colorado, United States
TEKsystems c/o Allegis Group
Description: The Security Engineering and Operation Lead will be located at the NOAA Cybersecurity Center (NCSC) in Boulder, CO or Fairmont, WV, with the authority to oversee the site's IT operations in support of the NCSC mission. This leadership position involves managing the operation and maintenance of the Boulder and Fairmont sites, as well as providing oversight for the … particularly with NOAA or other federal agencies. - Familiarity with Trusted Internet Connections Access Provider (TICAP) infrastructure. - Experience in long-range IT systems planning and modernization efforts. - Knowledge of relevant cybersecurity frameworks and compliance standards. - Experience with IT service management (ITSM) tools and best practices. Eligibility requirements apply to some benefits and may depend on your job classification and length of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Engineer with Security Clearance

Ellabell, Georgia, United States
TEKsystems c/o Allegis Group
Details 1) Strong network engineering background 2) Strong Firewall experience - Palo Alto 3) Endpoint device host-based security 4) IPsec tunnels Secondary Skills - Nice to Haves Security Information security Cyber security Job Description Design, build, test, and deploy new security technologies, which include the development of the operational manual and run books Provides technical security operations engineering services to support More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Information Systems Security Engineer with Security Clearance

Aberdeen, Maryland, United States
Torin Consulting, Inc
and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO - Information Assurance with Security Clearance

Maryland, United States
Eliassen Group
Position Title: ISSO - Information Assurance Clearance: Top-Secret/Location: APG Education: Bachelor's Degree in Cyber Security, Computer Science, Information Systems, Engineering, or related scientific or technical discipline. (Can be substituted with an additional 5 years of related Information Assurance experience and CISSP, CISM, CAP, CeH, or equivalent certifications.) Position Overview: We are looking for an experienced Information Assurance … Specialist to provide architecture support, certification and accreditation (C&A) expertise, and manage security monitoring activities. The role requires comprehensive experience in DoD cybersecurity authorization processes, familiarity with relevant Army and DoD regulations, and the ability to manage test events and cybersecurity monitoring. Key Responsibilities: Provide Information Assurance (IA) architecture support and facilitate certification and accreditation (C&A) processes. Conduct … with engineering teams to ensure system designs meet the Risk Management Framework (RMF) subsystem requirements, ensuring alignment with The Federal Information Security Management Act (FISMA) and DoD and Army cybersecurity policies and regulations. Support the design, development, and implementation of IA programs for identity and access management (IAM), Public Key Infrastructure (PKI), cyber situational awareness, and defensive cyber infrastructure and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Threat Analyst

Huntsville, Alabama, United States
ALTA IT Services
Threat Analyst to join our team in Huntsville, VA. The analyst will monitor and assess cyber threats, investigate security incidents, and provide actionable intelligence to strengthen the organization's cybersecurity posture. The ideal candidate will bring both technical expertise and an intelligence-driven approach to defending against evolving cyber threats. Key Responsibilities Monitoring & Analysis: Continuously monitor computer networks, investigate security … s degree (BS/BA required). Background in intelligence analysis, with at least 5 years of relevant experience. Experience with Splunk Enterprise Security (R). Strong knowledge of cybersecurity principles, network/endpoint/cloud security. Familiarity with frameworks such as MITRE ATT&CK and the Cyber Kill Chain. Excellent written and verbal communication skills. Ability to analyze complex More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Technology Security Analyst

City of London, London, United Kingdom
InterQuest Group
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
Posted:

Information Technology Security Analyst

London Area, United Kingdom
InterQuest Group
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
Posted:

Information Technology Security Analyst

slough, south east england, united kingdom
InterQuest Group
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
Posted:

Information Technology Security Analyst

london, south east england, united kingdom
InterQuest Group
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
Posted:

Sr. Cybersecurity Engineer

Dahlgren, Virginia, United States
Bowhead / UIC Technical Services
Overview CYBERSECURITY ENGINEER (RDTE) Bowhead is seeking an experienced Cybersecurity Engineer to join our team in Dahlgren, VA. The ideal candidate will have a strong background in computer networking concepts and protocols, as well as network security methodologies. The Cybersecurity Engineer will be responsible for identifying and mitigating vulnerabilities in security systems, conducting vulnerability scans, and applying system, network, and … operating system hardening techniques. Responsibilities Essential functions for the Cybersecurity Engineer include, but are not limited to: Conducting vulnerability scans and recognizing vulnerabilities in security systems. Using DoD network analysis tools to identify vulnerabilities (e.g., ACAS, HBSS, etc.). Conducting application vulnerability assessments. Identifying systemic security issues based on the analysis of vulnerability and configuration data. Sharing meaningful insights about … the context of an organization's threat environment that improve its risk management posture. Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Troubleshooting and diagnosing cyber defense infrastructure anomalies and working through resolution. Performing impact/risk assessments. Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. Skill in More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Technology Security Analyst

london (city of london), south east england, united kingdom
InterQuest Group
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
Posted:

Regional Information Security Officer

Manchester, North West, United Kingdom
Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
of this role. The Ideal candidate: To be successful in this role you will have substantial experience in IT and Technology, with considerable experience in a leadership role in cybersecurity, within complex multinational organisations. You will have a deep understanding of the cybersecurity market, trends, risk frameworks and security standards and regulations. The successful candidate will be proactive, with excellent … and underlying IT, Analyse the effectiveness of the security controls (technical, processes, people) in the countries and businesses in scope, Propose plans towards improvement, in line with the global cybersecurity strategy, Support group-wide initiatives to roll-out new controls or improve existing ones, Enforce the global cyber risk framework to the countries and businesses in scope, aligning and influencing … Keep a constant innovative, challenging and constructive attitude towards continuous improvement. Key skills and experience: Substantial experience in IT and Technology, with considerable experience in a leadership role in cybersecurity within complex multinational organisations, Previous experience managing cyber incidents in a complex multinational organisation, Proven ability to coach, lead, and motivate a high performing team, Deep understanding of the cybersecurity More ❯
Employment Type: Permanent, Work From Home
Posted:

Information Systems Security Engineer L2

Colorado Springs, Colorado, United States
Keenbee Talent Soluitions
As an ISSE Level 2, you will perform cybersecurity tasks on classified networks supporting the development and deployment of test and training infrastructure critical to space mission superiority. Youll bring a deep understanding of Department of Defense (DoD) and Intelligence Community (IC) cybersecurity standards, strong technical knowledge, and the ability to communicate effectively in high-stakes environments. Key Responsibilities: Apply … the confidentiality, integrity, and availability of data and systems. Support system security engineering efforts in accordance with the Risk Management Framework (RMF). Evaluate hardware and software designs for cybersecurity compliance and provide technical recommendations. Develop and maintain cybersecurity documentation including POA&Ms, Security Controls Traceability Matrices, and System Security Plans (SSPs). Lead and support Authorization and Accreditation (A … A) efforts including ATO and IATT documentation. Develop and execute test plans to validate security requirements and system performance. Present cybersecurity findings and strategies to stakeholders, including government representatives and cross-functional teams. Manage multiple priorities and projects with minimal supervision in a fast-paced environment. Stay current on and maintain compliance with DoD cybersecurity training and certification requirements. Required More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Cybersecurity Consultant

London, United Kingdom
Hybrid / WFH Options
Outpost24 Group
Outpost24 is hiring a Cyber Security Consultant to join our growing team in the London, Amsterdam, or Leuven! In this role, you will play a vital part in supporting and enhancing the delivery of our services to customers worldwide. We're seeking a professional with strong communication and organizational skills, combined with a hands-on approach to client issue management … consultancy for our expanding global customer base. If you're ready to make an impact and grow your career in a fast-paced cybersecurity environment, keep reading! As a Cyber Security Consultant your key responsibilities will include: Customer Engagement : Engaging with customers through advisory sessions, acting as their trusted security expert. Threat Landscape Analysis : Providing insights on the evolving threat … actions. You will also provide Executive summaries to customers via their reporting on ways to improve their ways of working. What makes you our ideal candidate? Proven background in cybersecurity consulting or managed services (5+ years), ideally supporting multiple clients. Passionate about cybersecurity and eager to innovate in managed services, with a solid understanding of cybersecurity frameworks, tools, and trends. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Exploitation Analyst 3 with Security Clearance

Georgia, United States
Torin Consulting, Inc
success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital … Doctorate with 4 years' experience. Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree … and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Georgia, United States
Torin Consulting, Inc
success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital … years of experience All Levels: Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree … and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

San Antonio, Texas, United States
Torin Consulting, Inc
success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital … years of experience All Levels: Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree … and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Aurora, Colorado, United States
Torin Consulting, Inc
success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital … years of experience All Levels: Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree … and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Wahiawa, Hawaii, United States
Torin Consulting, Inc
success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Exploitation Analyst, Digital … years of experience All Levels: Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree … and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network Engineer- Decentralized Services and Networks with Security Clearance

Arlington, Virginia, United States
Red Gate Group
in Computer Science, Engineering, or a related field (Master's degree preferred). TS/SCI Clearance Minimum of 8 years of relevant experience in network development, network security, cybersecurity, and/or enterprise systems First-hand experience with research and/or development of decentralized services and networked software systems Substantial experience with decentralized software services across a wide … organizational skills, attention to detail, and reliability Familiarity with general systems engineering principles for management of complex systems development. Desired Qualifications: Experience with classified network accreditation and required DOD cybersecurity activities Experience with Clandestine or Covert Operations (Desired) Experience with Cyber Operations (Desired) Experience working with Special Access Programs (SAPs)/CAPs. Experience with Agile development methodologies. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Host Based Systems Analyst with Security Clearance

Arlington, Virginia, United States
Solutions Technology, Inc
of the severity of breaches. Provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. STI provides front-line response for digital forensics/incident response (DFIR) and proactively hunts for malicious cyber activity. Responsibilities: Assisting Federal leads with overseeing and leading forensic … SIFT - X-Ways - Volatility - WireShark - Sleuth Kit/Autopsy - Splunk - Snort - Other EDR Tools (Crowdstrike, Carbon Black, Etc) - Proficiency with conducting all-source research. Required Education: BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and host or digital forensics experience One of the Desired Certifications: GCFA, GCFE, EnCE, CCE, CFCE, CISSP More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Threat Intelligence & Vulnerability Lead

North West, United Kingdom
Hybrid / WFH Options
Anson Mccade
source intelligence (OSINT) research skills. Leadership & Communication Proven experience managing and developing technical teams. Ability to translate complex technical risks into clear, actionable insights for senior stakeholders. Degree in Cybersecurity, Computer Science, or equivalent experience. Why Join Us? Work on a mission-critical project with national significance. Be part of a diverse, collaborative, and forward-thinking team. Enjoy a culture More ❯
Employment Type: Permanent, Work From Home
Posted:

SOC Analyst with Security Clearance

Huntsville, Alabama, United States
Hybrid / WFH Options
Gridiron IT Solutions
Senior SOC Analyst Location: Huntsville, AL Work Type: Onsite Remote Work: No Job Description Respond to and resolve cybersecurity incidents and proactively prevent reoccurrence of these incidents. Apply leading-edge principles, theories, and concepts. Contribute to the development of new principles and concepts. Work on unusually complex problems and provide highly innovative solutions. Operate with substantial latitude for unreviewed action … clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, Cyber Security, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Employment Type: Permanent
Salary: USD 115,000 Annual
Posted:
Cybersecurity
10th Percentile
£26,750
25th Percentile
£35,536
Median
£55,750
75th Percentile
£75,000
90th Percentile
£95,000