data. Description The Naval Surface Warfare Center Dahlgren Division (NSWCDD) Dam Neck Activity's (DNA) work is focused on providing engineering, acquisition, logistical, and Cybersecurity (CS) support to the Navy, Marine Corps, Special Warfare Coalition, and Joint Forces for programs including but not limited to Common Total Ship Computing … total of Ten (10) years of full-time professional experience in all of the following functional areas: Computer security, military system specifications, and DoD cybersecurity policies; National Cyber Range Complex (NCRC) Total Ship Computing Environment (TSCE) Program requirements and mission, ship install requirements, and protocols; Risk Management Framework (RMF … and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS); Performing STIG implementation; Performing vulnerability More ❯
Responsibilities: Build, deploy, configure, and maintain on-premises and cloud-based cybersecurity infrastructure and applications running on Windows and Linux operating systems Engineer and implement cybersecurity solutions leveraging cloud services such as EC2, EBS, ELB, S3, and RDS. Provision AMIs, perform software installations, troubleshooting and maintenance. … Assist with research and implementation of enterprise-wide cybersecurity solutions/capabilities/enhancements to support customer business/mission goals and objectives. Evaluate and recommend changes and/or technology upgrades to address performance, standardization and industry best practices Provide specific, detailed information for hardware and software selection … oral presentations to senior/executive management Ability to work independently with little direction and guidance 6+ years related technical experience in network/cybersecurity engineering and experience with large-scale enterprise/global networks in a highly diverse environment with an emphasis in DoD capabilities Demonstrated experience modernizing More ❯
Plymouth, Devon, South West, United Kingdom Hybrid / WFH Options
TQR
Experienced I.T. professional required to work join as Operational Technology Engineer for global business based at their Plymouth site. Reporting to the Operational Technology lead, the successful candidate will manage the ongoing development and maintenance of the (OT) systems at the Plymouth site If you have a growth … follow OT policy and guidelines. Lead Cyber-risk awareness and security policy training, to enabling the business to maximise system usage benefits while integrating cybersecurity measures to protect data integrity and security. Complete third party vendor risk assessments, critical patch implementation, application whitelist testing and implementation. Diagnosing root causes … of a degree, relevant experience coupled with a HND/HNC in an Engineering or IT based discipline will also be considered. A recognised cybersecurity qualification coupled with relevant experience. Strong knowledge of cybersecurity policies & governance. Several years relevant experience in a manufacturing environment, ideally medical device manufacture More ❯
We are looking for an experienced and enthusiastic professional to join our team as a Senior IT CyberSecurity Engineer. As a key technical resource, you will help NHS Dumfries and Galloway in the monitoring and maintenance of all its More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Sparta Global is looking for passionate and committed individuals who want to kickstart a career in technology! You must be willing to complete full-time training, and will then be assigned to work in a role with one of our More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Sparta Global is looking for passionate and committed individuals who want to kickstart a career in technology! You must be willing to complete full-time training, and will then be assigned to work in a role with one of our More ❯
a contract currently under bid. Goldbelt Nighthawk offers sound solutions in software development and both defensive and proactive cybersecurity. Nighthawk offers an integrated, holistic cybersecurity workforce that is enthusiastic, continuously learning, and progressive. The team is fully committed to implementing dynamic cybersecurity solutions that effectively address the needs … s flexibility and expertise across the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Senior Cloud CyberSecurityEngineer will support the Overseas Buildings Operations (OBO) Information System Security Officer (ISSO). The Senior Cloud CyberSecurityEngineer will provide … skills. US citizen Must have a Top Secret clearance. Preferred Qualifications: Cloud security certifications such as AWS Certified Security - Specialty, Google Professional Cloud SecurityEngineer, Azure SecurityEngineer, or relevant certifications like CISSP, CCSP, or CISM are highly desired. The salary range for this position is More ❯
LMI Government Consulting (Logistics Management Institute)
Overview LMI is seeking a skilled Senior Cybersecurity Information Systems SecurityEngineer (ISSE) to support US Army PEO Soldier at Ft. Belvoir, Virginia. The ISSE will drive efforts that support software and hardware cybersecurity Risk Management Framework (RMF) Authority to Operate (ATO). LMI is committed … Define system security requirements in coordination with system engineers, program managers, and Authorizing Officials (or their delegates). Ensure continuous monitoring and verification of cybersecurity requirements throughout the system lifecycle. Provide cybersecurity advice and guidance to government stakeholders and contractor teams. Develop and review system security designs and … Identify and interpret security control non-compliance to determine the impact on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program. In concert with ISSM, work with product teams to identify controls, develop appropriate mitigations, and develop and track Program of Action and Milestone More ❯
Insight Global is actively hiring multiple Top Secret CyberSecurity Engineers to join our team supporting a newly awarded Missile Defense Program in Colorado Springs. The selected candidates will work on a team of Engineers responsible for providing senior level More ❯
heritage tracing back to Bell Labs, Bellcore, and Telcordia, our experts pave the way. We are seeking a highly skilled Senior R&D Engineer to join our team working on Identity, Credential, and Access Management (ICAM) systems for the US Army and Department of Defense. The successful candidate More ❯
a prime contractor providing manpower and support of IT Operations and Maintenance within a Federal Agency. We are currently interviewing for a CyberSecurityEngineer to support an agency serving more than 4000 users. This position adheres to strict process and policy governance in a defined cybersecurity … This role will also provide subject matter expertise and assistance to Agency end-users and staff. We are currently interviewing for a CyberSecurityEngineer to support this initiative in an enterprise-level work environment. Essential Responsibilities: Facilitates the implementation and sustainment of government-mandated Assured Compliance Assessment More ❯
a contract currently under bid. Goldbelt Nighthawk offers sound solutions in software development and both defensive and proactive cybersecurity. Nighthawk offers an integrated, holistic cybersecurity workforce that is enthusiastic, continuously learning, and progressive. The team is fully committed to implementing dynamic cybersecurity solutions that effectively address the needs … customers. Nighthawk's flexibility and expertise across the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The CyberSecurityEngineer will support the Overseas Buildings Operations (OBO) Information System Security Officer (ISSO). The CyberSecurityEngineer is responsible for designing … Ability to work collaboratively in a team environment and lead initiatives. Strong analytical and problem-solving skills. Minimum Qualifications: Must possess a Bachelor Degree cybersecurity, computer science, informational technology, or related fields; Additional (4) four years of experience may be substituted for a degree. Minimum Five (5) years of More ❯
Press Tab to Move to Skip to Content Link This IT CyberSecurityEngineer will report to the CyberSecurity Engineering Lead and will work within the Information Systems directorate based in our Crawley office. You will be a permanent employee. You will attract a salary of … Health support Switched On - scheme providing discount on hundreds of retailers' products Discounted gym membership Employee Assistance Programme Job purpose: The CyberSecurity IT Engineer will evaluate all security solution technologies and toolsets and help develop the security systems within the organisation and will ensure that UK Power More ❯
to design and implement a Missile Defense System with multiple layers of protection. We are currently reviewing candidate resumes for junior to senior level Cybersecurity Engineers in the Huntsville, AL area. This position is contingent upon contract award. Responsibilities Oversees the implementation of DoDD 8530.1, DoDD 8500.2, DoDI 8510.1 … and aviation systems engineering and logistic services, electronic warfare and electromagnetic effects analysis, UAS system integration and flight operations, full lifecycle C5ISR engineering services, cybersecurity and IT/IA innovative solutions and virtual training, simulation & serious game development and implementation. We have established a broad offering of products and More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
As a Senior CyberSecurityEngineer , you will play a key role in supporting the design, implementation, and maintenance of CyberSecurity Engineering solutions, controls, and processes across Thames Water's IT and OT environments. You will be responsible for supporting cybersecurity platform administration, enhancing our security … IT and OT systems, and a passion for continuous improvement in cybersecurity operations. What you'll be doing as a Senior CyberSecurityEngineer Support the creation of secure asset builds and system hardening capabilities across end-user computing and server environments. Collaborate with business stakeholders to … environments. Experience leading or mentoring others in delivering cybersecurity outcomes. Security engineering vendor or product certifications such as CVA, Microsoft Certified: Azure SecurityEngineer Associate, Tenable, or CyberArk. What's in it for you? Competitive salary up to £72,600 per annum depending on experience. Annual Leave More ❯
We are seeking a skilled and proactive CyberSecurityEngineer to join our team. In this role, the employee will play a key part in preventing cybercrime by leveraging expertise and analytics to monitor data at all contact points, detect malware and ransomware incidents, and recommend solutions for … addressing any vulnerabilities. The ideal candidate will have a strong understanding of cybersecurity standards and certifications, along with extensive knowledge of cybercriminal tactics. Responsibilities: Security Integration: Implement and maintain security controls and monitoring throughout the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect … comprehensive defenses against potential intruders. Take charge of daily monitoring for unusual activities, implementing defensive measures, and reporting security incidents. Work closely with the cybersecurity team to develop new protocols, additional layers of protection, and other proactive systems to stay ahead of cybercriminals. Keep documentation up-to-date for More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯
Overview: SimVentions, consistently voted one Virginia's Best Places to Work, is looking for an experienced cybersecurity professional to join our team! This individual will work directly with the Information System Security Manager (ISSM) to review and monitor the network and assess new technology capabilities. Travel: None Clearance: An … a clearance. Requirements: DoD 8140 IAT Level III or IAM Level III certification In-depth understanding of computer security, military system specifications, and DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Actively review and monitor network security boundary architectures utilizing Assured … User's Standard User Agreements (SUAs), Privileged User Agreements (PUAs), System Access and Authorization Request (SAAR) forms, annual training, and professional cert status Track cybersecurity workforce (CSWF) for the program per current DoD requirements Actively monitor SIPR for CTO notifications, verify applicability, research requirements to implement, and submit response More ❯