production software delivery and formal methods, including formal verification, specification, and analysis. The ideal candidate will play a critical role in improving the quality, cybersecurity, and resiliency of software delivered into critical mission systems across the Leidos portfolio. Key Responsibilities: Drive the transition and adoption of cutting-edge software … including specifications, verification plans, security protocols, and usage and basic training prerequisites. Mentor and provide technical guidance to junior engineers on formal methods and cybersecurity best practices. Stay current with industry trends, emerging technologies, and best practices in formal methods and cybersecurity. Conduct analysis of alternatives and SWOT-style … Minimum of 8 years of experience in production software delivery. Proven expertise in formal methods, including formal verification, specification, and analysis. Strong understanding of cybersecurity principles, threat modeling, and vulnerability assessment. Proficiency in programming languages such as C, C++, Java, or Python. Experience with formal verification tools and techniques More ❯
Network Engineer (Enterprise CyberSecurity … London Central £80,000 - £95,000 + Training + Progression + Company Benefits Are you a Network Engineer with a background in cybersecurity or infrastructure that wants to work for one of the globes biggest companies? Do you want to work with a highly skilled team that More ❯
Employment Type: Permanent
Salary: £80000 - £95000/annum Progression, Training, Company Benef
Threat Modelling Engineer - GCP (Senior Associate, Technology) Job Description As a Senior Engineer - Threat Modelling you will be a part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an individual contributor role focused on Security Architecture and … security architecture principles, frameworks, and best practices •Experience working with threat modeling methodologies such as MITRE ATT&CK, STRIDE, PASTA etc. •Overall experience in Cybersecurity: 5+ years •Security practices encompassing authentication, authorization, logging/monitoring, encryption, infrastructure security, and network/segmentation •Knowledge of cloud security frameworks •knowledge of More ❯
Threat Modelling Engineer - GCP (Senior Associate, Technology) Job Description As a Senior Engineer - Threat Modelling you will be a part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an individual contributor role focused on Security Architecture and … security architecture principles, frameworks, and best practices •Experience working with threat modeling methodologies such as MITRE ATT&CK, STRIDE, PASTA etc. •Overall experience in Cybersecurity: 5+ years •Security practices encompassing authentication, authorization, logging/monitoring, encryption, infrastructure security, and network/segmentation •Knowledge of cloud security frameworks •knowledge of More ❯
This position is a contingency opportunity. The System SecurityEngineer's primary function is working within Special Access Programs Facilities (SAPFs) and SCIF's supporting SMC and AFSPC acquisition programs. The … position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and/or Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization. Serve as the RMF Cybersecurity Specialist for the organization's Systems Maintain Day-to-Day security analysis of More ❯
basingstoke, south east england, United Kingdom Hybrid / WFH Options
iO Associates - UK/EU
Sector: Cybersecurity Consultant/Operational Technology Location: Hybrid (Basingstoke HQ + UK Travel) Salary : Up to £90,000 Are you a Cybersecurity Consultant looking for your next opportunity? If so.. iO Associates has partnered with a leading player in cybersecurity, who believe in innovation and security . … NIST, IEC 62443, etc.). Hands-on experience with OT-specific protocols (Modbus, DNP3, OPC) and industrial control systems . Proven track record delivering cybersecurity strategies, risk assessments, and security designs . Excellent communication skills to produce high-quality documentation and presentations . A full UK driving licence and More ❯
and Paid Time Off. Are you ready to take the next step in your career with us? Apply now! WHAT DOES A CYBERSECURITYENGINEER DO? Augment a well-established team as a CyberSecurity Engineer. This is a collaborative team environment that entails frequent interaction with customers. … paced team so a willingness to take on challenges to creatively solve customer requirement problems will be required. The successful candidate for CyberSecurityEngineer will be self-motivated and will support new development work as well as sustainment activities. Embrace the opportunity to showcase your CyberSecurity … Engineer expertise and contribute to impactful projects with a forward-thinking team! RESPONSIBILITIES The qualified CyberSecurityEngineer will be knowledgeable of Common Criteria Language, and FIPS 140 standards. Work on various network types of equipment and related devices from a security protection emphasis to include More ❯
Performs Cyber Systems Architecture, Cyber Technology Research Development, Cyber Data Administration, Cyber Knowledge Management, Cyber Network Services, Cyber Systems Administration, Cyber Systems Analysis, and Cybersecurity Defense Infrastructure Support activities from the National Initiative for Cybersecurity Education (NICE) Framework. This work can primarily be categorized as Infrastructure Security, in … code are concerned with the maintenance, administration, engineering, architecture, development, patching, and upgrades of the various toolsets, devices, applications, and systems used to perform cybersecurity and cyberspace operations. In accordance with enterprise IT change and configuration management policies, implements changes to cybersecurity and/or cyberspace operational systems … increase effectiveness or efficiencies in the systems capabilities in regards to monitoring and implementing logical access controls in order to enforce policy. May support cybersecurity and/or cyberspace operations metrics development, maintenance, and reporting. Designs, develops, documents, tests, and debugs cybersecurity and/or cyberspace operations application More ❯
Performs Cyber Systems Architecture, Cyber Technology Research Development, Cyber Data Administration, Cyber Knowledge Management, Cyber Network Services, Cyber Systems Administration, Cyber Systems Analysis, and Cybersecurity Defense Infrastructure Support activities from the National Initiative for Cybersecurity Education (NICE) Framework. This work can primarily be categorized as Infrastructure Security, in … code are concerned with the maintenance, administration, engineering, architecture, development, patching, and upgrades of the various toolsets, devices, applications, and systems used to perform cybersecurity and cyberspace operations. In accordance with enterprise IT change and configuration management policies, implements changes to cybersecurity and/or cyberspace operational systems … increase effectiveness or efficiencies in the systems capabilities in regards to monitoring and implementing logical access controls in order to enforce policy. May support cybersecurity and/or cyberspace operations metrics development, maintenance, and reporting. Designs, develops, documents, tests, and debugs cybersecurity and/or cyberspace operations application More ❯
Performs Cyber Systems Architecture, Cyber Technology Research Development, Cyber Data Administration, Cyber Knowledge Management, Cyber Network Services, Cyber Systems Administration, Cyber Systems Analysis, and Cybersecurity Defense Infrastructure Support activities from the National Initiative for Cybersecurity Education (NICE) Framework. This work can primarily be categorized as Infrastructure Security, in … code are concerned with the maintenance, administration, engineering, architecture, development, patching, and upgrades of the various toolsets, devices, applications, and systems used to perform cybersecurity and cyberspace operations. In accordance with enterprise IT change and configuration management policies, implements changes to cybersecurity and/or cyberspace operational systems … increase effectiveness or efficiencies in the systems capabilities in regards to monitoring and implementing logical access controls in order to enforce policy. May support cybersecurity and/or cyberspace operations metrics development, maintenance, and reporting. Designs, develops, documents, tests, and debugs cybersecurity and/or cyberspace operations application More ❯
Performs Cyber Systems Architecture, Cyber Technology Research Development, Cyber Data Administration, Cyber Knowledge Management, Cyber Network Services, Cyber Systems Administration, Cyber Systems Analysis, and Cybersecurity Defense Infrastructure Support activities from the National Initiative for Cybersecurity Education (NICE) Framework. This work can primarily be categorized as Infrastructure Security, in … code are concerned with the maintenance, administration, engineering, architecture, development, patching, and upgrades of the various toolsets, devices, applications, and systems used to perform cybersecurity and cyberspace operations. In accordance with enterprise IT change and configuration management policies, implements changes to cybersecurity and/or cyberspace operational systems … increase effectiveness or efficiencies in the systems capabilities in regards to monitoring and implementing logical access controls in order to enforce policy. May support cybersecurity and/or cyberspace operations metrics development, maintenance, and reporting. Designs, develops, documents, tests, and debugs cybersecurity and/or cyberspace operations application More ❯
Country Intelligence Group is seeking a Full-Time CyberSecurityEngineer to support our client located in Herndon, Virginia. The selected candidate will be part of a highly technical and in-depth penetration testing and ethical hacking team focused on assessing and exploiting risks and vulnerabilities in information … Conduct penetration testing and ethical hacking to identify security risks and system vulnerabilities. • Perform risk and threat analysis to provide decision-makers with actionable cybersecurity insights. • Document all identified system risks, planned test procedures, and test results. • Analyze vulnerabilities discovered during testing and assess potential security risks. • Review program … level documentation (e.g., system architecture, test plans, security plans) and provide recommendations to enhance cybersecurity posture. • Develop and document penetration testing plans, procedures, and security assessments. • Perform hands-on security testing, leveraging adversarial tactics to identify security gaps. • Recommend and document risk mitigation strategies based on penetration test findings. More ❯
CyberSecurityEngineer – UK – Remote - £60,000 - £70,000 pa + Bonus + Benefits JNC are working with a UK based financial services client that are looking to hire a talented CyberSecurityEngineer on a permanent basis. They are happy for the role to be More ❯
Understanding Algorithms, Network Protocols, Advanced Encryption, Security Protocols, and Cryptographic Resilience, IAT II Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a More ❯
advantage and improve everyday life worldwide. As part of the Expleo Digital and Emerging Technology (DET) team, you will report to the Head of Cybersecurity and play a key role within our forward-leaning Cybersecurity Practice. In this role, you will support the design and implementation of secure … the evolving threat landscape, cloud security trends, and software security vulnerabilities to ensure contemporary and effective delivery. Qualifications A degree (or equivalent experience) in Cybersecurity, Computer Science, Software Engineering, or a related technical discipline. Recognised industry certifications in cybersecurity or application security (CompTIA, ISC2, GIAC, ISACA, or CREST … models and shift-left security practices. Exposure to secure software supply chain practices, including code provenance, dependency management, and SBOM generation. Experience Experience in cybersecurity, secure software engineering, or cloud security roles, with a strong emphasis on delivery. Demonstrable experience embedding security controls and tooling into software development pipelines More ❯
Recro, a Certified Small Business, helps federal agencies achieve their goals through IT infrastructure, cybersecurity, DevOps, cloud services, and digital transformation. We prioritize innovation, employee growth, and a … collaborative work environment, guided by our core value - to make a difference. Currently, Recro is seeking a motivated, career and customer oriented CyberSecurityEngineer, to join our team in Chantilly, VA. Clearance • TS/SCI (CI Poly) Responsibilities: Engineer, design, implement, integrate, and sustain Comply … improvements. Interacts with other team members and customers at multiple levels to gather, supply, or coordinate information Supports Assessment and Authorization activities related to cybersecurity technologies, where applicable Minimum Qualifications: Bachelor's degree or 4+ years of additional cyber experience in lieu of degree 7+ years of cyber experience More ❯
CyberSecurityEngineer (Penetration Tester) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: CACI seeks a motivated, mid-level CyberSecurityEngineer to More ❯
ManTech seeks a motivated, career and customer-oriented Principal CyberSecurityEngineer to join our team in Chantilly, VA. Responsibilities include but are not limited to: Engineer, design, implement, integrate, and sustain Comply-to-Connect (C2C) deployment support to migrate, deploy, improve, and maintain C2C services. … improvements. Interacts with other team members and customers at multiple levels to gather, supply, or coordinate information Supports Assessment and Authorization activities related to cybersecurity technologies, where applicable Minimum Qualifications: Bachelor's degree or 4+ years of additional cyber experience in lieu of degree 7+ years of cyber experience More ❯
Job Description CyberSecurityEngineer - Crawley – up to £80,000 + Bonus La Fosse has partnered with a tech driven organisation to hire a CyberSecurity Engineer. With the team going through a growth phase, this is an opportunity to join a forward-thinking team and drive impactful More ❯
CyberSecurityEngineer - Crawley – up to £80,000 + Bonus La Fosse has partnered with a tech driven organisation to hire a CyberSecurity Engineer. With the team going through a growth phase, this is an opportunity to join a forward-thinking team and drive impactful security initiatives More ❯
CyberSecurityEngineer ** Eligibility and willingness to gain UK Security Clearance ** We are partnered with a Software Consultancy who are making waves within National Security. Joining this cutting-edge software firm will allow you to work at the forefront of technological innovation, on projects that safeguard our nation More ❯
The CyberSecurity IT Engineer will evaluate all security solution technologies and toolsets and help develop the security systems within the organisation and will ensure that data, network, and systems are protected from cyber threats and will comply with the relevant standards and regulations. You will also provide More ❯
Springfield, Virginia, United States Hybrid / WFH Options
Lockheed Martin
your career in CyberSecurity by working for one of the top companies in the world? The Kayenne program is seeking a CyberSecurityEngineer technical lead for the Program's Cyber Team. This team is responsible for applying an interdisciplinary, collaborative approach to plan, design, develop, validate … evaluate and analyze design constrains, trade-offs and detailed system and security design as they pertain to the Cyber domain. Furthermore, they will conduct cybersecurity test and evaluation of hardware and/or software designs to verify and validate compliance with defined specifications and requirements, and employ cybersecurity … integration Support Basic Qualifications: 1. DOD 8570 Experience. 2. Experience with Authorization and Accreditation processes using Risk Management Framework methodologies. 3. Experience with DoD cybersecurity requirements, policies, and procedures. Desired Skills: 1. Experience performing cybersecurity accreditation activities in support of software and system requirements, design, development, testing, and More ❯
The CyberSecurity IT Engineer will evaluate all security solution technologies and toolsets and help develop the security systems within the organisation and will ensure that data, network, and systems are protected from cyber threats and will comply with the relevant standards and regulations. You will also provide More ❯
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Expert CyberSecurityEngineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through … Security Architectures, Roadmaps, and investments. Oversee the work of Senior-, Mid-, and Junior-level contractor CyberSecurity Engineers. Required: Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science More ❯