determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
various types of hardware and media Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
or similar platforms. Proven ability to lead full lifecycle, customer-facing programs-managing delivery, stakeholder engagement, and alignment throughout. Exposure to delivering projects spanning software, cloud and hardware or firmware would be highly advantageous. Solid financial acumen with experience managing program budgets, forecasts, and overall spend. Salary Up to £70,000 with package which includes private healthcare, enhanced pension contribution More ❯
focus on Access Control and CCTV) Identify and resolve issues with security equipment promptly to minimise downtime and maintain overall security of the client premises. Keep security software and firmware up to date to address vulnerabilities and ensure systems are protected against the latest threats. Work closely with other relevant departments to organise ordering of spare or replacement equipment, and More ❯
right designs. Generate manufacturing files (Gerbers/ODB , pick-and-place, BOMs) with clear build notes, and document design decisions, test results, and revision history. Collaborate closely with electronics, firmware, mechanical, and manufacturing teams to define requirements, review designs, and integrate PCBs into complete products. Bonus: Oversee fabrication and assembly vendors, develop test plans, bring up prototypes, and debug issues More ❯
Pentagon and external SVTC, DVTC, and TS VoIP systems (hardware and software across all classification enclaves) ensuring uninterrupted functionality for OUSD(I&S) by troubleshooting, fault isolation, repair, replacement, firmware updates, and system programming code loading. Provide day-to-day break-fix support for Studio VTCs, DVTCs, and TS VoIPs, including system upgrades, end-user training, license transfers, port activation More ❯
At BlueHalo, an AV Company our analysts provide actionable intelligence. We quickly convert customer requirements into real hardware, software, firmware, and mechanical solutions in weeks, not years. With an organizational structure and design processes tailored to quick reaction, our process identifies risks that would prevent delivery and implements mitigation strategies to meet goals at mission speed. Our team is expanding More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
Brighton, Sussex, United Kingdom Hybrid / WFH Options
Paxton Access
types of roles and locations below, and let us know which areas you're interested in. Brighton, Sussex (UK): Manufacturing - Assembly Operatives, Manufacturing Engineers, Technicians, Compliance. Engineering - Software, Electronics, Firmware, and Mechanical. Product & Project Management - Product Test, Product Management, Project Management, Product Support - Training and Technical Support, People Operations - Finance, IT, HR, Facilities, Health & Safety, Supply Chain. Sales & Marketing - Internal More ❯
experience in managing a technical and engineering staff capable of assisting the Government in the integration of COTS, Non-Developmental Item (NDI) and GOTS C5ISR hardware/software/firmware, equipment and systems into ground/airborne platforms, Government facilities and sites. Top Secret/SCI clearance required. Preferred: Direct experience with management projects involving multifunctional tasks and substantial complexity. More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
evaluating security solutions for classified processing, and conducting vulnerability and risk assessments for accreditation. Managing configuration and system integrity by administering configuration management (CM) for security software, hardware, and firmware, ensuring compliance with security controls, and assessing the impact of system changes. Developing and maintaining security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification & Accreditation (C&A) packages More ❯