With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients. Our cybersecurity operators are experts at assessing and defending mission-critical data and the networks that facilitate their operation. … talented and mission-driven Senior SOC Analyst with Test Access Point (TAP) experience to join our team in Washington, D.C. This role plays a vital part in protecting national security infrastructure by identifying, analyzing, and responding to complex cyber threats. The Senior SOC Analyst will lead efforts in threat detection, packet analysis, and incident response, while mentoring junior analysts … law enforcement, and other partners in secure environments Maintain strict adherence to classification protocols and data handling procedures Additional duties as assigned Requirements Education: Bachelor's degree in Cybersecurity, Information Systems, or a related technical field is preferred. Equivalent military or professional experience may be considered in lieu of a degree. Certificates: Minimum Required Certification: DoD 8140/ More ❯
Position Overview: We are seeking an Information Systems Security Officer (ISSO) to support cybersecurity and information assurance activities at Eglin AFB. The ideal candidate will help ensure the confidentiality, integrity, and availability of mission-critical systems by implementing and managing security controls in compliance with Department of Defense (DoD) cybersecurity policies and standards. Key Responsibilities: Develop … implement, and maintain security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. Participate in security audits, inspections, and assessments. Collaborate with system administrators, engineers, and program teams to ensure secure system design and operations. Support incident response by documenting and coordinating response actions. Provide recommendations to improve system security posture and support security awareness initiatives. Required Qualifications: Active Secret clearance (or higher). Current CompTIA Security+ certification More ❯
CSCI, a trusted classified environment partner for over 30 years, is seeking an Information Systems Security Officer (ISSO) with 4-6 years of experience in informationsecurity, information technology, enterprise risk or compliance field to join our cybersecurity team. This role provides strategic coordination across informationsecurity functions, ensuring strong inter-team collaboration … operational efficiency, and risk management for diverse national security programs. The ISSO will work with a small team to solve problems and explore new technologies to support client needs onsite. The ISSO will advise the client, leading the discovery of their cyber risks, understanding applicable policies, and developing a mitigation plan. The ISSO will guide the client through a … plan of action with presentations, whitepapers, and milestones. The client will rely on the ISSO to translate security concepts, enabling them to make informed decisions to secure their mission-critical systems. This position requires presence in a professional office setting in Springfield, VA, Monday through Friday. Responsibilities The candidate's responsibilities include, but are not limited to: Implement and More ❯
Information Systems Security Engineer (ISSE) (Ref ) Arlington, VA US Citizenship is Required. Ability to qualify for a US Department of Defense security clearance required. Candidate must be SAP and SCI program eligible. This position is in-person. Toyon Research Corporation is seeking a skilled Information System Security Engineer to join our IT team and work … closely with the ISSM and security officers. The successful candidate will be responsible for protecting our organization's information systems from cyber threats, ensuring the integrity, confidentiality, and availability of data. This role involves designing, implementing, and maintaining security protocols, systems, and measures to prevent, detect, and respond to security incidents. Responsibilities require active communication and … planning among various members of the IT, program management, and security teams. A highly qualified candidate will provide attention to details and the initiative to proactively ensure duties are done in a timely manner. Duties: Security Controls Implementation: Proven experience implementing security controls from NIST 800-53, including risk assessment, security categorization, selection of securityMore ❯
Responsibilities: Lead and execute Security Assessment and Authorization (SA&A) activities for assigned systems, ensuring full compliance with Risk Management Framework (RMF) and Security & Privacy Assessment & Authorization (SPAA) Handbook guidance. Prepare, update, and maintain security authorization packages for Authorization to Operate (ATO) and Authorization to Test (ATT), including System Security Plans, Configuration Management Plans, Incident Response … Plans, Information System Contingency Plans, system narratives, architecture diagrams, and associated memoranda. Manage all required system artifacts and documentation, ensuring all deliverables are accurate, timely, and conform to DOJ-approved templates, with meticulous attention to detail (including formatting, grammar, and compliance). Conduct and document annual core controls assessments, periodic vulnerability and compliance scans, audit log reviews, Security … Action and Milestones (POA&M) development, tracking, and reporting; ensure weaknesses, vulnerabilities, and mitigation milestones are promptly documented, managed, and independently closed per DOJ policy. Maintain and update system security documentation and records (e.g., ATO, ATT, ISCP, IRP, CMP, POA&M, BIA, IPA, PIA, RIMcert) in the Joint Cybersecurity Assessment Management (JCAM) system as operational events require. Ensure ongoing More ❯
Responsibilities & Qualifications RESPONSIBILITIES Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses. Ensures the rigorous application of cybersecurity policies, principles, and practices in the delivery of … all Information Technology (IT) and cybersecurity services. Develops and designs security solutions to maintain confidentiality, integrity, and availability of information throughout the enterprise. Identifies, plans, and documents improvements to security controls. Develops and documents recommendations and courses of action (COAs) to solve complex cybersecurity problems. Develops and interprets cybersecurity requirements and assists in the formulation of … cybersecurity/IT budgets. Plans and schedules the installation of new or modified security hardware, operating systems, and software applications. Ensures the assessment and implementation of identified computer and network environment fixes as part of the Cybersecurity Vulnerability Management program. Guides the implementation of appropriate operational structures and processes to ensure an effective cybersecurity program. Maintaining the appropriate operational More ❯
Job Number: R Zero Trust Information Systems Security Architect The Opportunity: Everyone knows security needs to be "baked in" to a system architecture, but you know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your cyber engineering and architecture skills to … We're looking for an architect who can create secure solutions for the DoD that will withstand even the most advanced cyber threats. As a Zero T rus t Information Systems Security Architect at Booz Allen, you'll help the client design and integrate Zero T rus t ( ZT ) Architecture secure solutions to support mission-critical operations. You … and go where the industry is going. You'll guide the team through a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs. This is a chance to work with clients and our ZT team to make a difference in the security of warfighter operations. You will align More ❯
Gemini Industries Inc. provides technical, management and operations services to support National Security projects. We provide rapid response to the critical needs of our customers and those they serve. We perform analyses and develop operations plans to anticipate and prepare for the future. And we deliver advanced technology to improve our customer's success in executing its mission. Gemini … brightest personnel • Work at a high operations tempo • Integrated teams delivering rapid solutions. • An attitude that balances "I can make it better" with "As long as we succeed." Senior Information Systems Security Officer Location: Arlington, VA (Pentagon) On site Clearance: TS/SCI Education: MA/MS (or BA/BS plus an additional 4 years of related … s requirements that positively impact the client to either increase efficiency, effectiveness, or innovation. •Master position tasks within 60 days and exceed requirements within 90 days. Responsibilities: The Sr. Information Systems Security Officer (ISSO) supports cybersecurity and Information Assurance (IA) related processes for the Secretary of the Air Force - Security, Special Program Oversight, and InformationMore ❯
This position is contingent on contract award Description: The Information Systems Security Engineer shall perform or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate informationsecurity to ensure uniform application of Agency Security Policy and Enterprise Solutions. Supports the building of security architectures. Enforces the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes the security planning, assessment, risk analysis, risk management, certification More ❯
My client, an International bank, based in London, is looking for an InformationSecurity Analyst to join it's team. Three MUST for this role: 1) Three days per week in the office 2) They don't offer sponsorship 3) You must come from banking or financial services background 4) Must have at least 2/3 years … experience in your current firm About the InformationSecurity Analyst role: To assist the Branch InformationSecurity Officer in developing and maintaining the Branch ISMS, and in providing a professional responsive service to assist management in identifying and mitigating informationsecurity risks which could seriously impact the Bank. This includes the provision of expert … to ensure personal skills and knowledge of informationsecurity are appropriate for the job holder's duties and responsibilities Other j) To support the SMF24 (IT & InfoSec) k) To carry out such other duties as requested by the Head of InformationSecurity or the General Manager. QUALIFICATIONS AND EXPERIENCE Knowledge and experience of informationMore ❯
Join our Cyber Security Team as a Governance, Risk and Compliance Analyst. If you have been involved in practical aspects of GRC including ISO270001, want to work with a team of dedicated professionals and are able to understand wider business impacts of GRC on a business, please read more and apply. Location We operate a flexible, hybrid working environment … travel and dental insurance Work. Life. Smarter. Our commitment to a flexible and hybrid working culture As a GRC Analyst you will: Support the development and maintenance of our InformationSecurity Management System (ISMS) including policies, objectives, and risk assessments Assist with internal audits and help prepare for external audits to maintain compliance with ISO27001 and other standards … Help identify and assess informationsecurity risks, working closely with the Cyber Risk Manager Provide guidance to colleagues on basic security best practices and requirements Contribute to reporting on the ISMS performance and improvement plans Support continual improvement initiatives and track progress Keep up to date with key trends and changes in informationsecurity and More ❯
Winchester, Hampshire, United Kingdom Hybrid / WFH Options
Arqiva
Join our Cyber Security Team as a Governance, Risk and Compliance Analyst. If you have been involved in practical aspects of GRC including ISO270001, want to work with a team of dedicated professionals and are able to understand wider business impacts of GRC on a business, please read more and apply. Location We operate a flexible, hybrid working environment … travel and dental insurance Work. Life. Smarter. Our commitment to a flexible and hybrid working culture As a GRC Analyst you will: Support the development and maintenance of our InformationSecurity Management System (ISMS) including policies, objectives, and risk assessments Assist with internal audits and help prepare for external audits to maintain compliance with ISO27001 and other standards … Help identify and assess informationsecurity risks, working closely with the Cyber Risk Manager Provide guidance to colleagues on basic security best practices and requirements Contribute to reporting on the ISMS performance and improvement plans Support continual improvement initiatives and track progress Keep up to date with key trends and changes in informationsecurity and More ❯
Watford, Hertfordshire, United Kingdom Hybrid / WFH Options
Essential Employment
looking for a highly skilled and technically proficient Senior Cybersecurity Risk Analyst to join our team on an interim basis. This role is critical in identifying, assessing, and managing informationsecurity risks across the organization. The ideal candidate will have a strong technical background, the ability to translate threats into business risks, and experience working in fast-paced … environments. Key Responsibilities - Conduct in-depth security risk assessments across systems, applications, and infrastructure. - Identify and evaluate technical and operational risks, vulnerabilities, and control gaps. - Translate complex technical threats into clear, actionable business risks. - Maintain and update the Cybersecurity Risk Register. - Produce detailed risk assessment reports and present findings to stakeholders. - Collaborate with IT, SOC, and business units to … ensure risks are understood and mitigated. - Provide technical escalation support in the absence of a cybersecurity specialist, particularly in coordination with the Security Operations Centre (SOC). - Support compliance with relevant standards (e.g. ISO 27001, NIST, UK GDPR). - Review security aspects of tenders and conduct third-party/vendor risk assessments to ensure alignment with organisational securityMore ❯
which provides an IT infrastructure platform for the business. The team has two primary focuses: cybersecurity operations and network operations. You will be part of a global team - Network Security Operations, collaborating with colleagues across Europe, Asia and the U.S. This position will be based in our Frankfurt office. What you will do Be responsible for our security engineering platforms with particular focus on SIEM and EDR, Anti-Virus and Anti Malware solutions Leverage our security platform's automation capabilities to implement and optimise SOAR capabilities throughout our environment Research, design and deploy new security features and products In the event of a major incident, lead the technical response into cybersecurity incidents at AllianzGI, from … initial triage through containment, investigation, remediation, and follow-up; typically, your involvement will be limited to major incidents or incidents that require a deeper technical understanding of the security tools Support our threat intelligence programme, identifying regional and global threats, and respond accordingly Support the development and improvement of the global cybersecurity operations programme (including processes and procedures), reflecting More ❯
We are seeking experienced IT and Cyber Risk Management Professionals to support organizations in the financial sector, in strengthening their IT security posture. As a key part of the second line of defense, you will oversee risk management processes and provide independent validation and assurance to ensure that the first line is adhering to IT and cybersecurity standards. This … and third-party relationships. Review and validate risk assessments and treatment plans proposed by the first line, ensuring compliance with organizational and regulatory standards. Develop and manage IT and security control frameworks, ensuring alignment with internal policies, industry best practices, and regulatory requirements (e.g., ISO 27001, NIST, SOC). Support the implementation of the various aspects of DORA with … oversight of IT and cybersecurity practices within the first line of defense, especially in third-party risk management. Produce independent risk reports for senior management and governance committees, synthesizing security risks and providing recommendations for risk mitigation. Advise on risk management strategies and propose improvements to enhance the organization's security posture and overall risk maturity. Act as More ❯
West Bend, Wisconsin, United States Hybrid / WFH Options
Delta Defense
Job Category: Information Technology Requisition Number: CYBER001811 West Bend, WI 53095, USA Job Details Description Tired of feeling like your talents are underutilized? Imagine working in a role where your expertise propels a mission that truly matters. At Delta Defense, you'll be at the forefront of innovation, crafting cutting-edge cybersecurity solutions that safeguard those who protect others. … in developing and optimizing state-of-the-art cybersecurity solutions, safeguarding our organization's and customers' critical assets. In this pivotal role, you'll work hand-in-hand with security analysts, software engineers, devops engineers, and mission-aligned vendor partners. Together, you'll weave cutting-edge security into the fabric of our daily operations and risk management strategies … note that applicants must be authorized to work in the United States without the need for current or future sponsorship. Essential Duties and Responsibilities: Evaluate, design, and implement robust security systems. Shield our information assets (devices, networks, applications, data, users) from cyber threats and continuously fortify our security posture. Focus on reducing our attack surface and continuously More ❯
strengthen cyber resilience across Europe? Join us as a SOC Engineer. You will play a critical role in the day-to-day operations and continuous improvement of Nexova's Security Operations Centre. You will be responsible for maintaining and optimizing the technical infrastructure that supports threat detection, incident response, and compliance. This includes managing security tools, supporting audits … position will be based at our Cybersecurity Centre of Excellence in Transinne, a village in the Belgian municipality of Libin. Tasks and Activities The scope of work will include: Security tool management: administering and optimizing various security tools and technologies used within the SOC, such as firewalls, IDS/IPS, endpoint security solutions, and other supporting tools … for daily operations. Planning, preparing, and executing system tests; evaluating test results against specifications and requirements; and reporting test results and findings. Implementing security controls across the organization's infrastructure, ensuring compliance with internal and external security standards (e.g. ISO27001, NIS2). Participating in internal and external security audits, assisting in preparing the environment for inspection and More ❯
advocate for necessary product enhancements. Mentor and support junior pre-sales engineers in technical methodologies and best practices. Assist in responding to Requests for Proposals (RFPs) and Requests for Information (RFIs) with technical documentation and specifications. Participate in trade shows, webinars, and customer events to promote our solutions and expand our presence in the market. Build strong relationships with … customers, acting as a trusted advisor throughout the sales cycle. Deep understanding all our technical capabilities across the sales cycle, including but not limited to, informationsecurity The knowledge and skill to answer technical queries for customers across the Sales Cycle, including informationsecurity, risk, architecture, and platform performance. Individuals will have access to our content … sales methodologies. Strong analytical and problem-solving capabilities. Willingness to travel as needed for client meetings, events, and training sessions. Preferred Qualifications: Bachelor's degree in Engineering, Computer Science, Information Technology, or a related field preferred; Master's degree a plus Relevant certifications (e.g., AWS Certified Solutions Architect, Microsoft Certified: Azure Solutions Architect, etc.) are a plus. Familiarity with More ❯
will be leading and managing a diverse suite of service technologies such as Computer Aided Facilities Management (CAFM), Finance and Workflow management systems and the associated data ensuring the information can be transformed into tactical actions and decisions. You will provide leadership and management support to CMMS lead and IT manager to ensure BGIS data and system governances are … of the operational steering committee whereby you are empowered to contribute and drive efficiencies and excellence in your department. You will act as the custodian around international standard for informationsecurity management systems (ISMS) framework. You will be eligible for Insurance, Health and wellbeing, professional support and diversity programmes. Purpose of Job Head of Technology and Data will More ❯
applications. Role Overview This is a new role for nest and will report to the Senior IT Service Operations Manager. Nest operates a three lines of defence approach to informationsecurity with the second and third lines delivered by an internal informationsecurity team and external auditors respectively. This role covers the first line of defence … of which a large part is outsourced. Currently, management of the 3rd party contract provisions related to security, together with various internal control responsibilities, are covered by other team members who do not have this as a specialism. This … role will assume those responsibilities, bringing more specialist experience and knowledge. You will help develop and improve our informationsecurity controls as we seek to enhance our infosec maturity using the NIST framework as an externally assessed benchmark. This first line role combines contract management with hands-on process operation for internally managed controls such as access reviews More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
NEST Corporation
This is a new role for nest and will report to the Senior IT Service Operations Manager.Nest operates a three lines of defence approach to informationsecurity with the second and third lines delivered by an internal informationsecurity team and external auditors respectively. This role covers the first line of defence, of which a large … part is outsourced.Currently management of the 3rd party contract provisions related to security, together with various internal control responsibilities are covered by other members of the team for whom this is not a specialism. This role will … take on those responsibilities, bringing more specialist experience and knowledge. You will help to develop and improve our informationsecurity controls as we seek to improve our infosec maturity using the NIST framework as an externally assessed benchmark.This first line role combines a contract management aspect with the requirement for hands-on process operation for internally managed controls More ❯
Farnborough, Hampshire, South East, United Kingdom
Gama Group Limited
Position: InformationSecurity & Compliance Manager Location: Farnborough HQ Working Hours: Full-Time, 40 Hours per week We are looking for a hands-on InformationSecurity & Compliance Manager to take ownership of cyber security and data privacy across myairops. This role balances strategic oversight with practical, day-to-day security operations. Youll be central to … changes and enhancements. We are looking for a self-motivated individual with excellent communication and teamwork abilities, as you will collaborate extensively with cross-functional teams to achieve our security objectives. Your strong attention to detail, process-oriented mindset, and ability to meet deadlines with minimal supervision will be key to your success in this role. About us: Were … Collaborate with the Group CIO and DPO, contributing to wider organisational security and data privacy initiatives. Skills, Qualifications and Experience required: Essential A solid background in cyber or informationsecurity, with experience operating at a similar level in cloud environments (ideally Azure) OR possess a degree within cyber or informationsecurity with the ability to demonstrate the attitude More ❯
Are you currently working for an IT provider but ready to step into the world of dedicated Cyber Security? We have an exciting opportunity for an InformationSecurity Consultant looking to elevate their career. We're looking for someone with hands-on experience in ISO 27001 implementation and auditing, and expertise in NIST to drive our Compliance … Team's service offerings forward. Work with a innovative, industry-leading Cyber Security team Play a key role in the development of internal and client security programs Contribute to significant projects that support clients' compliance and risk management goals If you're ready to make an impact in Cyber Security, this role is for you! Responsibilities: Ensure … protection of information assets and technologies Participate in security audits like ISO27001, ISO27701, ISO20000, NIST-CSF, and IASME Governance Conduct and document internal audits for our clients Deliver security awareness training, including public speaking engagements Manage Third-Party Risk Management (TPRM) including vendor security reviews Assist the Sales Team with scoping engagements and delivering valuable services More ❯
Oxfam is a global movement of people working together to end the injustice of poverty. Are you a visionary leader with a passion for safeguarding sensitive information on a global scale? Do you have the technical expertise to develop and implement leading informationsecurity and data protection strategies that ensure compliance and security? Can you inspire … teams to prioritise informationsecurity in an ever-evolving digital landscape? The Role: Oxfam GB is seeking a Head of InformationSecurity and Data Protection to lead the Cybersecurity, Data Protection, and Information Governance teams. This role involves managing risks across these areas, ensuring compliance with relevant regulations and control frameworks, and coordinating informationsecurity efforts across the wider Oxfam confederation to protect its reputation and systems. Reports to: Chief Transformation Officer Direct reports: InformationSecurity Manager, Data Protection Manager, Data Protection Officer, Information Governance Lead What we are looking for: We seek a candidate who is committed to Oxfam's mission to end poverty and aligns with our More ❯
InformationSecurity and Assurance Advisor Leek Wootton Permanent opportunity JOB PURPOSE: To provide expert guidance and specialist advice on all aspects of information assurance, security, and risk management. The role ensures the development and implementation of relevant policies, procedures, and processes necessary for compliance with national standards and codes of connection for information systems. This … role includes maintaining the InformationSecurity Incident Register, coordinating investigations into reported incidents, and recommending corrective measures to prevent recurrence. The postholder will also undertake onsite audits of facilities and assessments of third-party suppliers to ensure compliance with expected security and assurance standards. Additionally, the role supports departments with completing Data Protection Impact Assessments and offers … professional advice on information assurance and security-related matters. MAIN RESPONSIBILITIES: Support the InformationSecurity and Assurance programme to ensure assurance and compliance processes meet national standards and reporting requirements (e.g. SyAP). Develop, review, and implement policies and best practices for managing information and cyber security, in alignment with organisational needs. Establish and More ❯