to servers, storage management, databases, virtualization, voice services, recovery management, and threat management Provide leadership in development, testing and support of the institutional risk management program for business continuity, security, and disaster recovery Apply DevOps principles and automation to the Corporate IT infrastructure to the extent possible to managed operating systems and software via automated means Design, propose, and … and systems that are in line with modern cybersecurity hygiene and best practices; working proactively with technical and business leadership to fulfill both tactical and strategic plans for IT security Work with technical and business leadership regarding major systems and application changes to help ensure that IT security standards and issues are adequately addressed Promote informationsecurity awareness throughout the company via awareness and training Ensure security best practices are implemented and revised, as needed, to maintain the availability, integrity, and confidentiality of the information stored on and accessed through the network (firewalls, file permissions, backups, account management, scanning, etc.) Establish policies, standards, practices, and security measures to assure effective and consistent access More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
Cyber Security Specialist ** Location: London/Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a Cyber Security Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you … will work independently while leveraging the support of a tight-knit team. Your primary focus will be on providing expert advice and guidance on security solutions, particularly in cloud environments, especially Azure. Key Responsibilities: Provide expert security advice and guidance on a range of projects. Act as the security SME, ensuring security considerations are integrated into … project plans and deliverables. Collaborate with project teams to identify and mitigate security risks effectively. Conduct comprehensive security assessments and reviews of systems, applications, and processes. Identify vulnerabilities and recommend appropriate security measures. Ensure compliance with security policies, standards, and regulations, contributing to the ongoing maturity of organisational security. Promote security awareness across the organisation. More ❯
Bury St Edmunds, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Cyber Security Consultant Role: We are looking for a proactive and client-focused Cyber Security Consultant to join our growing cybersecurity team. Based on a hybrid working model from our Bury St Edmunds office, this role offers the opportunity to work closely with clients across various sectors, helping them strengthen their security posture through expert … Collaborate across delivery, project management, and sales teams to deliver outcomes. Mentor junior consultants and contribute to internal improvement initiatives. Skills/Must Have: 2+ years of hands-on InformationSecurity or IT Administration experience. Strong communication skills (written and verbal), with stakeholder management ability. Working knowledge of both offensive and defensive cybersecurity services. Familiarity with certification and … for your birthday 3% employer pension contribution Hybrid working model Cycle to Work and IT Purchase Schemes (subject to T&Cs) Salary: Competitive – dependent on experience and certifications. Additional Information: Employment Type: Permanent, Full-Time (36.25 hours/week) Location: Hybrid – Bury St Edmunds Office More ❯
Engineers located in the El Segundo, CA and Colorado Springs, CO areas Senior Cyber/Network System Engineers located in the El Segundo, CA and Colorado Springs, CO areas Information Systems Security Engineer SMEs located in the Colorado Springs, CO area Senior Network System Engineers located in the El Segundo, CA, Dayton, OH, and Colorado Springs, CO areas … Senior Networks IT Managers located in the El Segundo, CA area National Security Operations Center (NSOC)/Space Operational Center Site Engineers located in the Colorado Springs, CO area Senior Operations Engineers located in the El Segundo, CA area Program Cybersecurity SMEs located in the El Segundo, CA area Senior Software Architects located in the El Segundo, CA area … DoD Intelligence Community Subject Matter Expertise in computer networks, network protocols, and network architectures Knowledge of organization and execution of contingency planning, testing, and validation for all aspects of information system security Ability to integrate and engineer cybersecurity into mission systems Ability to develop cyber tools for use by cyber operators Experience rapidly maturing and applying technology in More ❯
Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: The opportunity: Leonardo UK is seeking a proven and experienced Principal Consultant to join the Cyber & Security Solutions Division team. This role is focused on the delivery of one of the company's core products to an existing customer. This role will lead a team that will oversee, co-ordinate and deliver all facets of cyber and … informationsecurity related to the delivery across an engineering lifecycle - from requirements all the way through to in-service support and maintenance. This is an exciting opportunity at the very beginning of a significant programme, during which you will ensure that the product and associated deliverables are as secure as reasonably practicable, and in accordance with customer's … and working on site at one of our Leonardo offices and closely with our customers. Talk to us to find out more. What you'll do as a Principal Security Consultant: Leading a team to meet all aspects of the cyber and informationsecurity delivery across an engineering lifecycle. Interpreting customer requirements into actionable security management More ❯
Planning Specialist to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will play a critical role in analyzing and improving our network, security, and cloud operations processes and systems. The successful candidate analyzes federal civilian executive branch, OMB, and DHS informationsecurity laws, regulations, and policy guidelines and provides technical … collaborate with key stakeholders to develop strategy and roadmap to comply, identifying and tracking risks and challenges for implementation Align services and processes to ITIL4 and the NIST Cyber Security Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements. … or realized compliance impacts Assist and support as necessary with project plans, timelines, and other project documents to ensure compliance Minimum Requirements: Bachelor's Degree in Management, Public Administration, InformationSecurity, Computer Science, Business Management, Data Analytics or related field 8+ years of experience in project management, data analytics, and financial modeling Proficiency with Microsoft Office Suite, i.e. More ❯
SBG Technology Solutions, a DSS, Inc. company, specializing in engineering, information technology, cyber-security, intelligence, and training, is looking for a hard-working results- oriented Cybersecurity Systems Engineer. We are seeking highly motivated individuals with a positive attitude looking to join our rapidly growing company. The ideal candidates for this position have strong attention to detail, analytical and … devices. The location for this work is San Diego, CA, and may incur minimal travel. Your essential job functions will include but may not be limited to: • Perform system security technical decomposition, analysis, and impact assessments with the focus on the vulnerability assessment of ground- and space-based cyber physical, logical and embedded systems operating in a variety of … relevant work experience (cyber offense/defense, hardware/software reverse engineering, technical cyber risk assessment). • Cybersecurity experience to include: o Assessing and testing NIST SP 800-53 security controls. o Experience working with space, aeronautical and aerospace systems, maritime systems, and/or terrestrial cyber-physical systems. o Demonstrated ability to assess and articulate risk, including to More ❯
Overview Systems Planning and Analysis, Inc. (SPA) delivers high-impact, technical solutions to complex national security issues. With more than 50 years of business expertise and consistent growth, we are known for continuous innovation for our government customers, in both the U.S. and abroad. Our exceptionally talented team is highly collaborative in spirit and practice, producing Results that Matter … Engineers located in the El Segundo, CA and Colorado Springs, CO areas Senior Cyber/Network System Engineers located in the El Segundo, CA and Colorado Springs, CO areas Information Systems Security Engineer SMEs located in the Colorado Springs, CO area Senior Network System Engineers located in the El Segundo, CA, Dayton, OH, and Colorado Springs, CO areas … Senior Networks IT Managers located in the El Segundo, CA area National Security Operations Center (NSOC)/Space Operational Center Site Engineers located in the Colorado Springs, CO area Senior Operations Engineers located in the El Segundo, CA area Program Cybersecurity SMEs located in the El Segundo, CA area Senior Software Architects located in the El Segundo, CA area More ❯
Job Title: Independent Assessor Department: Security Services Delivery - Independent Assessors Team Reports To: Principal Engineer - Independent Assessor Grade/Labor Category Level: Level II Individual Contributor Job Location: Virginia - Herndon/Chantilly/Fairfax I. Company Summary Rampant employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At Rampant … you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. Rampant is an Equal Opportunity Employer. II. Job Summary A Rampant Technologies Independent Assessor (IA) is a key resource that is a part of the Rampant … team reporting to the Principal Engineer overseeing the IA team to deliver innovative Cyber Security solutions that are in alignment with the company's goals and customer missions. The IA will be tasked to execute against Contract level programs/projects/sub-projects that are within their immediate supervising PE's contract portfolio and/or to matrixed More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Xpertise Recruitment Ltd
Cloud Security Lead London | Hybrid - 3 days in-office per week Up to £90,000 + ~20% Bonus + 10% Pension Are you passionate about cloud security and cyber risk management? A leading international business has completed a major IT transformation and is now expanding its technology team. They're looking for a highly skilled Cloud Security … shape and strengthen secure cloud architectures and practices across a complex enterprise environment. In this pivotal role, you'll be part of the CIO office, reporting into the Business InformationSecurity Officer (BISO). You'll collaborate closely with internal IT teams and group-level security functions to manage cloud-based cyber risks, coordinate remediation strategies, and … enhance executive-level reporting. Key Responsibilities: Define and enforce security best practices across cloud environments (Azure, AWS) Lead cloud security risk assessments, audits, and incident response efforts Integrate security into CI/CD pipelines and DevOps operations Manage and interpret insights from cloud-native security tools (e.g., GuardDuty, Azure Defender) Ensure compliance with frameworks such as More ❯
Risk Management Framework Coordinator - Level 2 Job Category: Security Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: The Opportunity: We are seeking a skilled and motivated individual to join our team in providing critical support for the integration of risk management activities … into the system life cycle process. This role is pivotal in supporting the government's cybersecurity mission efforts by managing and mitigating risks across information systems, including security, enclave, and organizational risks. The selected candidate will be responsible for driving the development and execution of risk mitigation plans, strategies, and progress tracking across Technical Task Orders (TTOs), ensuring … timely delivery of mission priorities. By managing risk throughout the system life cycle, the candidate will ensure that information systems are developed, maintained, and decommissioned with a robust security posture, while staying within budget and deadlines. This position offers the opportunity to directly contribute to the success of the government's cybersecurity objectives, playing an essential role in More ❯
recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. Our National Security Team supports the intelligence community, providing, operating, and assuring critical voice, video and collaboration services for the full spectrum of operations. AT&T has an opening for an NMS … Network Engineer: To support a key program in AT&T's National Security business segment and support our government customers' global enterprise networks. Network Architecture provides solutions for modernizing the network components while supporting service delivery for customer requirements in a mission-focused operational enterprise. The NMS Network Engineer will provide expert knowledge of network management systems, operating systems … maintain DNS, IPAM, Load Balancer, and Webproxy production system and solution, ensuring high services availability and resiliency. Perform lab vendor equipment, software, application, and solution evaluation, testing, integration, and security certification relevant to DNS, IPAM, Load Balancer, and Webproxy services. Support Tier-4 production troubleshooting of the services above. Develop pro-active analysis and solutions for the NMS and More ❯
to grow and transition customer specific business to the Hunstville, AL market. Support the Government's effort to obtain and maintain an authority-to- operate (ATO) and protect the security posture of the program systems and applications; Possess exceptional interpersonal and communication (verbal and written) skills; Instruct and mentor junior development team members; Provide Government personnel instruction, guidance, and … and support software applications currently hosted on-premises to be hosted within the GovCloud instance compliant with customer policy directives (PD) and guides (PG) mandated to ensure legal and informationsecurity compliance. This shall include analysis of the existing system in collaboration with other team members and Government PM, and designing an appropriate solution. Candidates shall be skilled … development, and managerial team members to troubleshoot and resolve issues. The contractor shall: Required Education, Experience, & Skills Minimum Education: Bachelor of Science (B.S.) Degree in Computer Science, Software Development, Information Systems or related field of study, or in lieu of education, six (6) additional years of relevant experience. Minimum/General Experience: Five (5) or more years of experience More ❯
of talent to create an environment that fuels innovation and fosters continuous improvement and success. At Rampant, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. Rampant is an Equal Opportunity Employer. II. Job Summary … Technologies Systems Engineer (SE) is a key resource that is a part of the Rampant team reporting to the Principal Engineer overseeing the SE team to deliver innovative Cyber Security and IT solutions that are in alignment with the company's goals and our customer's mission. • The SE will be tasked to execute against Contract level programs/… Responsibilities: • Assist PE with Customer Relationship & Account Management (relationship building and Issues escalation/remediation) • Assist with PE with Contract/Program/Project Execution & Monitoring o Critically evaluate information gathered from multiple sources; reconciling conflicts in information gathered. o Knowledge exchange with newly assigned team members o Timely delivery against Tasking - technical work as assigned, contract documentation More ❯
Job Number: R Cybersecurity Zero Trust Architect The Opportunity: Everyone knows security needs to be "baked in" to a system architecture, but you know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your cyber engineering skills to design and build secure systems for … and go where the industry is going. You'll lead the team through a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs. This is a chance to make a difference in the security of the U.S. Government. Your te chn ical expertise will be vital as you … help customers overcome their most difficult challenges by leading cybersecurity te chn ologies and domains, including IoT and Cloud security, Automation and Orchestration ( A & O ) , identify and access management, and machine learning. Join our team, as we tackle cybersecurity challenges and shape opportunities to implement solutions and service offerings leveraging investments and proven capabilities. Join us. The world can More ❯
seamless integration and minimal disruption to business operations. Design and implement strategies for migrating data from on-premises NetApp storage to M365 and OneDrive, adhering to best practices and security standards. Manage and maintain global NetApp storage solutions, including configuration, optimization, and troubleshooting. Monitor storage performance and capacity utilization, implementing proactive measures to ensure scalability and reliability. Collaborate with … Qualifications: Fourteen (14) years of experience as an SE in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. Five (5) years of additional SE experience may be substituted for a Bachelor … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DOD 8570 Certification IAT Level 2 Compliance Required (Security+ CE) This position requires an active Security Clearance with appropriate Polygraph. About us More ❯
rates, allocating resources, mentoring team members, and may support the corporate interest in several other CRCS business unit related work efforts. Responsibilities Strategic Alignment Work closely with the Chief InformationSecurity Officer (CISO) and Technical Director to align the CRCS programs delivery with the organizations broader sales, services, quality and cybersecurity strategies Regularly update the CISO and Technical … the CISO and Technical Director to help ensure that the CRCS programs support corporate line of business goals Compliance Engagement Leadership & Oversight Ensuring all assessment activities comply with the security requirements for CMMC, or other compliance frameworks and relevant guidelines Coordinating?and?leading delivery of project milestones to ensure project timelines stay on target by escalating and identifying roadblocks … management, and organization management skills to include follow-up, time management, project budget management and people management Understanding of the 7 steps within the Risk Management Framework Familiarity with InformationSecurity Principles, knowledge of IT Processes (e.g., Change Management, Incident Management, Risk Management, Network and System Administration, Monitoring) Strong technical, analytical, interpersonal, written and oral communication skills Ability More ❯
and access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading … tools and security partners, to enhance your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running … of the team, assisting Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual More ❯
Senior Counsel - Data Governance, Privacy and Cyber Security Apply locations Woking, United Kingdom time type Full time posted on Posted Yesterday job requisition id R257806 Our team members are at the heart of everything we do. At Cencora, we are united in our responsibility to create healthier futures, and every person here is essential to us being able to … stakeholders. Conduct reviews of new customer- and/or vendor- related technology proposals entailing privacy, cyber, and/or AI risks and offer pragmatic, creative solutions reflecting privacy and security by design concepts. Demonstrate strong and calm decision-making capability and communication skills in the midst of time-sensitive incidents or high-risk business proposals requiring escalation to senior … on highest priority compliance requirements, and helping to define operational targets through ongoing partnership, feedback, and clear communication skills. Possession of one or more privacy, AI, and/or informationsecurity certifications (CIPP, CIPM, AIGP, CIPT, CISSP) (preferred). Excellent negotiating, prioritization, multi-tasking, juggling, and client management and expectation-setting skills - including forging and managing strong relationships More ❯
Position Summary MAG IS OFFERING UP TO A 10k SIGN-ON BONUS FOR QUALIFIED CANDIDATES! MAG Aerospace is seeking an Information Systems Security Engineer (ISSE) to support Product Manager Information Warfare Cyber Development (PdM IWCD) and their external mission partners. The ISSE will provide system security engineering services and to support the Government to ensure core … security engineering principles are implemented into assigned programs information systems architecture. The role of the ISSE is to bridge the gap between high level security policies/requirements and technical/operational implementation of those requirements. This is a fantastic opportunity to join a fast-growing team with multiple opportunities for upward advancement supporting C&S. The … training, work experience and, preferably, applicable military experience. At least five (5) years must be specialized experience including system security analysis and implementation; design assurance or testing for INFOSEC products and systems; integration or testing for INFOSEC products and systems Certified Information Systems Security Professional (CISSP) Preferred Qualifications Experience with Twistlock and SonarQube. CISSP-ISSEP or CASP More ❯
Position Overview: We are seeking a Journeyman InformationSecurity Analyst to support cybersecurity operations and information assurance activities at Eglin AFB. The ideal candidate will play a key role in maintaining the confidentiality, integrity, and availability of mission-critical systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities: Monitor and analyze system … security logs and alerts to identify suspicious activities and potential threats. Support vulnerability assessments and risk analysis activities. Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework). Assist with security incident response, containment, investigation, and remediation efforts. Maintain and review documentation for systems accreditation and security posture. Support audits, inspections … and assessments to ensure compliance with applicable security standards. Provide input to the development of security policies and procedures. Collaborate with system administrators, engineers, and other stakeholders to resolve security issues. Required Qualifications: Active Top Secret clearance. Current CompTIA Security+ certification (IAT Level II). 2-5 years of hands-on experience in informationsecurityMore ❯
Information Systems Security Officer (ISSO) Location: Washington D.C. or Riverdale, MD or Herndon, VA Job Type: Full-time Salary: $135,000 - $180,000 Job Description: As an Information Systems Security Officer (ISSO) and Shape the Future of National Security! What You'll Do: Be the Security Advocate: Work closely with the Information Systems … Security Manager (ISSM) to drive information assurance initiatives, including security authorization activities, compliance with Risk Management Framework (RMF) policies, and the development of System Security Plans (SSPs). Strengthen Our Defense: Perform Security Technical Implementation Guide (STIG) reviews, self-assessments, and participate in Assessment & Authorization (A&A) testing to ensure our systems stay secure and … compliant. Stay Ahead of Threats: Analyze system audit logs for unusual activity, conduct vulnerability assessments, and implement mitigation strategies to protect against potential risks. Shape Security Policy: Use your expertise to apply a comprehensive range of cybersecurity policies, principles, and techniques to maintain the integrity of systems processing classified information. Drive Risk Management: Perform risk analysis for system changes More ❯
Information Systems Security Engineer L2 - ILMR - TS/SCI Poly required Annapolis Junction, MD Information Technology Apply Now The ideal candidate for this Level 2 ISSE opportunity will have the following experience: DoD 8570.01-M compliance with IASAE Level 2 is required CISSP Certification is required. • Certification that meets Information Assurance Manager (IAM) Tier 2 requirements. … Full understanding of the Risk Management Framework (RMF) process & procedures. • Experience with NIST 800-53 security control implementation and self-testing. • Experience reviewing vulnerability scans. • Strong written and oral communication skills. • Relevant ISSO, ISSM, and/or ISSE experience in the cybersecurity career field • Exposure to providing technical systems support from the perspective of a System Administration and/… or Systems Engineer • Experience supporting the Intelligence Community's specific RMF processes and procedures • Experience interpreting Security Directives, Policies, Publications and Regulations and providing guidance on how to apply to System Owners, System Administrators, and System Engineers. The Level 2 Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to More ❯
Eagle Harbor, a subsidiary of Three Saints Bay, LLC and a federal contracting leader is looking for an Information Systems Security Engineer. The Information System Security Engineer supports the Information System Security Manager (ISSM) and the National Training Center (NTC) security and management staffs with the deployment, development, operation, and maintenance of NTC … cyber security solutions and supports the NTC Information System Security Officer (ISSO) by providing technical subject matter expertise during the assessment and authorization (A&A) of NTC information systems in accordance with the Federal InformationSecurity Management Act (FISMA) and Department of Energy (DOE) requirements. The ISSE also reviews audit data for suspicious activity … to protect information and prevent unauthorized access, performs asset vulnerability and compliance audits, reviews change requests, and hardware and software requests. The ISSE responds to computer security incidents and participates in exercises as a member of the NTC Incident Response Team. The Information System Security Engineer responsibilities and duties are as follows: Description of Responsibilities: • The More ❯
Top Secret SCI w/Polygraph Required Top Secret SCI w/Polygraph Required Information System Security Officer (ISSO), Level 2 The Level 2 ISSO position is a mid-level information system security professional that provides advice and assistance to the Government regarding secure configuration and operation of IT assets. Level 2 ISSOs apply knowledge and … experience with standard information system security concepts, practices, and procedures. Please see table for education and years of experience requirements. ISSO Level 2 contractors should possess all ISSO Level 1 qualifications plus the following desired qualifications: a. Thorough understanding and application of network security principles, practices, and implementations; b. Working knowledge of cross-functional integration of information systems into a physical security environment; c. Working knowledge of system functions, security policies, technical security safeguards, and operational security measures; d. Understanding of system methodologies including but not limited to client server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, LAN, switches, and routers; e. Familiarity with detecting and preventing computer More ❯