East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Informationsecurity is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering … support of the Board. Led by our new CISO, the in-house InformationSecurity team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to … you will do The Identity and Access Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining the identity and access management (IAM) security of the firms assets. This role is critical in translating the organisations IAM vision into a workable, mature and optimized function and service. This role requires extensive experience across More ❯
will be working in a small team managing the day-to-day technology infrastructure to ensure that the Bank can operate efficiently. Cybersecurity Strategy and Planning Evaluate and proritize security initiatives for the branch in London in collaboration with GT (Group Technology) - Group IT Security. Stay up-to-date with the latest cybersecurity threats and trends and escalate risks … . Evaluate GT s compliance with relevant regulatory standards (eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusion detection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses to security incidents and … breaches Raise awareness of cybersecurity issues among bank London employees; conduct annual training/workshops to educate staff on security best practices aligned with GT. Other Duties Maintain professional and technical knowledge (Conduct Rule 2) e.g. by attending educational workshops; read professional publications; benchmarking state-of-the-art practices etc where relevant. Collaborate with stakeholders to handle backlogs and More ❯
of the brightest and nicest people around - check out our Glassdoor reviews. If this sounds like your cup of tea, we would love to hear from you! For more information check out our blog to see if you would like to help us prevent crime and protect the world's biggest online businesses. The Role Our data is a … to our success and of great importance to our clients, our partners and to our team. This is why we are currently looking for someone to help evolve the security function. As the InformationSecurity Manager in the team, you will be working with our Security engineers as well as other teams and stakeholders to drive … improvements to our security program and ensure a pragmatic approach to security and risk. Responsibilities Develop, implement, and maintain the organization's informationsecurity policies, standards, and procedures in alignment with business objectives, while considering operational needs. Direct the management and continuous improvement of the InformationSecurity Management System (ISMS). Oversee and manage More ❯
As a Senior Control Assurance Assessor, you'll test security controls both on-premise and in the cloud to ensure design implementation, safeguarding Experian's assets. You'll assess control design, performance, and compliance with standards and regulations, reporting to the InformationSecurity Control Assurance Testing Manager. Identifying gaps, documenting findings, and recommending improvements to mitigate risks … are important responsibilities. Using data-driven testing techniques and a defined methodology, you'll collaborate to ensure controls meet current risks and regulatory requirements. Primary Responsibilities Conduct security control assessments, using documented control activities (where they exist) and regulatory requirements. Develop test plans, test cases, and procedures, applying data from security tools to capture evidence. Use queries and … Contribute lessons learned by integrating partner feedback to improve the control testing program. About Experian About us, but we'll be brief Experian is the world's leading global information services company, unlocking the power of data to create more opportunities for consumers, businesses, and society. Experian is a global data and technology company, powering opportunities for people and More ❯
ManTech seeks a motivated, career and customer-oriented Security Operations Center Analyst to join our team in the DC, Maryland, and Virginia (DMV) area. The successful candidate will provide cyber threat analysis and reporting to support SOC and NOSC situational awareness. In this role you will actively monitor security threats and risks, track investigation results and report on … findings. You will monitor security tools to review and analyze pre-defined events indicative of incidents and provides first tier response to security incidents; monitors network traffic for security events and performs triage analysis to identify security incidents; responds to computer security incidents. Responsibilities include, but are not limited to: Provide 24/7 support … exploits that could impact networks and assets. Monitor network traffic and system logs for signs of cyber threats and suspicious activity. Perform the role of Incident Coordinator for IT Security events requiring focused response, containment, investigation, and remediation. Perform real-time proactive event investigation on various security enforcement systems, such as SIEM, Anti-virus, Internet content filtering/ More ❯
Come make your mark with Watermark! FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business. SUBJECT MATTER EXPERTS specializing in security and risk management. We're intimately familiar with DOD security programs and mission requirements. OUR CORE VALUES drive every action we take as a company. We strive to … well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Security Operations Center (SOC) Analyst II SOC Analyst's primary function is to provide comprehensive Computer Network Defense and Response support through 24 7 365 monitoring and analysis of potential … threat activity targeting the enterprise. This position will conduct security event monitoring, advanced analytics and response activities in support of the government's mission. This position requires a solid understanding of cyber threats and informationsecurity in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, this candidate must be familiar with intrusion detection systems More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Softek International Inc
HSEN - TA2 -13 HSEN Senior Technical Security Engineer 23-10-20 HSEN Senior Technical Security Engineer Position Summary Softek International is seeking a Senior Technical Security Engineer to support the DHS Enterprise Engineering Division within the Office of the Chief Information Officer (OCIO) is responsible for the architecture, design, engineering, Tier 3 operations support, maintenance, and … management of the network and security infrastructure. This program portfolio includes management and oversight of the technical infrastructure and security tools, sensors, servers, and data storage devices to support the DHS Network Operations Security Center (NOSC) Cyber (SOC) and other DHS stakeholders and Components. This role needs to provide strategic and tactical direction to a high functioning … team of network and security engineers, data center specialists, and DHS stakeholder groups. Candidates must be able to convey • Experience and Ability to provide leadership and hands up support to team of ENGs. • Experience and Ability to hold his/her own with Federal technical leadership. • MUST reside in the DC/MD/VA region. • MUST have active More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
solutions that drive mission success and operational excellence for Federal Government organizations. We are dedicated to supporting the Air Force's cyber superiority by delivering robust and resilient IT security solutions. Our mission is to enhance the Air Force's defensive cyber operations through innovative security engineering, risk management, and continuous compliance. We're looking for a Cyber … Security Compliance Specialist to join our team supporting the U.S. Air Force's Unified Platform software factory in San Antonio. In this role, you will play a pivotal role in shaping and maintaining the security posture of complex cyber systems and infrastructure. You will work closely with security engineers, system administrators, software developers, and mission owners to … TX. Candidates local to San Antonio should expect a mix of onsite and remote work as part of a hybrid schedule. In this position, you can expect to: Lead security architecture reviews, vulnerability assessments, and security risk analyses for cloud and on-prem systems. Provide technical guidance to development and infrastructure teams to ensure secure design, configuration, and More ❯
a handful of elite companies to receive the highest form of third-party validation. Summary We are seeking a Senior Cybersecurity Engineer who will be responsible for ensuring the security and integrity of IT systems within a highly technical DISA program. This role involves designing, developing, and implementing cybersecurity solutions, conducting risk assessments, and ensuring compliance with DoD security policies and best practices. Responsibilities Security Requirements Analysis: Analyze and define security requirements for multilevel security (MLS) systems, ensuring compliance with DoD cybersecurity standards. Solution Engineering & Integration: Design, develop, and integrate security solutions to meet MLS and information assurance requirements. Security Audits & Compliance: Conduct security audits, perform risk assessments, and recommend strategies … for risk mitigation. Security Documentation & SOPs: Generate system-level security documentation and support the development of System Operation Procedure (SOP) documents. IT Governance & Risk Management: Apply knowledge of IT governance requirements, encryption and decryption capabilities, and risk mitigation strategies to establish secure solutions. Threat & Vulnerability Analysis: Perform vulnerability and risk assessments across computer systems and applications throughout the More ❯
Maryland, and Virginia (DMV) area. In this role you will be responsible for analyzing complex business processes; plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming. Other responsibilities will include design, create, automate, and update metrics and dashboards in PowerBI, Grafana, etc., to provide real-time data and visualizations … regarding the health, safety, and resiliency of DHS's information enterprise. Responsibilities include, but are not limited to: Review and analyze current program operations, processes data and systems and identification of improvement opportunities Align services and processes to ITIL4 and the NIST Cyber Security Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business … processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements; create reports and dashboards to present information to stakeholders Conduct data analysis and provide recommendations based on analysis, develop and brief metrics Provide project management support to ensure that all tasks are completed on time and within budget Research industry trends, emerging technologies, and More ❯
Senior Tenable Nessus Administrator Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: CACI is looking for a Senior Tenable Administrator to support our DoD customer to implement an enterprise IT service delivery model that provides consistent … experience across the customer environment. On this program, CACI will deliver enhanced capabilities and services to implement and operate an enterprise ITSM solution, enterprise service desk, endpoint management and security solution, as well as CONUS/OCONUS field support and life cycle support for end user devices to enable the DoD customer to transition focus from IT operations to … IT staff, and other stakeholders to ensure the effective operation of ACAS solution and their integration into the organization's infrastructure. Responsibilities: You will be a Senior Tenable-Nessus Security Administrator for the Engineering Operations team for the EITaaS Enterprise solution based on Tenable-Nessus. Job duties include: Administrate and sustainment of the ACAS solution Maintain and configure Nessus More ❯
We are seeking an experienced Security Engineer to join our dynamic and growing team. The successful candidate will play a crucial role in supporting management with securing our organization's infrastructure, systems, and data against cyber threats. As a Security Engineer, you will be responsible for supporting the security team with designing, innovating, deploying, and maintaining security measures to safeguard our information assets. We operate in a highly regulated global SaaS organization that has multiple certifications such as PCI-DSS, ISO/IEC 27001, SOC2 and other standards we adhere to. In addition, we have a large, federated customer base that we strive to embed improvements for. You will collaborate with cross-functional teams to … ensure the confidentiality, integrity, and availability of our systems. This will require developing an effective working partnership with partner teams, to ensure security best practices are embedded into their processes, activities and projects This role will cover a wide array of security areas across our SaaS environments, as well as corporate domains and will require a skilled and More ❯
MCS Group is seeking a Cyber Security Third Party Risk Management Lead to join their client, a thriving and well-established organisation with headquarters in Dublin. This position is a 12 month Fixed Term Contract into permanency as is standard in the organisation. With multiple projects in the pipeline and a growing team, this is a fantastic opportunity for … be responsible for designing, implementing, and overseeing a robust third-party risk management programme. This role ensures that all external vendors, suppliers, and partners align with the organisation's security, compliance, and operational risk standards. Working closely with teams across procurement, legal, IT, the cyber team, and other business units, the TPRM Lead will assess, monitor, and mitigate third … management function, playing a key role in safeguarding the organisation against external threats. The successful candidate will be afforded public sector benefits - increased holidays, fantastic pension and unmatched job security in an organisation which truly reflects work-life balance! This is a hybrid role with with city-centre offices. The Role Enhance the third-party risk management framework that More ❯
Newmarket, Suffolk, United Kingdom Hybrid / WFH Options
Beyond Co
Reports to: Director of InformationSecurity Location: Hybrid (Newmarket) and or Remote Hours: 32 hours across a 4-day week (no salary sacrifice) Salary: £65,000 - £75,000 Product: Group Level, Wonde, Evouchers & Secure Schools Who we are and what is important to us: Beyond unifies three technology-driven brands, Wonde, Evouchers and Secure Schools. Each brand shares … the sector we operate in. We believe technology should not be complicated or overwhelming. It should do what it says - quickly, safely and efficiently. Job snapshot: As our Senior Security Engineer, your expertise and insights will ensure that effective security measures are embedded within Beyond's use of AWS and throughout the DevSecOps lifecycle. We like to empower … teams to deliver security, and this role is an enabler in the continuous achievement of this. Security is the fabric of our business and at the heart of everything we do. We're big believers in the idea that security isn't just something we tack on, it's woven into the very core of our technologies More ❯
Job Number: 59 Job Category: GovTech Job Title: SENIOR INFORMATION SYSTEM SECURITY MANAGER - VIRGINIA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: Remote Job Location: Arlington VA Salary: 250k - 300k Background Utilize expert knowledge and experience regarding risk management strategies in support of a major DoD program Collaborate between the Cyber Risk assessor …/security Control assessor and the program as well as DoD senior leadership Reporting of status and metrics for body of evidence and authorization conditions Develop and implement security policies, procedures, and guidelines to ensure compliance with applicable laws, regulations, and industry best practices Conduct risk assessments and identify potential vulnerabilities and threats to information systems Develop … and implement risk mitigation strategies and controls to minimize the impact of security incidents Collaborate with system administrators, network administrators, and other stakeholders to plan and implement security measures for information systems. This includes establishing security controls and standards for information systems including Continuous monitoring Develop and implement incident response procedures to reconstitute system operations More ❯
Seize your opportunity to make a personal impact as an Information Systems Security Officersupporting customer activities. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiator. As a ISSO, you will help ensure today is safe and tomorrow is smarter. Our work depends on an ISSO … joining our highly skilled team to be a premier provider of cyber security services to the customer. We provide consummate cyber security risk management "as a service" platform across multiple fabrics and centers. We have responsibility to ensure operational IT capabilities provide the client with necessary timeliness, accuracy and security of information demanded from all our … highly professional roles. Be the change, lead our change - join us! HOW AN ISSO WILL MAKE AN IMPACT Provide information assurance support to system(s) and program Maintain operational security posture for system(s) through customized Risk Management Framework (RMF) to ensure established security processes and procedures are followed Evaluate security solutions to ensure securityMore ❯
cost effective and intuitive software solutions. Our Space Operations Program Directorate is passionate about making America the undisputed leader in Space because we understand that ensuring our nation's security for future generations depends on it. Parsons creates game changing space solutions by teaming highly respected subject matter experts with brilliant technologists. Do you want to be part of … a team that is helping the government solve major national security challenges in the space domain? We need your help. Our Team is looking for a Information Systems Security Officer (ISSO). In this role you will get to focus on the cybersecurity aspects of system design to deal with cyber-related disruptions, minimizing misuse and malicious … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Required Skills: Utilize Joint Special Access Program Implementation Guide (JSIG)/Risk Management Framework (RMF) to achieve and maintain Authorization to Operate More ❯
FTSE 100 company that is building a people first culture and is based in one of the best cities to live in the UK? If so, read on. The InformationSecurity & Resilience Team at Unite Students are looking for an experienced, enthusiastic SecOps Engineer. We are supporting the business in all its objectives - from building new interfaces with … digital assets (and its people) but you ll get plenty of support and guidance, and your knowledge and experience will be invaluable to help shape the direction of our InfoSec capability. What You ll Be Doing Network Security: Design, implement, and manage secure network architectures. Monitor network traffic for suspicious activity and respond to security incidents. Conduct regular … network security assessments and audits to ensure compliance with security policies and standards. Vulnerability Analysis: Conduct regular vulnerability assessments and penetration testing to identify and mitigate security risks. Develop and implement strategies to address vulnerabilities. Track and report on the status of vulnerabilities and remediation efforts. Forensic Analysis: Perform forensic analysis of security incidents to determine More ❯
As a Senior Control Assurance Assessor, you'll test security controls both on-premise and in the cloud to ensure design implementation, safeguarding Experian's assets. You'll assess control design, performance, and compliance with standards and regulations, reporting to the InformationSecurity Control Assurance Testing Manager. Identifying gaps, documenting findings, and recommending improvements to mitigate risks … are important responsibilities. Using data-driven testing techniques and a defined methodology, you'll collaborate to ensure controls meet current risks and regulatory requirements. Primary Responsibilities Conduct security control assessments, using documented control activities (where they exist) and regulatory requirements. Develop test plans, test cases, and procedures, applying data from security tools to capture evidence. Use queries and … Contribute lessons learned by integrating partner feedback to improve the control testing program. About Experian About us, but we'll be brief Experian is the world's leading global information services company, unlocking the power of data to create more opportunities for consumers, businesses, and society. Experian is a global data and technology company, powering opportunities for people and More ❯
you will focus on threat detection, incident response, and continuous monitoring to protect our organization's critical assets. You will work closely with product owners and business units outside InformationSecurity to ensure that all applications, systems, and processes are secured and hardened. Role is located in Alameda County, completely on-site (no flexibility). This is a … of the cybersecurity operations team. Stay current with the latest threat landscape and emerging trends in cybersecurity to proactively identify and mitigate potential cybersecurity risks. Contribute to the overall information cybersecurity strategy. Qualifications: Bachelor's degree in a related discipline and 9+ years of related experience; or equivalent combination of education and experience. CISSP, CISM, CEH, OSCP, GIAC or … cybersecurity certification required. Extensive experience in a SOC environment, with a strong background in threat detection, incident response, and threat hunting. Proven experience in implementing and managing a SOAR (Security Orchestration, Automation, and Response) platform. Experience with threat intelligence platforms and integrating threat intelligence feeds to cybersecurity tools to enrich threat detection. Experience in proactive threat hunting to identify More ❯
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
holder. Duties may be changed, after discussion, to suit the operational requirements of Olympus Tech. KNOWLEDGE, SKILLS AND EXPERIENCE Technical Educated to Degree Level, or equivalent, in Computer Science, Information Technology or related discipline. Proven experience in software support and technical/business/data analysis. Able to communicate effectively and clearly in writing and verbally, including drafting correspondence … PHP, etc). The ability to work with large datasets across multiple platforms with confidence. A systematic and analytical approach to problem solving with the ability to communicate technical information to both technical and non-technical audiences. Excellent skills with Microsoft Excel. Essential Self-motivated, with high energy and enthusiasm. Strict attention to detail. Highly intuitive and tech savvy. … data sets Experience with property management software MRI Qube, Yardi or similar. Experience with complex databases Experience in system support, monitoring & troubleshooting. Experience of working in environments with high informationsecurity standards to meet needs of ISO27001, SOC2 and GDPR etc Experience with AI and/or Machine Learning Project planning and management experience. Experience with finance systems More ❯