Planning Specialist to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will play a critical role in analyzing and improving our network, security, and cloud operations processes and systems. The successful candidate analyzes federal civilian executive branch, OMB, and DHS informationsecurity laws, regulations, and policy guidelines and provides technical … collaborate with key stakeholders to develop strategy and roadmap to comply, identifying and tracking risks and challenges for implementation Align services and processes to ITIL4 and the NIST Cyber Security Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements. … or realized compliance impacts Assist and support as necessary with project plans, timelines, and other project documents to ensure compliance Minimum Requirements: Bachelor's Degree in Management, Public Administration, InformationSecurity, Computer Science, Business Management, Data Analytics or related field 8+ years of experience in project management, data analytics, and financial modeling Proficiency with Microsoft Office Suite, i.e. More ❯
A UK Government Security Check (SC) clearance is required for this role. If you don't hold SC clearance, we will support you to apply assuming you have lived and worked in the UK for a minimum of 5 years. Due to the nature of the project it is also required you hold a British Citizenship or Dual Citizenship. … As an Aker Lead Security Architect, you will be a recognised subject matter expert in security, risk management and compliance with demonstrable experience in highly regulated industries, specifically UK Government and/or Defence. You will build effective working relationships with delivery team members and Aker customers and operate without supervision as a security lead across multiple … projects and platforms, with extensive latitude for independent judgment to drive the required outcomes for Aker and its customers. You will: Lead client-specific security and assurance of highly complex, cloud-centric data and digital services across entire lifecycle (strategy, design, implementation and operations) Provide specialist advice and knowledge of HMG government security architecture and assurance to OFFICIAL More ❯
The System Administrator will perform routine and complex system administration, network administration, security administration, and technical support tasks in addition to related database administration tasks for the U.S. Naval Research Laboratory (NRL). System Administration: Install, update, and troubleshoot systems/servers. Conduct functional and connectivity testing to ensure continuing operability. Develop and document systems administration standard operating procedures. … Comply with organization systems administration standard operating procedures. Implement and enforce local network usage policies and procedures. Maintain baseline system security according to organizational policies. Manage accounts, network rights, and access to systems and equipment. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Monitor and maintain system/server configuration. Perform repairs on faulty system … maintain network infrastructure device operating system software (e.g., IOS, firmware). Install or replace network hubs, routers, and switches. Monitor network capacity and performance. Patch network vulnerabilities to ensure information is safeguarded against outside parties. Test and maintain network infrastructure including software and hardware devices. Implement new system design procedures, test procedures, and quality standards. Integrate new systems into More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal InformationSecurity Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application … pace deadline driven environment Familiarity with Amazon Web Services (AWS) Familiarity with customer's IA processes Experience with ServiceNow and Splunk Experience supporting IC or DoD in the Cyber Security Domain Familiarity with the RMF process Experience with Relational Database Management System (RDMS) Experience with Apache Hadoop and the Hadoop Distributed File System Experience with Amazon Elastic MapReduce (EMR … and SageMaker Experience with Machine Learning or Artificial Intelligence Travel Security Clearance Top Secret/SCI/CI Poly More ❯
our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. The Leidos National Security Sector (NSS) combines technology-enabled services and mission software capabilities in the areas of cyber, logistics, security operations, and decision analytics to support our defense and intel customers … mission to defend against evolving threats around the world. Your greatest work is ahead! The Multi-domain Solutions Division (MDS) within the Leidos National Security Sector is seeking a skilled Splunk Engineer to join a new cyber security program and play a key role in supporting government-critical systems. You will be part of a program that oversees … development, integration, delivery, and operations and maintenance of IT managed security services, which encompasses support to monitor the cybersecurity threat and security posture situational awareness for the enterprise. This opportunity is in anticipation of a future contract award! What you'll be doing: Support a high-impact federal cybersecurity program focused on protecting critical government infrastructure. Design, implement More ❯
Operations Manager helps design, test, and implement secure operating systems, networks, and database products; conducts risk assessment and provides recommendations for application design; participates in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access; uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research … and may prepare security reports to regulatory agencies The program provides enterprise IT services for USACE, including program management, IT infrastructure and shared services, general IT, cybersecurity services, engineering design, telecommunications services, emergency response, transformation, and surge/special projects capability and support. This position is located on-site at the Government Accountability Office (GAO) Building in Washington, D.C. … of IA and accreditation processes, securing IT systems and services using Government and industry IA standards, policies, guidelines, and best practices. Five years of experience managing and leading a security operations staff with skills applicable to a project environment similar in size and scope (a minimum of 10 full time equivalent personnel, staffing at multiple locations) Five years of More ❯
firm that provides support to Federal Government clients. We provide consulting services in the areas of Strategy, Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology. Responsibilities and Duties OCT currently has an opening for an IT Analyst IV (Senior) to work with our federal client. The IT Analyst IV will provide dedicated support … with DHS and CISA to ensure proactive approach to managing HVA requirements Requirements: Qualifications/Requirements Must be a U.S. Citizen Minimum 5 years of experience working with NIST security controls and information assurance Minimum 2 years of experience directly supporting Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA) and HVA PMO 4+ … Risk Management Framework (RMF) process Experience in development of Federal and Agency level HVA Program documentation, including guidance and outreach communications Security+ certification or equivalent cybersecurity certification Understanding of information assurance, cybersecurity, and privacy policies disciplines and methodologies Knowledge of Federal InformationSecurity Modernization Act 2014 (FISMA) Understanding of NIST Risk Management Framework (RMF) Understanding of NIST More ❯
Vice President, Security Governance, Risk and Assurance About CLS: CLS is the trusted party at the centre of the global FX ecosystem. Utilized by thousands of counterparties, CLS makes FX safer, smoother and more cost effective. Trillions of dollars' worth of currency flows through our systems each day. Created by the market for the market, our unrivalled global settlement … underpin everything that we do at CLS and define and shape a supportive and inclusive working environment in which everyone is encouraged to be open and forward-thinking. Job information: Functional title - VP, IT Security Risk Department - Security Governance and Risk Management Corporate level - Vice President Report to - Director of Security Location - London, onsite 2 days … per week About the role The individual will be part of the security function that is responsible for security governance, risk and assurance, to ensure the organisations security posture is robust, compliant against the security policy, standards and controls. The position will require close collaboration with technical, operational, compliance and audit teams to create a secure More ❯
Job Description Ready for What's Next? Kratos has SkillBridge opportunities for System Administrators and InformationSecurity System Officers Learn the skills to take your career to the next level. At Kratos, we encourage an entrepreneurial spirit balanced with discipline. We work hard, and take care of our customers, employees, and families. Recognized as thought leaders in our … to our nation and global customers. Kratos has an exciting opportunity for a System Administrator to support system and infrastructure engineers, cloud engineers, and developers in the execution of information assurance and security. The System Administrator will be assisting with the compliance of classified government contracts and systems. Will be responsible for the security administration, patching, configuration, and … security of classified government systems. Reports to the Information Systems Security Manager, and perform all tasks assigned to them. The System Administrator will also support vulnerability and risk assessment analyses to gain and maintain Assessment & Authorization and maintain configuration management for information system security software, hardware, and firmware. This position is based on multiple DoD More ❯
Management Analyst to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will play a critical role in analyzing and improving our network, security, and cloud operations processes and systems. The successful candidate will collaborate with cross-functional teams, gather requirements, conduct analysis, and utilize data and analytics to drive effective decision-making … are not limited to: Review and analyze current program operations, processes data and systems and identification of improvement opportunities Align services and processes to ITIL4 and the NIST Cyber Security Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements. … Collaborate with network engineers, security specialists, and cloud operations teams to ensure alignment between business objectives and technical implementation. Conduct data analysis and provide recommendations based on analysis; create financial models and perform data analytics to assess current business activities. Monitor and analyze network and cloud performance metrics, provide recommendations for optimization, and propose enhancements for improved efficiency and More ❯
and warfighter readiness. Visit for more details. Responsibilities Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal InformationSecurity Management Act (FISMA … Management, and Cyber Defense support. Position Description: The Cross Domain Systems Engineer will support the design, integration, accreditation, and sustainment of Cross Domain Solutions (CDS) used to securely transfer information between networks of differing classification levels within Department of Defense (DoD) and Intelligence Community (IC) environments. Daily Tasks include, but are not limited to: Lead and manage the delivery … in DoD or IC environments Experience leading projects or diverse teams in a DoD or government contracting environment Understanding of network architectures, TCP/IP, firewalls, data guards, and security protocols Demonstrated analytical skills, communications skills (verbal and non-verbal) and ability to interface with both technical and non-technical, internal and external stakeholders Demonstrated knowledge and experience in More ❯
Are you ready for a rewarding and inspiring career? Leidos is a FORTUNE 500 company bringing a mix of innovative technology and sector expertise to customers in the national security, engineering, and the health industries. At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers' success. We empower … developing technical solutions to answer hard challenges, ensuring mission and customer success. Provide subject matter expertise in the field of Cryptographic Modernization with focus on ensuring cryptographic systems meet security, compliance, and performance standards to support enduring mission on Aberdeen Proving Grounds Contribute to customer strategic vision by identifying future technological trends and gaps and assist in defining priorities … Learning (ML), Data Analytics, Autonomous Systems, and Cybersecurity Lead continual assessment of command cryptographic systems for vulnerabilities, inefficiencies, or obsolescence Guide gap analysis between current cryptographic capabilities and modern security requirements to ensure alignment with Department of Defense (DoD) and Industry standards Develop and implement strategic roadmap for modernizing cryptographic infrastructure Recommend and oversee transition from legacy to modern More ❯
Project Manager Who is Epsilon: Epsilon is an IT Services company that was founded in 2009 and has become an established leader in providing Information Technology services to both Federal Government and Commercial businesses across the United States. Epsilon is known for its solution-focused and innovative approach, aligning technology systems, tools, and processes with the missions and objectives … reflecting Epsilon's commitment to fair and competitive compensation. Where you'll work: You will be working onsite at SOC's Monterey, CA location. Our Customer's Mission: The Security Operations Center (SOC) is responsible for the overall security of enterprise-wide information systems and networks. The SOC's objectives are to protect, detect, respond, and recover … from informationsecurity (IS) threats to the enterprise and associated systems. The SOC is chartered to prevent, detect, contain, and eradicate cyber threats through monitoring, intrusion detection, and protective security services to information systems. The SOC also conducts vulnerability assessments, analyzes cyber threats, monitors the email gateway, and collects information on and investigates and reports More ❯
the military in months, not years. ABOUT THE TEAM ABOUT THE JOB Anduril's Insider Threat team is looking for a cybersecurity analyst to protect our organization from internal security threats. This analyst will be a critical part of analyzing anomalous activities, running investigations, and working across various departments to mitigate risks. This role will be a key stakeholder … within the Anduril InformationSecurity team implementing forward-leaning, innovative insider threat & counterintelligence detections and mitigations. WHAT YOU'LL DO Support Anduril as our front line responder by identifying, triaging, investigating, and remediating Insider Threat related security detections and anomalies. Lead evaluating and implementing controls to reduce Anduril's attack surface from an insider threat. Produce dashboards … and metrics to support and streamline incident response and investigations. Perform threat hunting and identify anomalies within the environment to uncover insider threat activity. Communicate technical security concerns and issues to a non-technical audience. Work along side other members of the team to build custom tooling to automate manual processes. REQUIRED QUALIFICATIONS Action-oriented analyst with the ability More ❯
with a strong emphasis on safeguarding identity access. The SecOps Manager is a key figure in the organisation's cyber defence efforts, tasked with identifying, detecting, and responding to informationsecurity threats, as well as managing the response to cybersecurity incidents. Working closely with colleagues across IT and the wider organisation, this role ensures the protection of digital … and information assets against a range of internal and external threats. The M365, Identity, and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the … team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and More ❯
with a strong emphasis on safeguarding identity access. The SecOps Manager is a key figure in the organisation's cyber defence efforts, tasked with identifying, detecting, and responding to informationsecurity threats, as well as managing the response to cybersecurity incidents. Working closely with colleagues across IT and the wider organisation, this role ensures the protection of digital … and information assets against a range of internal and external threats. The M365, Identity, and Security functions are central to this position, leading a team of specialist engineers to maintain the secure operation of services and contributing to major projects that impact identity management across the organisation. The post holder also serves as a technical authority within the … team and department. What you'll need to succeed Security Operations & Incident Response Lead security operations services, including monitoring, incident response, threat management, and intrusion detection, using both internal and external resources. Manage the outsourced 24/7 security operations service. Lead the organisation's response to security incidents, coordinating recovery efforts with internal teams and More ❯
Security Project Manager – Protocol Analysis & Remediation Location: London Company: Albany Beck (Permanent Hire) Start Date: 4 weeks About Albany Beck Albany Beck are a specialist consultancy providing transformation, technology, and operational solutions to clients in the financial services and public sectors. We are seeking a seasoned Project Manager to lead a critical infrastructure security initiative for one of … overseeing the full lifecycle of the Protocol Analysis & Remediation project, from planning through execution to completion. This includes managing scope, timelines, budgets, risks, and stakeholder communication, ensuring alignment with security and business objectives. Key Responsibilities Lead the planning, execution, monitoring, and closure of the project in accordance with agreed objectives. Develop and maintain project plans, timelines, budgets, and resourcing … models. Coordinate cross-functional teams including security, IT infrastructure, and third-party vendors. Proactively identify project risks and issues, implementing mitigation strategies. Communicate project status, progress, and key challenges to internal stakeholders and senior leadership. Ensure all project deliverables align with quality standards and security compliance requirements. Facilitate project meetings and decision-making forums, driving accountability and transparency. More ❯
Security Project Manager – Protocol Analysis & Remediation Location: London Company: Albany Beck (Permanent Hire) Start Date: 4 weeks About Albany Beck Albany Beck are a specialist consultancy providing transformation, technology, and operational solutions to clients in the financial services and public sectors. We are seeking a seasoned Project Manager to lead a critical infrastructure security initiative for one of … overseeing the full lifecycle of the Protocol Analysis & Remediation project, from planning through execution to completion. This includes managing scope, timelines, budgets, risks, and stakeholder communication, ensuring alignment with security and business objectives. Key Responsibilities Lead the planning, execution, monitoring, and closure of the project in accordance with agreed objectives. Develop and maintain project plans, timelines, budgets, and resourcing … models. Coordinate cross-functional teams including security, IT infrastructure, and third-party vendors. Proactively identify project risks and issues, implementing mitigation strategies. Communicate project status, progress, and key challenges to internal stakeholders and senior leadership. Ensure all project deliverables align with quality standards and security compliance requirements. Facilitate project meetings and decision-making forums, driving accountability and transparency. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ikhoi Recruitment
A fantastic award winning MSP is looking for a talented Senior Cyber Security Engineer to come and join their team. This is a fantastic opportunity for someone who wants to work for one of the best MSP and voted the best work place. The role is 3 days in the office and 2 days WFH. Excellent Benefits After … to Work scheme, quarterly team nights out/events, monthly games night with pizzas and breakfast on Wednesdays Job Description This great MSP is looking for a Senior Cyber Security Engineer to join their expanding UK based Cyber Security Projects team. The ideal candidate would be someone that is already in a similar role and has minimum of …/2-year experience. As a Senior Cyber Security Engineer, you will be primarily responsible for deploying Security Technology Solutions for our clients together with assisting our Chief InformationSecurity Officer with Cyber Essentials and Cyber Essentials Plus Audits and Assessment. You will be reporting to the Project Management Office Team on a Daily Basis and More ❯
activities may change at any time with or without notice. Desired/Required Skills: • Bachelor of Science or Bachelor of Arts degree required. • Active Department of Defense Secret level security clearance is required. • DoD Approved 8570/8140 IAM Level III Certification: Certified Information Systems Security Professional (CISSP) OR Certified InformationSecurity Manager (CISM) OR … Certified Chief InformationSecurity Officer (C-CISO) OR GIAC Security Leadership (GSLC). • Must have Project Management certification (i.e., Project Management Professional (PMP) Certification, other equivalent nationally recognized certification.) • Ten (10) years of project management or other relevant experience with progressively higher responsibility in the public and/or private sector in the IT and/or … the US are encouraged to apply. In order to be qualified for this position, you must be able to obtain and maintain a United States Department of Defense (DoD) security clearance. We are unable to sponsor Visas at this time. NexGen Data Systems provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race More ❯
In-depth knowledge of federal cybersecurity policies and terminology, including: U.S. Presidential Executive Orders Federal statutes OMB Memoranda and Circulars DHS Directives and Insider Threat programs Certifications (required): Certified Information Systems Security Professional (CISSP) or Certified InformationSecurity Manager (CISM Preferred Qualifications: Experience working with federal agencies or in a government contracting environment. Familiarity with Agile … that does not now and/or will not in the future require sponsorship of a visa for employment authorization in the US by Capgemini. Capgemini discloses salary range information in compliance with state and local pay transparency obligations. The disclosed range represents the lowest to highest salary we, in good faith, believe we would pay for this role More ❯
Overview Rapiscan Systems is a global leader in detection technology, delivering advanced cargo and vehicle inspection systems for ports, borders, military installations, high-security facilities, and checkpoints. Our solutions help combat terrorism, drug trafficking, illegal immigration, and trade fraud. We offer a wide range of scanning configurations using low-, medium-, and high-energy X-ray technologies-often in combination … to meet diverse security needs. Our commitment to innovation, imaging excellence, and quality ensures our systems consistently deliver superior performance, reliability, and user satisfaction Role Overview Weare seeking a skilled Cyber Security Manager to lead the operations of our cyber security testing lab and oversee the development of product security documentation. This role works closely with … the Cargo Engineering Software Team to manage cyber risks across our Cargo X-ray software suite and is integrated into the broader OSI Systems corporate cyber security team. Responsibilities Cyber Security Design Ownership Define and maintain cyber security design requirements and documentation within a standardized security framework. Risk Management Identify, analyze, and report on securityMore ❯
client engineering team in developing and maintaining the foundation of our client platforms, including Windows, Mac, and mobile clients. You will collaborate with cross-functional teams including Enterprise Engineering, InformationSecurity, and Customer Experience teams and serve as the focal point for delivering end-user capabilities that enhance and support the business. The ideal candidate is an experienced … but not limited to the roll out of new enhancements, major system upgrades, consolidation of endpoint tool stack as well as 'end of life' transitions Oversee the implementation of security measures to protect end user devices and data, including encryption, access controls, and antivirus solutions Provide direct technical guidance and support to the team and other departments Establish and … negotiate contracts, and drive value-added partnerships to support our technology initiatives What You Need to be Successful - Applications Administrator Manager Minimum Requirements: Bachelor's degree in Computer Science, Information Technology, or related field, or equivalent work experience Proven experience (5+ years) in managing teams responsible for Microsoft 365, Unified Communications, Collaboration Services, and End User Compute Engineering Strong More ❯
harms from privacy and cybersecurity incidents through communication, escalation, and collaboration with stakeholders. Review technology proposals involving privacy, cyber, and AI risks; provide pragmatic, creative solutions incorporating privacy and security by design. Demonstrate decision-making and communication skills during time-sensitive incidents or high-risk proposals requiring escalation. Manage multiple projects effectively, ensuring high-value and high-risk needs … mitigation strategies. Strong soft skills for incident management and risk escalation, projecting calm and confidence. Collaborative experience with compliance teams, advising on priorities and operational targets. Privacy, AI, or informationsecurity certifications (e.g., CIPP, CIPM, AIGP, CIPT, CISSP) preferred. Excellent negotiation, prioritization, multitasking, and client management skills, with ability to build strong relationships. Fluency in English required; additional … agreements. Affiliated Companies Alliance Healthcare Management Services Limited Equal Employment Opportunity Cencora is committed to equal opportunity employment regardless of race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, veteran status, or other protected classes. Harassment is prohibited, and all employment practices comply with non-discrimination principles. We provide reasonable accommodations for individuals with More ❯
Position Summary As a Security Consultant, you will be responsible for delivering customer projects across a range of GRC services in line with your current capabilities, and future capabilities after suitable training/mentoring. You will be responsible for providing professional service delivery including but not limited to; consultancy services and audit/assessment services against multiple security … Practice function. Role Mission Claranet UK’s strategy is to build long-term, trusted relationships with its customers by delivering market-leading, integrated managed services. We are seeking a security consultant to deliver high-quality security services to meet the needs of our customers and to contribute to the continued development of our market-leading portfolio designed to … meet the growing and diverse needs of our customers. Objectives and Key Results The Security Consultant is part of the Cyber Practice. The key objectives and results will be to:• Successful delivery of customer GRC projects across the range of the Cyber Practice GRC services, in line with both employee capabilities and business needs• Pursue customer satisfaction by delivering More ❯