holder. Duties may be changed, after discussion, to suit the operational requirements of Olympus Tech. KNOWLEDGE, SKILLS AND EXPERIENCE Technical Educated to Degree Level, or equivalent, in Computer Science, Information Technology or related discipline. Proven experience in software support and technical/business/data analysis. Able to communicate effectively and clearly in writing and verbally, including drafting correspondence … PHP, etc). The ability to work with large datasets across multiple platforms with confidence. A systematic and analytical approach to problem solving with the ability to communicate technical information to both technical and non-technical audiences. Excellent skills with Microsoft Excel. Essential Self-motivated, with high energy and enthusiasm. Strict attention to detail. Highly intuitive and tech savvy. … data sets Experience with property management software MRI Qube, Yardi or similar. Experience with complex databases Experience in system support, monitoring & troubleshooting. Experience of working in environments with high informationsecurity standards to meet needs of ISO27001, SOC2 and GDPR etc Experience with AI and/or Machine Learning Project planning and management experience. Experience with finance systems More ❯
holder. Duties may be changed, after discussion, to suit the operational requirements of Olympus Tech. KNOWLEDGE, SKILLS AND EXPERIENCE Technical Educated to Degree Level, or equivalent, in Computer Science, Information Technology or related discipline. Proven experience in software support and technical/business/data analysis. Able to communicate effectively and clearly in writing and verbally, including drafting correspondence … PHP, etc). The ability to work with large datasets across multiple platforms with confidence. A systematic and analytical approach to problem solving with the ability to communicate technical information to both technical and non-technical audiences. Excellent skills with Microsoft Excel. Essential Self-motivated, with high energy and enthusiasm. Strict attention to detail. Highly intuitive and tech savvy. … data sets Experience with property management software MRI Qube, Yardi or similar. Experience with complex databases Experience in system support, monitoring & troubleshooting. Experience of working in environments with high informationsecurity standards to meet needs of ISO27001, SOC2 and GDPR etc Experience with AI and/or Machine Learning Project planning and management experience. Experience with finance systems More ❯
Overview Falconwood is a woman-owned, veteran-owned company providing consultation and programmatic support to Department of Defense Information Technology (IT) initiatives and programs. We provide expert advice and consultation on a diverse range of IT subjects, focusing on acquisition, policy, cybersecurity, engineering, and process development. The Information Assurance Analyst will be responsible for performing duties associated with … development and review of RMF packages in support of the Commander, Naval Information Forces (NAVIFOR) N6 Directorate. Responsibilities The candidate will support Assessment and Authorization efforts for NAVIFOR N6 directorate and subordinate commands through: Support program's authorization efforts throughout the Navy RMF process. Track to ensure quality and timeliness of RMF package artifacts and deliverables. Analyze general information assurance-related technical problems and provides recommendations and technical support in solving these problems. Assess and supports implementation of solutions that meet network security requirements. Review vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle. Perform duties associated with development and review of RMF packages. Support continuous improvement of More ❯
solutions that effectively address the needs of customers. Nighthawk's flexibility and expertise across the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Senior Information Assurance Analyst will support the Overseas Buildings Operations (OBO) Information System Security Officer (ISSO). The Senior Analyst will act as a subject matter expert (SME) for … Federal Assessments & Authorizations (A&A); provides sound advice and recommendations to lower risk and improve the overall defensive posture. Responsibilities Essential Job Functions: Assist in planning and preparation for security Assessment and Authorization (A&A) as part of the Department's Information Assurance policy and Federal InformationSecurity Management Act (FISMA) implementation efforts Conduct risk assessments … vulnerability assessments, and system audits to identify potential security threats to OBO information systems. Provide recommendations to mitigate identified risks and ensure compliance with applicable regulations and standards. Provide support for and where necessary to create security documentation for the required phases of the DOS A&A process in support of obtaining Authority to Operate (ATO) approvals More ❯
Lead_Analyst InformationSecurity Governance Risk Compliance Job Category : InformationSecurity and Compliance Requisition Number : LEADA001461 Apply now Posted : July 10, 2025 Full-Time Remote Locations Showing 1 location Remote, EMEA 00000, GBR Description Title: Lead Analyst, Information, Security, Governance, Risk and Compliance Location: Remote-UK Salary: £60,000/annually About PSI We … inclusion is critical to our success. That's why you'll find these ideals are intrinsic to our company culture and applied throughout the employee lifecycle. The Lead Analyst, InformationSecurity - GRC plays a key role in supporting PSI's commitment to data security, privacy, and compliance. This role is responsible for driving core activities across quality … risk management, InformationSecurity, data protection, and audit readiness to ensure the organization meets ISO, PCI, SOC 2, and other relevant standards. The position helps deliver assurance to stakeholders that PSI prioritizes the security and privacy of its data and systems. This is a full-time, permanent role, Monday to Friday, with flexible working hours around a More ❯
Job Title: Cyber Security ManagerLocation:Wiltshire, United Kingdom (with some travel required)Salary:£62,000 - £73,000 (depending on experience) + Bonus + Excellent BenefitsClearance:Must be a British National and SC Cleared or EligibleAbout the Role:We are seeking a highly skilled and motivated Cyber Security Manager to lead and enhance our cyber security posture. This … security framework aligned with industry best practices.Key Responsibilities:* Lead and manage cyber security incidents, ensuring timely resolution and root cause analysis.* Oversee the implementation and maintenance of InfoSec and Cyber Security compliance and assurance programs.* Ensure alignment with ISO 27001, NIST, and other relevant security frameworks.* Collaborate with the Security Operations team to monitor, detect … CV will be treated in the strictest confidence and we would always speak to you before discussing your CV with any potential employer.Keywords:Cyber Security Manager, Incident Management, InfoSec, Cyber Assurance, ISO 27001, NIST, CISSP, CISM, GRC, Security Operations, SOC, Risk Management, Threat Landscape, Defence, Stakeholder Engagement, Security Frameworks, SC Clearance, British National, Cyber Compliance, SecurityMore ❯
Job Title: Cyber Security Manager Location: Wiltshire, United Kingdom (with some travel required) Salary: £62,000 - £73,000 (depending on experience) + Bonus + Excellent Benefits Clearance: Must be a British National and SC Cleared or Eligible About the Role: We are seeking a highly skilled and motivated Cyber Security Manager to lead and enhance our cyber security … framework aligned with industry best practices. Key Responsibilities: * Lead and manage cyber security incidents, ensuring timely resolution and root cause analysis. * Oversee the implementation and maintenance of InfoSec and Cyber Security compliance and assurance programs. * Ensure alignment with ISO 27001, NIST, and other relevant security frameworks. * Collaborate with the Security Operations team to monitor, detect … will be treated in the strictest confidence and we would always speak to you before discussing your CV with any potential employer. Keywords: Cyber Security Manager, Incident Management, InfoSec, Cyber Assurance, ISO 27001, NIST, CISSP, CISM, GRC, Security Operations, SOC, Risk Management, Threat Landscape, Defence, Stakeholder Engagement, Security Frameworks, SC Clearance, British National, Cyber Compliance, SecurityMore ❯
solutions that effectively address the needs of customers. Nighthawk's flexibility and expertise across the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Cyber Security Engineer will support the Overseas Buildings Operations (OBO) Information System Security Officer (ISSO). The Cyber Security Engineer is responsible for designing, implementing, and maintaining security measures to protect an organization's information systems and networks. This role plays a critical part in preventing and responding to security incidents by deploying and managing advanced security technologies and ensuring compliance with industry standards. Responsibilities Essential Job Functions: Enforce department and industry standards, guidelines, and policies for securing windows servers ensuring they have been … Active Directory (AD) objects across all OBO/IRM IT infrastructure (on-Prem and in-Cloud) Provide support for administering and managing the structure of the bureau's OU security groups and distribution lists Utilize Department Security Incident and Event Management tools (NetIQ Sentinel, Tenable Nessus, Splunk, and Change Auditor, McAfee Policy Auditor) or the contractor will be More ❯
network operations, cybersecurity incidents, and critical IT service disruptions to ensure mission continuity. T hey coordinate response efforts, provide situational awareness to leadership, and manage operational workflows to enhance security posture and resilience. Responsibilities include but are not limited to: Lead and manage the watch operations team during assigned shifts, ensuring continuous monitoring and protection of DHS networks ; Train … their roles Coordinate and oversee incident response activities, ensuring timely and effective resolution ; Prepare and submit detailed incident reports and other documentation as required Maintain situational awareness of all security events and incidents, providing updates and briefings to senior management . Develop and implement standard operating procedures (SOPs) for watch operations. Conduct regular shift briefings and debriefings to ensure … smooth handover between shifts . Analyze security incidents and trends, providing recommendations for improvement. Collaborate with other NOSC teams and external stakeholders to enhance overall security posture . Train and mentor junior watch officers, ensuring they are proficient in their roles. Minimum Qualifications: 7 + years of experience in cybersecurity operations and a B achelor's degree in More ❯
nation's security. In this role, you'll be counted on to help understand cyberspace capabilities to evaluate potential weaknesses as well as the effectiveness of mitigations for cyber security solutions. You will work with your team to leverage cyberspace operations systems to aggregate threat feeds that inform briefings for senior leadership aligned to the Intelligence Community. This is … our first line of defense influencing the most critical global cyber missions, this is the opportunity for you. Qualifications You Have: 2+ years of experience as a Cybersecurity Analyst, InformationSecurity Analyst, or in a related security role Experience with security monitoring tools, such as SIEM, firewalls, antivirus software, and vulnerability management tools Experience with security … frameworks and regulations, such as NIST, ISO 27001, PCI-DSS, and GDPR Experience with vulnerability scanning and penetration testing tools such as Nessus, OpenVAS, or Metasploit Knowledge of network security concepts, firewalls, VPNs, IDS/IPS, and encryption technologies Knowledge of operating systems and network protocols TS/SCI clearance with a polygraph HS Diploma or GED Nice if More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
Join our dynamic team as a Security Operations Manager, where you'll lead and enhance our security strategies to protect critical assets and ensure operational resilience. WHO ARE WE? Privately owned and independently minded, Creditsafe operates with the singular vision of powering business decisions. We do this by delivering valuable intelligence on customers, suppliers and potential buyers to … corporates, public sector organisations and SMEs globally. Our journey began in 1997 in Oslo, Norway in 1997, with a revolutionary dream to make business information accessible to all. Twenty-five years later, we’ve not only realised this dream, changed the market for the better, made data intelligence accessible to all businesses big and small but most importantly, opened … identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE TEAM Creditsafe’s InformationSecurity and Compliance team are motivated by protecting company reputation, safeguarding existing revenue, and supporting the generation of future revenue. We realise that security can often be More ❯
and Exercise Specialist to join our team in the DC, Maryland, and Virginia (DMV) area. In this role you will design, develop, implement, and execute all aspects of an information environment and cybersecurity test and exercise program, including the development of tests and drills to test emergency preparedness, conduct tabletop exercises, and functional exercises to simulate cybersecurity attacks to … drive capability improvement. The successful candidate will lead the development and execution of comprehensive testing strategies for our network security systems, cyber security capabilities, ensuring the reliability, performance, and security of our network infrastructure. This role requires a deep understanding of network operations, security protocols, and software development, as well as strong analytical and problem-solving … skills. Responsibilities include, but are not limited to: Test and exercise Strategy Development: Design, develop, and implement testing strategies for network security systems and software. Lead and execute functional, performance, and security testing for NOSC systems. Develop and maintain automated test scripts to improve testing efficiency and coverage. Work closely with network engineers, security analysts, and software More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Informationsecurity is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering … support of the Board. Led by our new CISO, the in-house InformationSecurity team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to … have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the firms platforms, including M365, legal and More ❯
ability to keep our clients' data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the world's large and prestigious organisations. Informationsecurity is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering … support of the Board. Led by our new CISO, the in-house InformationSecurity team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to … have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients' cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the firm's platforms, including M365, legal More ❯
on all matters relating to the vulnerabilities and threats to IT systems Execute certification and accreditation activities, including building and shepherding of RMF packages Ensure successful implementation of assigned security controls Implement audit measures to ensure compliance with regulatory requirements Participate in system fieldings, operations, and upgrades Assist Program Management Offices with cybersecurity-related acquisition documentation Ensure adherence to … DoD Inspector General (IG) Cybersecurity Self-Assessment checklist compliance and Federal InformationSecurity Management Act (FISMA) Participate in organizational inspections and surveys of computer systems; provide inspection results and assess the adequacy of corrective actions Advise on complex and unique computer security systems, make recommendations on the approval of various computer operations, and provide alternatives to meet … security requirements Assist in developing, maintaining, implementing, and delivering a formal training and education program for computer and informationsecurity Manage computer incident coordination and notification Generate reports, produce briefings, and assist with contract deliverables Develop SOPs and templates for standardizing and streamlining cybersecurity process across the product office Prepare and review cybersecurity strategies, test plans, procedures More ❯
where you will be making an impact on the financial lives of thousands of savers. We're regulated by the Financial Conduct Authority in the UK. As a Senior Security Engineer, you will play a key role in protecting our systems, networks, and data while ensuring compliance with industry leading security standards such as ISO 27001. Your contributions … will be essential in maintaining customer trust and safeguarding critical information assets. This role sits within thePlatform Engineering Teamand requires a strong technical background, hands-on experience with security tools, and a collaborative mindset to work effectively across teams. The role will involveplatform engineering activities, contributing to the design, implementation, and optimisation of scalable infrastructure. If you're … motivated by solving complex problems in a dynamic, fast-paced environment, this position is for you. What you will do: Develop and implement proactive security strategies, policies, and procedures to protect our systems, networks, and data assets. Lead regular security assessments, including vulnerability scans and penetration tests, identifying risks and driving remediation efforts. Monitor infrastructure for securityMore ❯
Cyber Security Consultant Location: Remote in the United Kingdom Purpose, objectives, and requirements of the role: BlueVoyant Cyber Security Consultants work within the Professional Services team advising, supporting, and managing clients with multiple activities, including but not limited to: Technical & organizational security controls Cyber and digital transformation activities Remediation workstreams and roadmaps Policy & process implementation InformationSecurity Maturity Audits/CMMI Certification or alignment with recognised industry standards Compliance with applicable regulations & legislation Building and implementing governance & risk management processes Design implementation and testing of security tooling BC/DR & Incident response capability building and testing Production of threat intelligence reports and research Supply Chain Risk Management Consultants must possess and be able … to demonstrate credibility and experience as well as currency in these fundamental skill sets. Consultants will work with industry-leading proprietary and standard security tools, other experts, and capabilities to protect and defend client organizations and their people, intellectual property, and technology against wide-ranging threats, including nation states and Advanced Persistent Threat groups that act on their behalf. More ❯
Position Summary: As an InformationSecurity Systems Officer (ISSO) supporting Kitty Hawk Technologies Department of Defense (DoD) contracts, you will be responsible for maintaining the cybersecurity posture of classified and unclassified information systems. You will ensure compliance with DoD cybersecurity policies and standards, including the Risk Management Framework (RMF), NIST Special Publications, and DoD Instructions (e.g., DoDI … . The ISSO works closely with the FSO, IT staff, and program stakeholders to ensure systems meet and maintain authorization to operate (ATO). Key Responsibilities: • Implement and maintain security controls in compliance with DoD RMF, NIST SP 800-53, and DoDI 8510.01. • Maintain and update System Security Plans (SSPs), Plans of Action and Milestones (POA&Ms), and … related security documentation. • Support system Assessment and Authorization (A&A) activities to obtain and maintain Authority to Operate (ATO). • Conduct and document regular security reviews, risk assessments, and audit log analysis. • Assist with vulnerability scanning and remediation (e.g., ACAS, Nessus, STIGs, SCAP). • Enforce security policies, procedures, and guidelines for users, developers, and administrators. • Report and More ❯
This position is contingent upon contract award. Candidates must have an active Secret clearance and verify, before applying, that you meet the minimum requirements of the position. The InformationSecurity Analyst will lead cybersecurity operations, ensure compliance with the Department of Defense (DoD) Risk Management Framework (RMF), and provide expert level information assurance and vulnerability management. This … role requires advanced knowledge of informationsecurity practices and the ability to collaborate effectively with stakeholders to maintain a secure and compliant operational environment. Cybersecurity Operations and Monitoring: Lead cybersecurity operations to ensure continuous monitoring and compliance with DoD RMF requirements. Conduct comprehensive assessments of technical and nontechnical security safeguards across supported environments. Identify, document, and mitigate … vulnerabilities to maintain a robust security posture. Risk Management Framework (RMF) Compliance: Evaluate information system components for accreditation, ensuring compliance with NIST RMF and FISMA guidelines. Prepare, assemble, and maintain system ATO packages, including System Security Plans (SSPs) and other critical documentation. Collaborate with stakeholders to manage and close Plan of Action and Milestones (POA&Ms). More ❯
The Information Systems Security Engineer (ISSE) will directly support the Secretary of the Air Force (SAF)/Office of Competition (OC) Mission Partner Capabilities Office (MPCO) also known as SAF/CDMX Directorate. The Mission Partner Capabilities Office provides design, configuration, accreditation and implementation of mission and R&D information management systems and cloud-based solutions that … support defense and intelligence priorities as well as internal business processes and mission functions, network communications, database management, security accreditation, and workflow management. The ISSE will design and implement secure system architectures to protect SAF/OC information systems from cyber threats. The ISSE will work closely with ISSMs, ISSOs, and IT teams to integrate security controls … and ensure compliance with RMF, NIST 800-53, and DoD security standards. The ISSE is responsible for designing, implementing, and maintaining security controls to protect the organization's information systems in accordance with Department of Defense (DoD) requirements. This role involves collaborating with various stakeholders to ensure that security measures are effectively integrated into the system More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
InformationSecurity Analyst II Who is Epsilon: Epsilon is an IT Services company that was founded in 2009 and has become an established leader in providing Information Technology services to both Federal Government and Commercial businesses across the United States. Epsilon is known for its solution-focused and innovative approach, aligning technology systems, tools, and processes with … opportunity where you will report to the customer location in Falls Church, VA and have the flexibility to work from home based on business needs. An average day: As InformationSecurity Analyst II, you will be responsible for safeguarding the organization's information assets by monitoring, analyzing, and mitigating security threats. The individual in this position … operate within a cross-functional team that supports secure data productization, AI/ML initiatives, automation engineering, and overall pipeline optimization. In this position you will: Implement and maintain security policies, standards, and procedures to protect organizational assets and data. Conduct regular vulnerability assessments and penetration tests to identify and remediate security weaknesses. Monitor and analyze securityMore ❯
ensuring that Onsi meets evolving regulatory, operational, and cybersecurity obligations. Reporting directly to the Head of Compliance, this role is critical in maintaining our regulatory posture and ensuring that security-related compliance requirements are consistently met across our business. You'll collaborate closely with engineering, product, legal, operations and information security. Still, your primary focus will be on … and operationalise emerging obligations. Conduct and coordinate risk assessments, internal reviews, audits, and control testing to ensure compliance with regulations, internal policies, and best practices. Help develop and maintain security governance documentation, including policies, standards, procedures, and awareness content. Prepare the organisation for external audits, regulatory reviews, and due diligence processes, particularly in relation to regulatory risk and operational … perspective. Work cross-functionally with Compliance, Product, Engineering, and Operations to identify, assess, and mitigate risks. Maintain clear ownership of security-related compliance obligations, working alongside (not under) InfoSec and Engineering. Champion a culture of compliance and continuous improvement in secure development and delivery practices. You will love this opportunity if: You're someone who thrives when taking ownership More ❯
The Role: The Vulnerability Management Analyst is a global role within ION's central services division and will support the Group Security strategy and operational excellence through the identification, mitigation and remediation of informationsecurity vulnerabilities, misconfigurations and risks to the business. This role reports to the Vulnerability Management Manager who reports to the Global Head of … IT Security. As a member of the ION Security team, you will build and lead a team of Security professionals specialising in Vulnerability Management along with managing the partners and technology vendor deliverables and of course building and owning the strategy to deliver a world class Vulnerability Management program. The candidate must understand their role in the broader … will regularly perform discovery scanning, risk/exposure assessments, mitigation support activities, continuous validation assessments, and lessons learned workshops and improvement projects to continuously improve our process across Group Security and all other Verticals. We are looking for a diligent, dedicated, creative and motivated individual. Excellent communication skills are a must, and the role holder will be expected to More ❯
Job Title: InformationSecurity Manager Basis: Full-time, permanent Location: Canary Wharf, London - WeWork Reporting to: Co-founder About Onetrace Great products start with great people. Our relentless focus on user experience has been the cornerstone of our growth, helping us become the market leading software for fire protection subcontractors across the UK. We've grown by staying … data protection, tooling configuration and technical policy, embedding scalable and secure practices across our operations. This is an opportunity to build on strong foundations and shape the future of InfoSec in a scaling B2B SaaS business that takes its security responsibilities seriously. What You'll Do InformationSecurity Leadership Own and evolve our ISMS (InformationSecurity … Partner with leadership to ensure policies align with the day-to-day needs of each team and avoid unnecessary friction. What we're looking for Essential Experience as an InfoSec expert - ideally within a high-growth SaaS or B2B tech environment. Strong working knowledge of compliance frameworks (e.g. ISO 27001, SOC2Cyber Essentials) and ideally PCI DSS. Working knowledge of GDPR More ❯
Experience Years: 3-5 Years of Experience Employee Type: Regular Remote Type: Onsite About the Opportunity The role of InformationSecurity Engineer will be responsible for identifying, investigating, and managing cybersecurity related events and incidents. As an InformationSecurity Engineer, you will be responsible for security operations, using and managing security systems, identifying and … managing risks and threats, and developing and following operating procedures. The ideal candidate will have a deep understanding of cyber security risks and threats, incident handling, and will possess excellent analytical, communication, and leadership skills. About the Opportunity The role of InformationSecurity Engineer will be responsible for identifying, investigating, and managing cybersecurity related events and incidents. … As an InformationSecurity Engineer, you will be responsible for security operations, using and managing security systems, identifying and managing risks and threats, and developing and following operating procedures. The ideal candidate will have a deep understanding of cyber security risks and threats, incident handling, and will possess excellent analytical, communication, and leadership skills. Responsibilities More ❯