MetroStar Systems is looking for a Security System/Information Assurance Engineer who is passionate about network and data security. You must have strong communication and leadership skills to interact with client business leaders, stakeholders, and other senior level executives. If you want to join a company that values mission-critical work and are open to commuting to … Washington, DC, we want you to work for MetroStar! Our team is responsible for providing information management and information technology support. Come be a game changer and join our team … You're a great fit if you: • can analyze and evaluate system security technology, policy, and training requirements in support of Federal, DOD, and Intelligence Community (IC) and INFOSEC policies • can Develop, maintain, and coordinate System Security Plans (SSP) to meet all IC and DOD accreditation requirements • have excellent collaboration, communication, technical skills and experience • can establish and More ❯
Security Classification Assessor Test Engineer (SCATE) Level 2 - Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates Government Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as … well as someone who can perform security focused services to improve the security posture of the Information Systems. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective … Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated More ❯
Security Classification Assessor Test Engineer (SCATE) Level 3 -Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates Government Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as … well as someone who can perform security focused services to improve the security posture of the Information Systems. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective … Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated More ❯
Security Classification Assessor Test Engineer (SCATE) Level 1 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as … someone who can perform security focused services to improve the security posture of the ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective in a dynamic environment. … Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools and associated More ❯
Security Classification Assessor Test Engineer (SCATE) Level 4 - Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 4. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well … as someone who can perform security focused services to improve the security posture of the systems. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective in a dynamic … Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated More ❯
Security Classification Assessor Test Engineer (SCATE) Level 1 - Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well … as someone who can perform security focused services to improve the security posture of the ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective in a dynamic … Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated More ❯
Cyber Security Engineer, Senior Become an integral part of a diverse team while working at an Industry Leading Organization, where our employees come first. At Signature Federal Systems, you'll help protect our national security while working on innovative projects that offer opportunities for advancement. Currently, Signature is seeking a motivated, career and customer-oriented Cyber Security Engineer, Senior to join our team in the Chantilly, VA. Responsibilities include, but are not limited to: • Provide IA security requirements to update system requirement documents • Coordinate IA matters with other directorates and external partners as necessary • Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. • Validate and verify system security requirements definitions, analysis, and establish system security designs • Validate proposed software, hardware, firmware, and infrastructure comply with security guidelines, policies, and procedures • Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments. More ❯
Security Classification Assessor Test Engineer (SCATE) Level 3 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well … as someone who can perform security focused services to improve the security posture of the NRO ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective in a … Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools and associated More ❯
Security Classification Assessor Test Engineer (SCATE) Level 2 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well … as someone who can perform security focused services to improve the security posture of the NRO ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective in a … Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools and associated More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Prism, Inc
The role requires: - 5 years of experience - Secret/Tier 3 - Primary Location: Alexandria, VA - Hybrid (occasional on-site required) Skills - Authority to Operate (ATO) - Business Writing - Cloud Security - Communications Planning - CompTIA Security+ - Cyber Risk - Cybersecurity - Enterprise Mission Assurance Support Service (eMASS) - InformationSecurity Engineering - IT Security - NIST 800-53 - Plan Of Action And Milestones (POA … M) - Risk Management Frameworks - RMF - Security Engineering - Security Operations - Security Technical Implement Guide(STIGS) - System Security Plan (SSP) Description This position is for a RMF security engineer and requires 5 years of experience with RMF/Sec engineering. Provides end-to-end A&A support for DoD cybersecurity, privacy, and financial controls implementation, testing, monitoring … DoD compliance and cybersecurity requirements in accordance with NIST Risk Management Framework (RMF) Controls and DoD Policy. Preferred candidates must have: Experience in mapping, implementing, interpreting, and documenting RMF security controls Experienced managing the eMASS cybersecurity management tool Experience developing and submitting at least six (6) ATO packages Secret Clearance Additional requirements include: Thorough understanding of the Risk Management More ❯
Description Position Overview The Security Control Assessor (SCA) provides informationsecurity Assessment and Authorization (A&A) support throughout a customers programs lifecycle to Contractor and Government facilities processing customers information. SCAs enhance the Information System (IS) security awareness of Directorates' & Offices' staffs, ensure that proper IS security resources are appropriately applied, and act as … an IS liaison between the Directorates & Offices and OS&CI. The SCA Level duties include, but are not limited to the following: The SCA shall review information systems for compliance with applicable DCID, ICD, and customers directives and guidance, and make recommendations to the USG. Provide IS security advice and guidance in accordance with applicable DCID, ICD, and … support in preparing responses for USG approval to A&A questions asked by Government and industry partners. Evaluate and recommend approval, disapproval, or waiver(s) for IS processing national security data at industry and/or Government facilities. Support customer Securitys development and implementation of directives and guidance for Customers Information Assurance, Information Technology, and InformationMore ❯
GPS Facility Security Officer Location: San Diego, CA Deloitte is seeking a Facility Security Officer to administer the daily operations of the National Industrial Security Program (NISP), and implement procedures and controls to safeguard classified as well as special program information, as required. Key to success in this role includes the ability to implement NISP security operations with Controlled Unclassified Information (CUI) security requirements embedded in our federal contracts, related to federal client-designated CUI/sensitive information and personnel security program requirements. What You'll Do: Manage and conduct NISP operations and support federal security team personnel affiliated with both Department of Defense/NISP User Agencies' contracts/… Intelligence Community programs/clients that includes both "access elsewhere" and "possessing facility" operational environments. Ensure compliance with DOD/Federal/Intelligence Community regulations that govern the critical security disciplines of both NISP/NISPOM and SCI classified contract-related security operations. Maintain cognizance and oversight of all NISP-affiliated or Sponsored classified networks and/or More ❯
IT programs. Our employees are integral players in support of mission-critical programs focused on our National Security. Role Description: A successful candidate will work with others on program security team to provide for all aspects of security to include but not limited to the following: Provide expert-level knowledge, both in context and execution with the Risk … Management Framework to support a NIST SP 800-53 HHM systems through the A&A process. Construct thorough and complete security documentation to include, but not limited to, System Security Plans (SSPs), Plan of Actions and Milestones (POA&Ms), and any other artifacts to support the Body of Evidence (BOE), for client's approval. Identify security controls … and work with engineering, development and testing staff to construct proper test plans and procedures. Implement security audit reviews verifying that the audit records are collected and reviewed. Coordinate all security testing exercises, working with external assessment teams and technical staff. Configure and support various AWS services to protect the security posture of the system. Required Skills More ❯
Citizen and possess a current and active TS clearance with SCI eligibility; willingness to sit for a Counterintelligence (CI) Polygraph. Background: Assured Consulting Solutions (ACS) is seeking a Senior Security Program Protection Specialist to provide support for the Research Directorate at the National Geospatial-Intelligence Agency (NGA) onsite in Springfield, VA. The Research and Technology Protection (RTP) team develops … and provides subject matter expertise in providing day-to-day security classification guidance and assessments of classified and controlled unclassified information GEOINT campaigns and program tools development within the NGA Research Offices and Divisions. RTP is a security risk management process that identifies and safeguards both technical and programmatic information from concept through transition to a … mission partner. RTP analyzes information and processes to ensure security of information and technology to safeguard U.S. Government, National Security, and the Intelligence Community interests against unauthorized disclosure. Additionally, RTP applies operations security and selected countermeasures to the protection of critical information generated by the NGA Research workforce. Responsibilities include, but are not limited More ❯
This position is contingent on contract award Description: Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components. Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures. Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance. … Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage. Analyze … design specifications, design documentation, configuration practices and procedures, and operational practices and procedures Conduct on-site evaluations Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components Provide identification of non-compliance with security requirements and possible mitigations for requirements that are not in compliance Validate the security requirements More ❯
This position is contingent on contract award Description: Enable planning, coordination, and implementation of the organization's information security. Identify current organizational security infrastructure, define future program requirements, and design and implement security related IT systems. Ensure systems provide a high level of data security and user compartmentalization due to the sensitive nature of business and … financial data used by TD systems. Design and develop systems that provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems. Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave Assist in maintaining appropriate operational security posture for an information system or program Provide support to the Government on all matters (technical and otherwise) involving the security of the information system Assist with the management of security aspects of the information system Assist in the development of the system security policy and ensure compliance with that policy Develop and More ❯
This position is contingent on contract award Description: Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components. Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures. Provide identification of non-compliance of security requirements and possible mitigations to requirements that are not in compliance. … Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage. Analyze … design specifications, design documentation, configuration practices and procedures, and operational practices and procedures Conduct on-site evaluations Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components Provide identification of non-compliance with security requirements and possible mitigations for requirements that are not in compliance Validate the security requirements More ❯
This position is contingent on contract award Description: Enable planning, coordination, and implementation of the organization's information security. Identify current organizational security infrastructure, define future program requirements, and design and implement security related IT systems. Ensure systems provide a high level of data security and user compartmentalization due to the sensitive nature of business and … financial data used by TD systems. Design and develop systems that provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems. Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave Assist in maintaining appropriate operational security posture for an information system or program Provide support to the Government on all matters (technical and otherwise) involving the security of the information system Assist with the management of security aspects of the information system Assist in the development of the system security policy and ensure compliance with that policy Develop and More ❯
re in search of ingenious minds that crave the challenge of spearheading game-changing advancements, delivering the extraordinary breakthroughs our diverse range of clients demand. Your Mission: As an Information Systems Security Engineer (ISSE) at Praxis Engineering, you'll be at the forefront of safeguarding digital landscapes. Dive into the exhilarating realm of technical security assessments, uncovering … vulnerabilities and ensuring compliance with stringent Information Assurance (IA) standards and regulations. Your expertise will drive the development, integration, and implementation of secure networking, computing, and enclave environments. You'll forge the very foundations of robust system security, validating requirements, crafting designs, and upholding functionality and fortification. Qualifications that Set You Apart: - A minimum of 10 years' trailblazing … experience as an Information Systems Security Engineer on projects akin to our scope, complexity, and vision. - Adherence to DoD 8570 compliance standards, showcasing your dedication to excellence. - A dynamic ability to collaborate seamlessly with clients and fellow project trailblazers. - Battle-hardened experience in security planning, risk assessment, risk analysis, and proactive risk management. - A knack for conjuring More ❯
modernization. With BridgePhase, federal agencies gain a trusted partner dedicated to delivering high-performing solutions that advance the nation's most critical objectives. We are currently hiring an SAP Security and Governance, Risk & Compliance (GRC) Consultant to support one of our federal clients on-site in Chantilly, Virginia. The SAP Security and GRC Consultant candidate will be responsible … for leading our security and controls team in delivery and maintenance of solutions that meet our client's complex needs. The candidate should be an experienced manager who still does hands-on work and has the necessary knowledge of SAP and GRC to effectively work with minimal supervision. Candidates should have knowledge or previous work experience in managing SAP … and GRC tools in a cloud environment, understanding the complexities that come with cloud, and can effectively communicate cloud security design/architecture ideas to technical as well as non-technical client stakeholders. This is a full-time position, and due to security requirements is on-site only. Skills/Experience Requirements: 4+ years' experience managing SAP application More ❯
iSenpai is a Woman-Owned Small Business (WOSB) that provides enterprise IT and cyber security services, cloud technology, and data analytics solutions for US Government and commercial customers. We specialize in cloud-based solutions with cyber security integrated into the design, delivered using efficient Agile DevSecOps. Engaging across industry and academia to develop innovative approaches, we support our … on everything from your cell phone bill to NFL tickets, Movie Tickets, Live Performances, etc Rewards for obtaining new IT certifications Computer-based training (CBT) library on IT and informationsecurity topics and certifications Remote access to a virtual lab for testing/learning opportunities Flexible/Alternative Work Schedules (based on customer requirements) iSenpai is an equal … for any fees related to unsolicited resumes or staffing services. Do not attempt to solicit your services. Single owner corp to corp OR 1099 are encouraged to apply! Cyber Security SME (TS/SCI) Washington DC Required Degree: Bachelor's Degree Required Experience: 20+ years experience of relevant experience Clearance Required: TS/SCI and or Q clearance Work More ❯
members of the department by joining a high functioning team within the TSS department. Our team consists of a Field Operations, System Administration and Networking Technicians lead by Physical Security Specialists and Systems Engineers supporting the design, installation, maintenance and operations of the on-site security systems and surveillance hardware. To join our team of outstanding professionals, apply … be able to work onsite 100% of the time. Responsibilities On any given day, you may be called on to: Be responsible for installation, maintenance, and repair of electronic security equipment. Complete installation and service of existing equipment. Work both in the field and Security Operations Center (central communications hub of the security systems.) Working with a … including antennas, power supplies, amplifiers, two-way radios, satellite systems, and network access points. Troubleshooting circuits used in RF transmission independently and with site engineers. Receive trouble calls, program security system, maintain network connectivity and monitor system status. Candidates will be required to work outdoors. Qualifications High School diploma plus five (5) or more years' in directly related experience More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
We are searching for a Senior Software Security Architect/Senior Application Security Architect for a marketing leading and award-winning technology and data driven business. The position is offered on a remote basis. The role is hands-on and very software engineering focused - you will be responsible for establishing a secure SDLC and 'Secure by Design' approach … to ensure security is an integral part of all development and deployment processes. Providing expert software security advice (design, coding, testing) to the Software Engineering Community, to InfoSec, DevOps and other teams. Defining and delivering secure software development of information to the software engineering teams. Escalating issues appropriately, to various teams and levels of authority inside the … Training and Career Progression. Family-Friendly Policies. Remote Working. KEYWORDS Senior Software Security Architect, Senior Application Security Architect, SDLC, Secure by Design, Architecture, Software Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application Threat Modelling, Security Policy, Security Controls More ❯
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex … networking security solutions, technologies, and best practices to support the secure implementation and sustainment of enterprise network devices in line with information assurance (IA) and security (INFOSEC) compliance, governance, and requirement. Personal experience working with Cisco Adaptive Security Appliances (ASA) and like products is a plus. Demonstrated experience in networking engineering enterprise solutions to directly support … the issue, implement the resolution, and restore the degraded entity to an operational state all while maintaining concern for the original configuration and the overall InformationSecurity (INFOSEC) posture of the environment. Demonstrated experience monitoring and assessing networking systems and solutions proactively for performance degradation and tuning and optimization opportunities. Shall meet the Cyber IT/Cybersecurity Workforce More ❯
over the next few years. There are lots of opportunities to grow with the business. Your new role This is a genuinely interesting opportunity to enhance the organisation's security posture, at a good time when the company is expanding and are in need of expertise and guidance. This role will focus on informationsecurity policies, procedures … benefits package, which is already strong. You will bring confidence and expertise in how the organisation can improve their cybersecurity strategy. You will be the first 100% cyber and infosec focussed employee. Key parts of the role: Develop, implement, and maintain security policies, procedures, and protocols. Monitor, analyse and investigate security alerts, responding appropriately, documenting findings and collaborating … with relevant teams. Conduct regular security assessments, audits and penetration tests to identify potential vulnerabilities. Investigate and propose new technologies which would help improve our security posture. Coordinate with IT and other departments to ensure security measures are integrated into all systems and processes. Manage and conclude third-party Cybersecurity assessments. Manage and oversee the implementation of More ❯
Employment Type: Permanent
Salary: £55000 - £65000/annum Up to £65k plus great benefits