Permanent Information Security Job Vacancies

601 to 625 of 2,081 Permanent Information Security Jobs

Senior Software Security Architect

Reading, Berkshire, South East, United Kingdom
Hybrid / WFH Options
Bowerford Associates
We are searching for a Senior Software Security Architect/Senior Application Security Architect for a marketing leading and award-winning technology and data driven business. The position is offered on a remote basis. The role is hands-on and very software engineering focused - you will be responsible for establishing a secure SDLC and 'Secure by Design' approach … to ensure security is an integral part of all development and deployment processes. Providing expert software security advice (design, coding, testing) to the Software Engineering Community, to InfoSec, DevOps and other teams. Defining and delivering secure software development of information to the software engineering teams. Escalating issues appropriately, to various teams and levels of authority inside the … Training and Career Progression. Family-Friendly Policies. Remote Working. KEYWORDS Senior Software Security Architect, Senior Application Security Architect, SDLC, Secure by Design, Architecture, Software Development, Engineering, DevOps, InfoSec, Security, Security Strategy, Best Practice, Programming, Code, C++, C#, C, .NET Core, Java, JavaScript, Node.js, Angular, React, OWASP, Agile, Application Threat Modelling, Security Policy, Security Controls More ❯
Employment Type: Permanent, Work From Home
Salary: £90,000
Posted:

Sr. Network Engineer (SEAS) with Security Clearance

Springfield, Virginia, United States
NewGen Technologies, Inc
annually. Requirements TS/SCI Clearance with the ability to obtain and maintain a CI Poly Associate degree from an accredited University OR Certifications: CompTIA Security+ ce; or GIAC Security Essentials Certification (GSEC); or Systems Security Certified Practitioner (SSCP) Cisco Certified Networks Professional (CCNP) Data Center certified 7 or more years' of progressive experience successfully leading the employment … the issue, implement the resolution, and restore the degraded entity to an operational state all while maintaining concern for the original configuration and the overall Information Security (INFOSEC) posture of the environment Demonstrated experience monitoring and assessing networking systems and solutions proactively for performance degradation and tuning and optimization opportunities Shall meet the Cyber IT/Cybersecurity Workforce … networking security solutions, technologies, and best practices to support the secure implementation and sustainment of enterprise network devices in line with information assurance (IA) and security (INFOSEC) compliance, governance, and requirement Personal experience working with Cisco Adaptive Security Appliances (ASA) and like products is a plus Demonstrated experience in networking engineering enterprise solutions to directly support More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Network Engineer (SEAS) w/ CCNP certification - active TS with Security Clearance

Springfield, Virginia, United States
V2X
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex … networking security solutions, technologies, and best practices to support the secure implementation and sustainment of enterprise network devices in line with information assurance (IA) and security (INFOSEC) compliance, governance, and requirement. Personal experience working with Cisco Adaptive Security Appliances (ASA) and like products is a plus. Demonstrated experience in networking engineering enterprise solutions to directly support … the issue, implement the resolution, and restore the degraded entity to an operational state all while maintaining concern for the original configuration and the overall Information Security (INFOSEC) posture of the environment. Demonstrated experience monitoring and assessing networking systems and solutions proactively for performance degradation and tuning and optimization opportunities. Shall meet the Cyber IT/Cybersecurity Workforce More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer

Guildford, Surrey, United Kingdom
Hays Technology
over the next few years. There are lots of opportunities to grow with the business. Your new role This is a genuinely interesting opportunity to enhance the organisation's security posture, at a good time when the company is expanding and are in need of expertise and guidance. This role will focus on information security policies, procedures … benefits package, which is already strong. You will bring confidence and expertise in how the organisation can improve their cybersecurity strategy. You will be the first 100% cyber and infosec focussed employee. Key parts of the role: Develop, implement, and maintain security policies, procedures, and protocols. Monitor, analyse and investigate security alerts, responding appropriately, documenting findings and collaborating … with relevant teams. Conduct regular security assessments, audits and penetration tests to identify potential vulnerabilities. Investigate and propose new technologies which would help improve our security posture. Coordinate with IT and other departments to ensure security measures are integrated into all systems and processes. Manage and conclude third-party Cybersecurity assessments. Manage and oversee the implementation of More ❯
Employment Type: Permanent
Salary: £55000 - £65000/annum Up to £65k plus great benefits
Posted:

Security Operations Analyst

London, United Kingdom
dunnhumby
Procter & Gamble and Metro. We're looking for a Security Operations Analyst who expects more from their career. It's a chance to extend and improve dunnhumby's InfoSec Team. It's an opportunity to work with a market-leading business to explore new opportunities for us and influence global retailers. You maintain a strong understanding of Tools, Tactics … experience for the role, but not all are mandatory. You will have strong understanding of as many of the following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you … others, so if this is important to you please raise this with your recruiter, as we are open to discussing agile working opportunities during the hiring process. For further information about how we collect and use your personal information please see our Privacy Notice which can be found (here) Apply for this job indicates a required field First More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Sr. ISSO with Security Clearance

Annapolis Junction, Maryland, United States
FUSE Engineering
Description Provides aid to the program, organization, system, or enclave's information assurance program. Lends assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists … with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software … hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with Information System Certification and Accreditation Process (NISCAP) and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

FF-ISSE Level 1 - 2 with Security Clearance

Maryland, United States
Tailored Access, LLC
U) The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and …/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure … uniform application of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Subject Matter Expert (SME)

Telford, England, United Kingdom
Coforge
Job Title: Cybersecurity SME Work Location: Telford, Shropshire Department: Information Security & Risk Management Reports To: Chief Information Security Officer (CISO)/Head of Information Assurance, security, ensuring compliance with frameworks such as UK GDPR We at Coforge are hiring Cybersecurity SME with the following skillset: Job Summary: We are looking for a Cybersecurity SME … in the UK (based out of Telford, Shropshire) with a strong experience of – Data Protection, Application & Cloud Data Security Key Responsibilities: Information Security Governance & Compliance: • Develop and maintain security policies, standards, and procedures aligned with UK GDPR and other compliance. • Conduct risk assessments and support DPIAs for systems processing sensitive data (e.g., PII, PHI). • Ensure … security controls are embedded across enterprise platforms including Pega CRM, contact center systems, and cloud data environments . Data Protection & DLP: • Design and implement DLP strategies across endpoints, cloud storage, and enterprise applications. • Enforce data classification, encryption, and access control policies for regulated data. • Collaborate with stakeholders to ensure compliance with data protection regulations and privacy-by-design principles. More ❯
Posted:

DevSecOps Engineer with Security Clearance

Washington, Washington DC, United States
Ascension Federal Services Inc
SCI Job Description: The DevSecOps Engineer will be responsible for designing, implementing, and maintaining secure software development practices across the organization. This includes collaborating with development teams to integrate security into the software development lifecycle, implementing security controls and monitoring tools, and conducting security assessments and audits. Responsibilities: Collaborate with development teams to integrate security into … the software development lifecycle. Implement security controls and monitoring tools. CI/CD Pipelining Conduct security assessments and audits. Design and implement secure software development practices. Develop and maintain security policies and procedures. Stay up to date with the latest security threats and vulnerabilities. Provide guidance and training to development teams on secure coding practices. Participate … in incident response and remediation efforts. Requirements: Bachelor's degree in Computer Science, Information Security, or related field 5+ years of experience in software development and/or information security Experience with DevOps and Agile methodologies. Strong understanding of security principles and best practices Experience with security tools such as vulnerability scanners, intrusion detection More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Trainer with Security Clearance

Chantilly, Virginia, United States
RDR, Inc
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application … training materials as new Cyber tools and capabilities are fielded or processes are created or modified Provide training related to ServiceNow, Risk Management Framework (RMF), Continuous Monitoring, Privileged Users, Information Assurance, Information System Owner cyber responsibilities, etc. Job Requirements Qualifications Required: Current U.S. Government Top Secret clearance with SCI eligibility Favorably adjudicated Polygraph Experience training and presenting both … IAT or IAM Strong attention to detail and organizational skills Excellent communications skills Self-starter requiring limited direction and supervision Experience with the RMF Process Experience as an ISSO, Information System Security Manager (ISSM), SCA, or Delegated Authorization Official Representative (DAOR) Desired: Bachelors of Science Degree in Science, Technology, Engineering or Mathematics (STEM) or an advanced IA certification More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO with Security Clearance

Huntsville, Alabama, United States
Gridiron IT Solutions
ISSO The Information System Security Officer (ISSO) advises the Information System Owner, Business Process Owner, and Chief Information Security Officer (CISO)/Information System Security Manager (ISSM) on security matters. The ISSO ensures the implementation and maintenance of security controls to protect information system assets. Key Responsibilities: • Advise on security matters for information systems. • Implement and maintain security controls. • Direct and implement procedures to protect information systems. • Provide guidance on physical protection of assets. • Report on data security effectiveness and recommend new procedures. • Assist with the Authority to Operate (ATO) accreditation process. • Perform network self-inspections. • Create and edit ATO documentation, including System Security Plans and IS contingency plans. • Develop and manage Plan of Action and Milestones (POAMs) from vulnerability data. Qualifications: • Experience as an ISSO or similar role. • Knowledge of information security principles and best practices. • Familiarity with ATO processes and documentation. • Strong analytical and communication skills. • BSc/Ba in Information Security, Computer Science, or related field More ❯
Employment Type: Permanent
Salary: USD 140,000 Annual
Posted:

Cloud Security Engineer (AWS) - Remote

London, South East, England, United Kingdom
Hybrid / WFH Options
DMS Computer Recruitment
The Role: We are looking for a Cloud Security Engineer with experience on AWS, to join our growing team. The successful candidate will have an essential role in ensuring the information security of our business. You will be working in a team that is designing and building resilient and secure Cloud environments that proactively prevent security threats. You will typically have industry accreditations like AWS Certified Security - Specialty The main responsibilities of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place … Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate in efforts that shape the company’s security policies, procedures and standards for use in Cloud environments Create technical and managerial level security reports for Cloud-based applications and infrastructure Implement and tests network and security Disaster Recovery procedures More ❯
Employment Type: Full-Time
Salary: £50,000 - £90,000 per annum
Posted:

Senior Cyber Security Consultant

Greater Bristol Area, United Kingdom
Hybrid / WFH Options
Advance TRS
Senior Cyber Security Consultant – Defence There is an increasing demand in the projects we are undertaking for Information Assurance and Security Consultants, we are looking to grow our team to meet this. The role will suit experienced qualified professionals who are looking to take their career to the next level and provide real benefit to clients that … sites in the locality of our offices, but with some travel requiring overnight stay. Your Purpose You will be a knowledgeable, enthusiastic and conscientious individual who has the relevant Information Assurance and Security qualifications. You will work on a range of exciting client facing projects, large and small, but will also be expected to contribute to winning new … successful in this role you need to have the ability to work on multiple projects and with many stakeholders concurrently. Your key responsibilities will encompass the following: Provide Cyber Security advice and guidance for clients in ‘business as usual’, technical refresh and new project environments. Be able to apply technical security knowledge, with creative and innovative thinking in More ❯
Posted:

Designated Authorizing Official 3 - TS/SCI With Poly with Security Clearance

Columbia, Maryland, United States
Amentum
office. As a DAO3., you will serve on a team that is responsible for the Authorization and Assessment process under the Risk Management Framework (RMF) for new and existing information systems and will be expected to maintain Authority to Operate compliance for all assigned systems. Responsibilities: Responsible for assisting in identifying the overall security requirements for the protection … of data, to ensure the implementation of appropriate information security controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide assistance to ensure Cybersecurity functions are included in the configuration management process. Interact with customers, Information Technology (IT) staff … and high-level corporate officers in defining and achieving required Cybersecurity objectives for the organization. Contribute to building security architecture. Assist with the integration of legacy systems. Contribute to the acquisition/RDT&E environment and building Cybersecurity into systems deployed in operational environments. Prepare security authorization documentation. Here's What You'll Need: Eight (8) years of More ❯
Employment Type: Permanent
Salary: USD 220,000 Annual
Posted:

Senior Cyber Security Consultant

Almondsbury, Gloucestershire, United Kingdom
Hybrid / WFH Options
Advance TRS
Senior Cyber Security Consultant - Defence There is an increasing demand in the projects we are undertaking for Information Assurance and Security Consultants, we are looking to grow our team to meet this. The role will suit experienced qualified professionals who are looking to take their career to the next level and provide real benefit to clients that … sites in the locality of our offices, but with some travel requiring overnight stay. Your Purpose You will be a knowledgeable, enthusiastic and conscientious individual who has the relevant Information Assurance and Security qualifications. You will work on a range of exciting client facing projects, large and small, but will also be expected to contribute to winning new … successful in this role you need to have the ability to work on multiple projects and with many stakeholders concurrently. Your key responsibilities will encompass the following: Provide Cyber Security advice and guidance for clients in 'business as usual', technical refresh and new project environments. Be able to apply technical security knowledge, with creative and innovative thinking in More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 75,000 Annual
Posted:

Senior Cyber Security Consultant

Bristol, Almondsbury, Gloucestershire, United Kingdom
Hybrid / WFH Options
Advance TRS
Senior Cyber Security Consultant - Defence There is an increasing demand in the projects we are undertaking for Information Assurance and Security Consultants, we are looking to grow our team to meet this. The role will suit experienced qualified professionals who are looking to take their career to the next level and provide real benefit to clients that … sites in the locality of our offices, but with some travel requiring overnight stay. Your Purpose You will be a knowledgeable, enthusiastic and conscientious individual who has the relevant Information Assurance and Security qualifications. You will work on a range of exciting client facing projects, large and small, but will also be expected to contribute to winning new … successful in this role you need to have the ability to work on multiple projects and with many stakeholders concurrently. Your key responsibilities will encompass the following: Provide Cyber Security advice and guidance for clients in 'business as usual', technical refresh and new project environments. Be able to apply technical security knowledge, with creative and innovative thinking in More ❯
Employment Type: Permanent
Salary: £60000 - £75000/annum
Posted:

Senior Cyber Security Consultant

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Advance TRS
Senior Cyber Security Consultant - Defence There is an increasing demand in the projects we are undertaking for Information Assurance and Security Consultants, we are looking to grow our team to meet this. The role will suit experienced qualified professionals who are looking to take their career to the next level and provide real benefit to clients that … sites in the locality of our offices, but with some travel requiring overnight stay. Your Purpose You will be a knowledgeable, enthusiastic and conscientious individual who has the relevant Information Assurance and Security qualifications. You will work on a range of exciting client facing projects, large and small, but will also be expected to contribute to winning new … successful in this role you need to have the ability to work on multiple projects and with many stakeholders concurrently. Your key responsibilities will encompass the following: Provide Cyber Security advice and guidance for clients in 'business as usual', technical refresh and new project environments. Be able to apply technical security knowledge, with creative and innovative thinking in More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted:

Mid Cloud ISSO with Security Clearance

Washington, Washington DC, United States
Open Systems Technologies Corporation
Open Systems Technologies Corporation is a leader in the government contracting marketplace, providing Enterprise Security and Cloud Computing solutions to support large organizations. Our capabilities include supplying federal government entities and private businesses with software development, scientific and engineering technical assistance, systems integration and enterprise security. Since its founding in 1996, OST has been committed to delivering high-quality … work on, and robust benefits to include technical training and certifications, relocation assistance, and a 401K match with immediate vesting. Open Systems Technologies Corporation is seeking a Mid-Level Information System Security Officer to support IS Security Services. Responsibilities: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and … procedures for each IS Provide liaison support between the system owner and other IS security personnel Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Conduct required IS vulnerability scans according to risk More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSO with Security Clearance

Huntsville, Alabama, United States
Integration Innovation, Inc. (i3)
if they are operating securely and that data is protected from both internal and external threats. The selected candidate will make assessments of assigned systems to determine the system security status and ensures compliance to security policies, procedures and standards with regards to Risk Management Framework (RMF). Additionally, the ISSO will support compliance with software assurance cybersecurity … procedures to include coordination of approval efforts with various Army and DoD organizations and approval authorities. This position is located in Huntsville, AL. Responsibilities Responsible for supporting the Cyber Security Program to include but not limited to Cyber Security policy, procedures, and regulations to assist with identifying potential Cyber Security issues. Monitor, evaluate, and maintain systems and … procedures to safeguard information systems, networks, and databases. Implements, enforces, communicates, and develops security policies or plans for data, software applications, hardware, telecommunications, and information systems security education/awareness programs. Establishes and satisfies system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Spearhead the Integration of More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Mandiant Cloud Security Architect, Mandiant, Google Cloud

United Kingdom
WeAreTechWomen
Minimum qualifications: Bachelor's degree in Computer Science, Information Systems, Cybersecurity or related technical field or equivalent practical experience. 6 years of experience in information security and engineering, working with cloud-based infrastructure environments. 4 years of experience with identity and access management with tech stacks (e.g., Active Directory, GCP, Entra ID, Palo Alto, Cisco), enterprise architecture … skills. Ability to travel up to 30%. About the job In this role, you will be responsible for helping clients effectively prepare to mitigate, and respond to cyber security threats. You will identify enterprise security requirements and provide guidance to enterprise initiatives. You will serve as technical support for security tools and assist with security tool implementation and integration into the customer environment. You will also provide guidance on the development of containment and remediation plans for cyber security incidents. In addition, you will be the technical advocate for information security requirements and provide information of the security domain. You will execute on both strategic and tactical plans, including More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Protection Officer

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
NCC
days on site, 3 days home Salary: £27,630 to £36,551 per annum (experience dependent) Sponsorship: We are unable to consider visa sponsorship on this occasion. Government Security Clearance: You will be required to undertake DV level security clearance if successful securing this role. Please only apply if willing to undertake clearance process. Closing Date for Applications … 15th July 2025 Summary; The NCC is the UKs innovation partner! Were supporting a range of interesting new projects in the defence sector and are hiring for an additional Information Protection Officer to join our expanding secure operations team. The Information Protection Officers role is to ensure that policies and processes for secure operations are in place, communicated … and readily accessible to NCC personnel, contractors and visitors. Youll report into the Information Security Manager. What youll be doing; Youll support secure working across the NCC, working collaboratively with colleagues to provide guidance and develop practical approaches to information protection alongside innovation, engineering and operations. They ensure continuous improvement of policies and process in line with More ❯
Employment Type: Permanent, Work From Home
Salary: £35,000
Posted:

Cybersecurity Architect with Security Clearance

Portland, Oregon, United States
Edgewater Federal Solutions, Inc
The Cybersecurity Architect will play a pivotal role in enhancing the organization's Information Security Continuous Monitoring (ISCM) and Continuous Diagnostics and Mitigation (CDM) programs. The Cybersecurity Architect will lead a team of cybersecurity experts. This position involves researching continuous monitoring methods and tools, developing strategies that align with Federal requirements, and proposing improvements to existing ISCM programs … initiatives, and work with cybersecurity groups and technical teams to implement the DHS CDM Program. Secret or L clearance needed to be considered. Qualifications: Bachelor's degree in Cybersecurity, Information Systems, or a related field. U.S. Citizenship. Preferred candidates will have an active DOE L or DOD Secret clearance (if not active must be able to obtain and maintain … Experience and knowledge of implementing continuous monitoring tools across all systems, networks, and endpoints. Experience in ensuring real-time detection of threats and anomalies through a set of integrated security tools. Experience in deploying automated vulnerability scanning tools to identify and prioritize vulnerabilities. Experienced in establishing an automated process for incident detection, containment, and mitigation. Knowledge in continuously monitoring More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Penetration Tester with Security Clearance

Annapolis Junction, Maryland, United States
CACI
Penetration Tester Job Category: Security Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: The Opportunity: We are seeking an experienced and knowledgeable Penetration Tester to serve as a Subject Matter Expert (SME) for our cybersecurity team. In this role, you will provide … specialized expertise in testing security controls and contribute to the Risk Management Framework (RMF) process. The ideal candidate will have a strong background in penetration testing, network protocols, operating systems, architectures, equipment, and security standards. You will be responsible for leading and participating in security control assessments to identify vulnerabilities and recommend improvements to enhance the security posture of our systems and networks. Key Responsibilities: Perform vulnerability and penetration testing using a wide variety of tools Research and evaluate emerging technologies relevant to information systems security; interpret agency specific and federal security regulations Perform both network and application-level testing using established testing protocols and methods Qualifications: Required: Current Active TS/SCI More ❯
Employment Type: Permanent
Salary: USD 181,800 Annual
Posted:

Senior Vulnerability Assessment Analyst with Security Clearance

Herndon, Virginia, United States
MANTECH
comparative findings between proposed and current technologies. You will coordinate or lead teams to conducts ethical tests, network scans, and/or vulnerability scans that support the evaluation of information safeguard effectiveness, conducting reconnaissance, target assessment, target selection, and vulnerability research. Using COTS tools you will conduct or lead teams to conduct vulnerability assessments, analyzes results, identifies exploitable vulnerabilities … exploitation techniques Apply the MITRE D3FEND framework to develop and implement defensive measures against cyber threats; collaborate with other cybersecurity professionals, law enforcement agencies, and intelligence organizations to share information and coordinate response efforts. Analyze cyber activities to identify entities of interest, determine malicious behavior, and recognize patterns and linkages; conduct dynamic malware analysis and performing memory and dead … box forensics. Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems. Perform long-term and time-sensitive in-depth technical analysis of malicious code (malware), developing defensive countermeasures, and producing reports for dissemination. Minimum Qualifications: Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Planner with Security Clearance

Colorado Springs, Colorado, United States
Goldbelt Inc
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiative Establishing a detailed Execution Plan for each USSF location to include SME contact information, expected visitation length, assets being analyzed, SME contact information, and types of information being collected Analyzes a wide range of mission related cyberspace network activities to ensure … mission success tailored to command, control, operational processes, and dependent space mission systems. Develops mission thread data to support USSF mission owners, cyber security personnel, defensive cyber operators and program offices in assessing acceptable risks to missions caused by cybersecurity deficiencies in systems and programs. Provides mission analysis support to USSF MRT-C teams to analyze USSF Mission Systems … to determine cyberspace dependencies, security risks, mission vulnerabilities, and defense plan measures for each mission system. Qualifications Necessary Skills and Knowledge: Must be able to understand and differentiate between critical and non-critical systems and networks, and capabilities that allow organizations to defend better, react faster, coordinate rapidly, prioritize efforts, and respond smarter to security events, increased risks More ❯
Employment Type: Permanent
Salary: USD 140,000 Annual
Posted:
Information Security
10th Percentile
£33,000
25th Percentile
£47,500
Median
£65,000
75th Percentile
£78,750
90th Percentile
£100,000