COMSEC Custodian II Who is Epsilon: Epsilon is an IT Services company that was founded in 2009 and has become an established leader in providing Information Technology services to both Federal Government and Commercial businesses across the United States. Epsilon is known for its solution-focused and innovative approach, aligning technology systems, tools, and processes with the missions and … work: You will be working onsite at our customer's Manassas, VA location. Our Customer's Mission: Team Epsilon has been chosen to deliver full-spectrum IT and Cyber Security support to a critical and enduring multinational organization within the United States Department of Defense. This DoD organization manages the resourcing, development and sustainment of one of our nation … partners and foreign military sales (FMS) clients, providing top-tier desk-side support, and offering adaptable enterprise infrastructure solutions. Our services, ranging from systems administration and network engineering to Informationsecurity and data center management, are essential to the mission's success, so we're looking for team members who are committed to delivering excellence without compromise and More ❯
COMSEC Custodian II Who is Epsilon: Epsilon is an IT Services company that was founded in 2009 and has become an established leader in providing Information Technology services to both Federal Government and Commercial businesses across the United States. Epsilon is known for its solution-focused and innovative approach, aligning technology systems, tools, and processes with the missions and … You will be working onsite at our customer's Crystal City, VA location. Our Customer's Mission: Team Epsilon has been chosen to deliver full-spectrum IT and Cyber Security support to a critical and enduring multinational organization within the United States Department of Defense. This DoD organization manages the resourcing, development and sustainment of one of our nation … partners and foreign military sales (FMS) clients, providing top-tier desk-side support, and offering adaptable enterprise infrastructure solutions. Our services, ranging from systems administration and network engineering to Informationsecurity and data center management, are essential to the mission's success, so we're looking for team members who are committed to delivering excellence without compromise and More ❯
performance and interface requirements Implement specific network solutions to support server requirements to include load-balancing, VPN's, firewall contexts, Traffic Shaping Voice over IP (VoIP), GRE Tunneling, IP Security (IPSec), IP Encryption, Media over IP (MoIP), and network address translation (NAT) where appropriate. Configure and maintain organization's network diagrams and accreditations. Oversee the support to all network … and installation projects of dynamic requirements and scale. Develop algorithms for models using networking and/or telecommunications technologies and systems. Qualifications: A Master's degree in Computer Science, Information Assurance, InformationSecurity Systems Engineering, or a related discipline from an accredited college or university and ten (10) years of relevant professional experience providing Network Engineering support … and training commensurate with network engineering curriculums. Alternatively, this requirement may be satisfied with: Bachelor's degree from an accredited college or university in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline and Twelve (12) years of relevant professional experience providing Network Engineering support. High School diploma and Twenty (20) years of relevant professional More ❯
I'm looking for a Head of Cyber Security to join a dynamic PE-backed business, and lead enterprise efforts across IT Security, Cyber Security and Information Security. Reporting directly into their CIO, you will lead a team of 4 and will drive the overall security strategy of the business forward - ensuring that security controls, policies and technologies effectively protect the organisation's assets, infrastructure and data. They are using the MS Security Stack including Defender, Sentinel and Entra ID, and are very ahead-of-the-curve in their respective sector. The ideal candidate will have come from a hands-on Engineering background, who loves being technically in the detail. This role … will involve collaborating with the Senior Leadership Team, and providing expert guidance on threat mitigation and security best practices, and ultimately driving the organisation's security programme forward. Whilst they are based in London, they are open to considering candidates across the UK, with travel into London around once or twice a month depending on where you live More ❯
Provide a process that integrates risk management activities into the system life cycle process. Perform and complete organizational and management tasks that support the government cyber mission efforts. Manage informationsecurity, systems, enclave risk across the organization. Manage risks, risk mitigation plans and strategies, deadlines and progress across Technical Task Orders and leadership to ensure mission priorities are … Agile Scrum methodology. Three (3) years direct experience with an intelligence community or signals intelligence activity is desired. A Bachelor's degree in Business Management, Computer Science, Electrical Engineering, Information Management, Program Management, or a related business or technical degree from an accredited college or university. In lieu of a Bachelor's degree an additional four (4) years may … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DoD 8570 compliance with IAM II is required. This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in More ❯
Provide a process that integrates risk management activities into the system life cycle process. Perform and complete organizational and management tasks that support the government cyber mission efforts. Manage informationsecurity, systems, enclave risk across the organization. Manage risks, risk mitigation plans and strategies, deadlines and progress across Technical Task Orders and leadership to ensure mission priorities are … Agile Scrum methodology. Five (5) years direct experience with an intelligence community or signals intelligence activity is desired. A Bachelor's degree in Business Management, Computer Science, Electrical Engineering, Information Management, Program Management, or a related business or technical degree from an accredited college or university. In lieu of a Bachelor's degree an additional four (4) years may … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DoD 8570 compliance with IAM II is required. This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in More ❯
all significant IT operational and application issues. Identify new capabilities and potential customers to expand business opportunities. Develop and present reports on IT performance, system uptime, Helpdesk efficiency, and security compliance to leadership and stakeholders. Lead and Optimize Helpdesk Operations Oversee and enhance Helpdesk services to ensure efficient, high-quality support for end users. Implement best practices in ticket … conduct performance evaluations, and establish comprehensive training plans. Allocate resources effectively to balance workloads across the team. Ensure IT Infrastructure Excellence Maintain the stability, integrity, and efficient operation of information systems. Design and manage both on-premises and cloud-based IT infrastructure, including servers, storage, networks, and related technologies. Implement an IT systems management framework to drive operational excellence. … to enhance operational efficiencies through automation and process improvements. Evaluate risks and implement improvements to existing and proposed projects, programs, and policies. Champion Cybersecurity Compliance Work closely with the informationsecurity team to ensure infrastructure security controls are effectively implemented. Develop and enforce IT policies and procedures, including those for architecture, security, disaster recovery, standards, purchasing More ❯
Engineer develops, maintains, and enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements. Works individually or as part of a team. Reviews and tests software components for adherence to the design requirements and documents test results. Resolves … accordance with the constraints of the software development process being used on any particular project Confer with system engineers and hardware engineers to derive software requirements and to obtain information on project limitations and capabilities, performance requirements and interfaces Coordinate software system installation and monitor equipment functioning to ensure operational specifications are met Recommend new technologies and processes for … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: None This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Columbia Technology Partners
Engineer develops, maintains, and enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements. Works individually or as part of a team. Reviews and tests software components for adherence to the design requirements and documents test results. Resolves … accordance with the constraints of the software development process being used on any particular project Confer with system engineers and hardware engineers to derive software requirements and to obtain information on project limitations and capabilities, performance requirements and interfaces Coordinate software system installation and monitor equipment functioning to ensure operational specifications are met Desired Skills: Strong C and Java … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DOD 8570 Certification This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is More ❯
Intelligence Community customer. All the personnel on the team will work together to support innovative design, engineering, procurement, implementation, operations, sustainment and disposal of user facing and data center information technology (IT) services on multiple networks and security domains, at multiple locations worldwide, to support the IC mission. The right candidate will possess the below skills and qualifications … lifecycle of the organizations Active Directory forests, domains, and Domain Controllers. Delivers and implements a secure, scalable, and resilient Active Directory design, following industry best practices while adhering to InformationSecurity standards. Provides technical assistance and escalation support for all troubleshooting tasks related to AD, including but not limited to integration with Windows and non-Windows endpoints, authentication More ❯
end users Collaborate with engineers on systems integration efforts Optimize system operations and resource utilization, and perform system capacity analysis and planning Conduct data captures to obtain network performance information Implement specific network solutions to support server requirements to include load-balancing, VPN's, firewall contexts, and network address translation (NAT) where appropriate Qualifications: Ten (10) years' experience as … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DoD 8570 compliance with IAT Level I or higher is required. This position requires an active Security Clearance with appropriate Polygraph. About … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
of customer requirements relevant to database migration, troubleshooting, performance observation and tuning. Experience with the production and deployment of RAC, RMAN backup & recovery - desired Experience with Oracle Exadata, DB security, Data Guard and/or DB Vault, Oracle Enterprise Manager Cloud Control, label security, and data migration - desired BS in CS or related course of study, or equivalent … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DOD 8570 Certification This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical … eMASS packages using vendor and organization provided information. Assist and advise product offices on DoDRMF continuous monitoring requirements. Using DoD Risk Management Framework, candidates must be able to determine security requirements by evaluating business strategies and requirements; researching informationsecurity standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; assist PM … ASE SME's in identifying integration issues andpreparing cost estimates. creating, completing, and completing documentation and artifacts in support of continuous monitoring activities. Verifies security systems by by using DoD approved technologies such as STIG/ACAS/Static Code Analysis. Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing More ❯
Senior Cyber Security Risk Specialist – Make This Role Your Own! 3 days a week on-site in London or Crawley Circa £75K + up to 15% bonus + 10% pension + guaranteed annual salary increases Are you passionate about Cyber Security Risk and ready to play a key role in shaping a GRC function from the ground up … a business that’s right at the beginning of its cyber journey. With offices in both London and Crawley, they’re looking to build a best-in-class cyber security function and you’ll be right at the heart of that transformation. This isn’t a tick-box auditing role. It’s hands-on, it’s strategic, and it … best part? This role has space to be shaped by you. There are, of course, some core responsibilities, including: What You’ll Be Doing: Risk Management: Carry out cyber security risk assessments using the company’s risk framework, identifying key issues and tracking remediation actions. Communicate risks and treatments clearly to internal and external stakeholders. Reporting & Metrics: Create meaningful More ❯
of customer requirements relevant to database migration, troubleshooting, performance observation and tuning. Significant experience with the production and deployment of RAC, RMAN backup & recovery. Experience with Oracle Exadata, DB security, Data Guard and/or DB Vault, Oracle Enterprise Manager Cloud Control, label security, and data migration. Must be an independent worker with strong communications skills. Qualifications … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DOD 8570 Certification This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
system backups and database archive operations Conducts hardware and software audits of workstations and servers to ensure compliance with established standards, policies, and configuration guidelines Ensures that performance and security of computers meet the needs of network users May evaluate existing systems and assist with planning long-term strategies May coach and provide guidance to less-experienced professionals Qualifications … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: Compliance with IAT Level 2 is required (Security+ CE) This position requires an active Security Clearance with appropriate Polygraph. About us: Founded … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
Senior Manager, Cyber Security Assessment & Testing CCO Senior Manager, Cyber Security Assessment & Testing CCO Senior Manager, Cyber Security Assessment & Testing CCO Senior Manager, Cyber Security Assessment & Testing CCO The GCIO Chief Control Office (CCO) team plays an important role in enabling the bank to operate within its risk appetite by ensuring efficient and effective risk and … with the CISO CCO to oversee the risk and control portfolio related to the services Cybersecurity Assessment and Testing (CSAT) provides to the Group. CSAT oversees Vulnerability Management, Application Security, Penetration Testing and Red Teaming, Threat Modelling and other related services You will be a leader within the GCIO Chief Control Office (GCIO CCO) Function that directly supports the … successful in this role you should have the following skills: Technical: One or more or the control capabilities in the domain (Vulnerability Management, Penetration Testing and Red Teaming, Application Security, Threat Modelling) Management of operational risk, non-financial risk and/or technology and informationsecurity risk Management of diverse risk types Identifying, defining and solving problems More ❯
applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DOD 8570 Certification with IAT Level 2 Compliance (i.e., Security+ CE) This position requires an active Security Clearance with appropriate Polygraph. About … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our … Opportunity Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. Our EEO policy reflects our commitment to ensure equality and promote diversity and inclusion More ❯
applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned, Service … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our … Opportunity Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. Our EEO policy reflects our commitment to ensure equality and promote diversity and inclusion More ❯
Senior you will help ensure today is safe and tomorrow is smarter. Our work depends on Systems Administrator Senior joining our team to support the US Army Intelligence and Security Command (INSCOM). HOW A SYSTEMS ADMINISTRATOR SENIOR WILL MAKE AN IMPACT Operate and sustain the on-going daily operational use of a VMware infrastructure including updating, testing and … and deployment of new software releases. Manage and administer physical and virtual servers, primarily Windows and Linux servers Support and management of server virtualization, server provisioning, physical server maintenance, security compliance and daily operations Manage VMware vSphere, with emphasis on automation, and enterprise storage and backup system administration, installation and on-going maintenance experience. Maintain server lifecycle - provisioning, maintenance … virtualized server environment via configuration, implementation, management and support activities Monitor the virtual server infrastructure environment's health status, service performance, and utilization Implement and maintain continuous compliance to informationsecurity policies and technical standards, report and remediation of non-compliances Maintain the security baseline compliance via configuration, implementation, and remediation activities Apply regular security patches More ❯
we're building the next generation of digital health - AI-powered, privacy-first, clinically backed - to help our users know their body better. The job Your role as the Security Engineer will be pivotal in supporting Flo Health's overall security posture. Working alongside our small but powerful Security team, you will help protect our applications and … infrastructure by managing vulnerabilities, responding to incidents, and implementing security measures at scale. You'll also contribute to developing custom tooling and embedding security best practices into our product lifecycle to ensure we stay ahead of emerging threats. What you will do: Developing regular touchpoints with key stakeholders. Manage Vulnerabilities: Triage newly discovered vulnerabilities, investigate potential risks, verify … that fixes are effective, and drive remediation efforts across teams. Implement Security Measures: Support teams by configuring WAF rules, setting rate limits, and deploying additional controls to protect our environment. Develop Custom Security Tooling: Contribute to the creation and maintenance of in-house tools that enhance our security capabilities and automation. Product Security Support: Assist in More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Bowerford Associates
to promote the use of technology throughout the business. In this role you will be responsible for the following: Designing and deploying network services in line with design and security policies. Monitoring and administering the installation and integration of corporate network communications, including routers, switches, firewalls, DMZ, servers, telephony and LAN/WAN communication services. Managing the IP space … testing failover of critical operational services. Researching latest networking developments and recommend any actions that will improve network performance and security. Work closely with NIBE SOC Teams and internal Security Engineers to ensure all preventative security measures are implemented. Ensuring all network hardware assets are identifiable and updated in the asset management system. Providing technical support to the … including network schematics, of all relevant systems. Assisting with the build, deployment and administration of desktop, mobile and peripheral hardware equipment. Administration of MS Windows Active Directory including profiles, Security Groups and Group Policies. Assist with the management of multiple firewall hardware and security policies. Person Specification A computer related degree or relevant professional certification and accreditation is More ❯
Primary Details Time Type: Full time Worker Type: Employee Cyber Security Consultant Permanent London/Hybrid At QBE, our purpose is to enable a more resilient future. We are an international insurer and reinsurer with a local presence in 27 countries. The opportunity We're hiring a Cyber Security Consultant on a permanent, full-time basis based in … London, where you’ll help shape how cyber and informationsecurity risks are understood and managed across our business. This is your chance to be part of a global team that’s always one step ahead - keeping QBE safe, secure, and resilient in a fast-moving digital world. Your new role: This is a hands-on, collaborative role … where your curiosity and technical insight will help drive real change. Reporting to the Cyber Security Lead, you’ll work across teams and borders to ensure security is built into everything we do; from day-to-day operations to major transformation projects. Main responsibilities: Leading security assurance, assessments, and advisory for IT and business projects (both Cloud More ❯
organizations to achieve positive results for program entities, Directorate Customers, and Industry Partners. This is a high-impact position offering significant opportunities for professional growth and contribution to national security objectives. Key Responsibilities Provide Systems Engineering and Project Management expertise, focusing on service delivery improvements. Develop innovative Systems Engineering solutions to resolve complex problems using limited and disparate information. … Desired Experience Expert knowledge and application of advanced technical principles within the ITIL Framework Service Transition process. Experience with AWS and other cloud technologies. Experience with the client's InformationSecurity Certification and Accreditation (C&A) and Assessment and Authorization (A&A) processes. Experience configuring systems to meet customer security requirements. Experience developing and coordinating system-to More ❯
recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. Our National Security Team supports the Intelligence Community by providing, operating and assuring critical voice, video and collaboration services for the full spectrum of operations. AT&T has an opening for a … for government contracting efforts, including contract bidding, acquisition, modifications, statement of work development, and other program management activities. Work cross-functionally with program leads in business, finance, operations, technical, informationsecurity, property management, and contracts to identify, evaluate, and mitigate program risks. Serve as a backup participant in Risk, Issue, and Opportunity (RIO) Board meetings and oversee the … to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations More ❯