Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Gordons
You don't need to be a lawyer to be a leader in this supportive and inclusive professional environment. Just be yourself. And start by being a totally uniqueInformation Security Graduate. ABOUT ADDLESHAW GODDARD As an international law firm working for many thousands of leading organisations in over 100 countries, we don't deal in typical problems, typical solutions … Manchester, Leeds and Edinburgh offices but they support the entire global business. These teams all work closely together to find innovation solutions and provide the best possible service. The InformationSecurity team is instrumental in ensuring the firms security certifications are compliant and all regulations are in place. Our two-year InformationSecurity Graduate programme … is designed to equip you with the knowledge, skills and experience to become an InformationSecurity specialist in a large organisation. Based in our Manchester office, you will gain hands on experience with our InformationSecurity team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Tussell Limited
You don't need to be a lawyer to be a leader in this supportive and inclusive professional environment. Just be yourself. And start by being a totally unique InformationSecurity Graduate. The IT teams are Addleshaw Goddard are located across our London, Manchester, Leeds and Edinburgh offices but they support the entire global business. These teams all … work closely together to find innovation solutions and provide the best possible service. The InformationSecurity team is instrumental in ensuring the firms security certifications are compliant and all regulations are in place. Our two-year InformationSecurity Graduate programme is designed to equip you with the knowledge, skills and experience to become an InformationSecurity specialist in a large organisation. Based in our Manchester office, you will gain hands on experience with our InformationSecurity team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and Compliance, Security Certifications, Supplier Due Diligence, Incident Response and Awareness, and Security Awareness More ❯
Lead Security Engineer Department: Cybersecurity Location: Washington, DC - Onsite Role Type: Contract Clearance: Public Trust About Our Client Our client supports the cybersecurity mission of a major government agency responsible for managing and maintaining United States critical infrastructure including highways, bridges, roads, and airports. The cybersecurity team is dedicated to collaborating, cooperating, and facilitating the maintenance and enhancement of … the security posture of government information systems and underlying infrastructure that support critical national operations. Job Description As a Lead Security Engineer, you will assist the government agency's cybersecurity mission by supporting the implementation of IPv6 networking capabilities. You will join a dedicated team of cybersecurity professionals focused on maintaining and enhancing the security posture … of critical information systems and their supporting infrastructure. Your primary focus will be on IPv6 security implementation, working with federal leadership and counterparts to design, implement, and maintain secure network architectures. You'll collaborate with network, system, and application administrators to troubleshoot IPv6 security-related issues while supporting regular assessments to identify potential vulnerabilities and develop mitigation More ❯
ManTech seeks a motivated, career and customer-oriented Senior Cyber Security SIEM Specialist to join our team in the DC, Maryland, and Virginia (Northern) DMV area . In this role you will be an expert in SecurityInformation and Event Management (SIEM) systems, responsible for designing, implementing, and maintaining SIEM solutions to protect DHS's networks and … information systems from cyber threats. Responsibilities include, but are not limited to: Develop and implement the enterprise SecurityInformation and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms Configure tools … settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) capabilities. Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.) Monitor security events and alerts, conducting detailed analysis to identify potential security incidents Participates in response More ❯
Cyber Security Architect Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: J oin CACI as the prime contractor on a growing program supporting NAVSEA 03D3 Digital Program Office as a Cyber Security Architect supporting … Enterprise Solution (NMMES), a mission-critical program that supports over 45,000 users executing naval ship and submarine maintenance operations worldwide. Key Responsibilities: Perform specialized technology tasks related to Information Assurance requirements Conduct security assessments and provide security consulting services Analyze informationsecurity requirements for complex systems Apply DoD and DoN Information Assurance rules … and regulations Design, develop, and implement solutions to Multilevel Security (MLS) requirements Gather and organize technical information about organizational mission goals, needs, and security products Perform risk analyses and assessments Provide technical support for secure software development and integration tasks Review work products for correctness and adherence to security standards Work with Security/IA More ❯
Security Administrator Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: As a Security Administrator on EITaaS, you will play a crucial role in fortifying our risk posture by identifying, assessing, and mitigating vulnerabilities across … our classified systems. You will be at the forefront of developing and implementing strategies to proactively address potential threats, ensuring the integrity and security of our digital infrastructure. You will work closely with the Nessus team in developing scan policies, frequency, and alignment with the DAF. You will report status and updates to the Program InformationSecurity … CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. Responsibilities: Vulnerability Management: Conduct regular vulnerability assessments to identify and prioritize potential security risks. Collaborate with cross-functional teams to analyze and interpret vulnerability scan results. Communicate response plans and POA&MS with the DAF organizations. Risk Assessment: Evaluate the severity and More ❯
NS2 COMPANY DESCRIPTION SAP is the global market leader for business software and related services. SAP National Security Services Inc. (SAP NS2 ) is an independent U.S. subsidiary of SAP. At SAP NS2, we leverage best-in-breed technologies engineered by SAP to protect the lives, assets and information of Americans. We offer SAP solutions with specialized levels of … security and support to meet the requirements of U.S. national security and critical infrastructure customers. Must be a U.S. Citizen with active TS/SC with Poly; NS2 does not offer Visa sponsorships for this role. All internals must have manager's approval to transfer. POSITION OVERVIEW The NS2 Intel Senior Cloud Security Engineer candidate will be … our client's complex needs. This position is located onsite in Chantilly, VA. Candidate should be hands-on and has the necessary knowledge of cloud-based systems and associated security principals to effectively work with minimal supervision in a cloud environment, understanding the complexities that come with cloud, and can effectively communicate cloud design/architecture ideas to technical More ❯
LTS is seeking an experienced Senior Security Engineer to support the program with the Department of Commerce. This role involves identifying vulnerabilities, assessing risks, and ensuring the security and compliance of all technical assets across the department. The Senior Security Engineer will work closely with various stakeholders, both internal and external, to implement best practices for cybersecurity … serve a broad constituency of clients that range from cabinet-level departments of the U.S. Government to the largest Federal IT contractors in the world. LTS is a leading information technology (IT) provider for mission critical systems leveraging the latest technologies to deliver cutting edge solutions from small mobile applications to large, complex enterprise applications. Our professionals specialize in … governance across all applicable programs. Provide cybersecurity engineering subject matter expertise to client staff. Participate in technical review boards and program planning sessions, contributing to enterprise architecture decisions and security control implementation. Develop and deliver technical guidance via PowerPoint presentations, formal documentation, and written communications on cybersecurity capabilities, vulnerabilities, risks, and mitigation strategies. Engineer, configure, and sustain the Continuous More ❯
OVERVIEW: This role is responsible for leading Risk Management Framework and other Cyber Security controls evaluations as required for ensuring the effectiveness of security controls within an organization. Serve as the lead SCA and assist the RMF lead in managing the distribution of RMF projects and reporting status on completion efforts of each SCA team member. Their technical … functions encompass a range of tasks aimed at assessing, testing, and validating security measures to identify vulnerabilities and enhance overall security posture. GENERAL DUTIES: Security Controls Assessment Planning: Develops comprehensive assessment plans based on established security standards, frameworks (e.g., NIST SP 800-53, ISO 27001), and regulatory requirements. Define assessment scope, objectives, methodologies, and timelines. Security Controls Testing: Conduct rigorous technical testing of security controls across various domains such as access control, cryptography, network security, and incident response. Use automated tools, manual techniques, and specialized testing methodologies to identify weaknesses and vulnerabilities. Vulnerability Scanning and Analysis: Perform vulnerability scans using automated scanning tools to identify potential security flaws in systems, networks, and More ❯
LOCATION: Full-time, onsite in Herndon, VA REQUIRED: TS/SCI with Full Scope Polygraph SKILL LEVEL: Subject Matter Expert Are you a visionary Cyber Security Architect passionate about building robust, future-proof security infrastructures? We are seeking highly skilled and experienced individuals to design, implement, and maintain security architecture, while safeguarding critical assets and data against … Services, Oracle Cloud, Google Cloud, IBM Cloud, or Microsoft Azure cloud architecture. Utilizing or reviewing cross domain technology and common architecture designs. Consulting project teams on system architecture and security posture. Continuous monitoring requirements to include scan analysis for critical or high findings with common scan tools such as Rapid 7, Nessus, and Qualys. Creating, monitoring, or closing system … Utilizing compliance tools to track assessment and authorization activities such as Xacta 360, Risk Vision, RSA Archer. Using the common control provider concept within the NIST Risk Management Framework. Security control assessments to include working with SCAs and preparing security packages for SCAs. Conducting information system security engineering activities. Highly Desired Qualifications Other skills and demonstrated More ❯
Information System Security Engineer Fairfax, VA or Greenwood Village, CO Job Description: Seeking an Information System Security Engineer (ISSE). The role of the ISSE is to bridge the gap between high level security policies/requirements and technical/operational implementation of those requirements. Candidates should have in-depth understanding of the cybersecurity policies … and procedures for Government (DoD, Intelligence Community) sectors information systems and sufficient technical knowledge and experience to implement them. The ISSE will work closely and effectively with the Information System Security Manager (ISSM) ISSM, and the Program Manger on all aspects of their development and implementation programs. Candidates should have in-depth understanding of the cybersecurity policies … positive attitude and good customer service skills in sometimes stressful situations, such as during outage troubleshooting and resolution. Required Skills: Information Assurance (IA) and InformationSecurity (InfoSec) experience working with Intelligence Community (IC) customers, which includes developing and reviewing security concept of operations, systems security plans, security control assessments, contingency plans, configuration management More ❯
One of our premier clients has an immediate need for a full-time Information System Security Engineer (ISSE) to work on-site at their headquarters location in Fairfax, VA. A successful candidate must have a TS/SCI w/CI Poly clearance to be considered for this position. Job Description: Seeking an Information System Security Engineer (ISSE). The role of the ISSE is to bridge the gap between high level security policies/requirements and technical/operational implementation of those requirements. Candidates should have in-depth understanding of the cybersecurity policies and procedures for Government (DoD, Intelligence Community) sectors information systems and sufficient technical knowledge and experience to implement them. … positive attitude and good customer service skills in sometimes stressful situations, such as during outage troubleshooting and resolution. Required Skills: Information Assurance (IA) and InformationSecurity (InfoSec) experience working with Intelligence Community (IC) customers, which includes developing and reviewing security concept of operations, systems security plans, security control assessments, contingency plans, configuration management plans More ❯
you will use your expertise in Host Based Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and specialized network defense to provide innovative and creative solutions to challenging cyber security problems. Manage and administer the tuning of rules, signatures, and custom content for CND applications and systems. Identify potential conflicts with implementation of any CND tools within the enterprise … and develop recommendations to remediate these conflicts. You will utilize the latest cyber tools available and assist with creating new ones while allowing you to advance the nations informationsecurity posture. Responsibilities include, but are not limited to: Provide malicious code detection, intrusion detection, and informationsecurity tool development and integration. Utilize forensic analysis to identify … report on virus and malware alerts or incidents to determine root cause, entry point of code and damage risk. Analyze all data sources, including Internet, Intelligence Community (IC) reporting, security events, firewall logs, and other data sources to identify malware, misuse, unauthorized activity or other cyber security related concerns. Track intelligence using open source and classified sources to More ❯
interfaces with other incident response centers in maintaining an understanding of threats, vulnerabilities, and exploits that could impact networks and assets. Perform the role of Incident Coordinator for IT Security events requiring focused response, containment, investigation, and remediation. Perform real-time proactive event investigation on various security enforcement systems, such as SIEM, Anti-virus, Internet content filtering/… reporting, malcode prevention, Firewalls, IDS & IPS, Web security, antispam, etc. Assist with forensic analysis on hosts supporting investigations. Conduct malware analysis in out of-band environment (static and dynamic), including complex malware. Analyze operational anomalies, network behavior and perform mitigation actions derived from cyber threat monitoring and anomaly analysis, and actively monitor the networks for cybersecurity threats and vulnerabilities. … incident detection and response processes. Minimum Qualifications: 10+ years of experience in cybersecurity, with a focus on incident detection and response and a Bachelor's degree in computer science, information technology, cybersecurity, or a related field of study (or equivalent experience). One of the following relevant certifications: Certified Information Systems Security Professional (CISSP), Certified Incident Handler More ❯
What does a Strategic Cyber Security Advisor do at SecWise? As our Cybersecurity Strategist, you'll bridge cybersecurity practices with our strategic business objectives, ensuring a comprehensive approach to managing cyber risks. Key Responsibilities: Develop and Implement Security Roadmap/Strategy Craft a comprehensive informationsecurity strategy that aligns with our customer's business objectives. Establish … security policies, standards, and procedures to safeguard their assets. Create roadmaps for implementing our customer's security program and enhancing their security posture. Risk Management Conduct risk assessments and develop mitigation strategies to proactively address possible threats and vulnerabilities. Develop incident response plans and protocols to effectively respond to security incidents. Culture & Awareness Implement security awareness and training programs to educate employees about cybersecurity best practices. Organize security drills and tabletop exercises to test our customer's incident response capabilities. Security Operations Oversee the continuous monitoring and detection of security threats and vulnerabilities to ensure a proactive stance to security. Lead the investigation and resolution of security incidents, promptly and More ❯
IT Security Engineer - prem AD, EntraID, M365, IDAM solutions, SentinelOne, CrowdStrike, Defender, Routing/Switching, WAN, Wi-Fi, Cisco Our leading global law firm client are recruiting for an IT Security Engineer (prem AD, EntraID, M365, IDAM solutions, SentinelOne, CrowdStrike, Defender, Routing/Switching, WAN, Wi-Fi, Cisco) on a 12 month fixed term contract basis to support … the InformationSecurity team to ensure continuous security improvement. The Security Engineer will report to InformationSecurity Operations Manager and work with the InformationSecurity Operations team for implementing and maintaining our security controls and tools. Work collaboratively with other departments to improve our security posture. They will be specifically … responsible for completing the implementation of a number of strategic based security solutions for new security tooling or existing. The engineer will also participate in security related service management processes (incident, change and problem management) and will participate in the planning, design, enforcement and review of security controls which protect the integrity of the firm. Essential More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Aerospace Corporation
our team, you'll be part of a special collection of problem solvers, thought leaders, and innovators. Join us and take your place in space. Job Summary The Chief InformationSecurity Office (CISO) is chartered with securing enterprise information systems and data to deliver mission success. We are looking for an experienced Senior Cybersecurity Engineer to utilize … threat intelligence to defend against cyber threat and increase the overall security of the corporation by implementing innovative technical solutions. If you have enterprise experience securing information systems, a passion for cybersecurity and the ability to critically analyze threats and implement defensive solutions, consider joining our team of dedicated cybersecurity professionals. The Cybersecurity Operations & Engineering staff utilize a … robust set of information technology including AI and Machine Learning to combat cyber threats while working with internal and external partners to address business and government requirements. Work Model This is a full-time position based in Chantilly, VA or Colorado Springs, CO offering a hybrid work model that combines a minimum of 3 regular onsite workdays and remote More ❯
Washington, Washington DC, United States Hybrid / WFH Options
CGI
opportunity for a Senior Cybersecurity ISSO Analyst to join a dynamic new program for one of our Federal Government clients. You will be part of a team of cyber security professionals working to improve the security posture for our client by evaluating systems and identifying and helping to mitigate cyber risks. At a high level, you will be … alert description and recommendation is clearly articulated to technical and management personnel - Develop proper response actions as part of guided response to DOJ, in the context of a specific security incident - Engage with DOJ to guide through a response action - Develop possible remediation plan(s) for a specific security incident. Document as part of the playbook. - Develop response … government department or agency cloud based systems -Strong knowledge of Cybersecurity best practices -Strong verbal and written communication skills At least 2 of the following certifications are required: -Certified Information Systems Security Professional (CISSP) -Certified InformationSecurity Manager (CISM) -Certified Governance, Risk and Compliance (CGRC) -Certified in Risk and Information Systems Control (CRISC) -InformationMore ❯
We are seeking a dedicated and experienced professional with a strong foundation in cybersecurity, a comprehensive understanding of current threats and vulnerabilities, and the ability to implement cutting-edge security measures. In this role, you will contribute to the development, deployment, and maintenance of cybersecurity infrastructure while staying current with evolving trends in the field. Responsibilities Design, implement, and … manage advanced security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to safeguard networks and systems. Conduct routine security assessments to identify and address vulnerabilities and weaknesses across networks, applications, and systems. Develop and execute incident response plans to handle and mitigate security breaches effectively. Collaborate with teams across IT, development, and … compliance to establish and enforce robust security policies and procedures. Monitor network activity, system logs, and security alerts to detect and respond to potential threats promptly. Investigate and analyze security anomalies and breaches, taking appropriate steps to minimize risks. Integrate security best practices into all stages of the development lifecycle, ensuring comprehensive protection for organizational assets. More ❯
Position Description: CGI Federal has an exciting opportunity for an InformationSecurity Specialist Officer (ISSO) within our Intel sector advancing the national security mission through cutting edge technology. You must have a passion for keeping pace with rapidly evolving technology advancements and leveraging your knowledge on a highly collaborative team to deliver state-of-the-art capabilities. … You will be responsible for protecting the organization's information assets by developing, implementing, and maintaining security measures. This includes monitoring networks, investigating security breaches, implementing security protocols, and educating employees on security best practices. In essence, your responsibilities will include ensuring data confidentiality, integrity, and availability by safeguarding digital files and vital electronic infrastructure. … a collaborative, fast-paced, outcome-driven mission. This position is located in our Washington DC office Your future duties and responsibilities: Monitoring and Investigation: Monitor networks and systems for security breaches, investigate incidents, and analyze security breaches to determine the root cause and impact. Security Implementation: Implement security measures like firewalls, data encryption, and intrusion detection More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
build on this momentum, advancing the National Energy System Operator's (NESO) plan for zero carbon operability of the electricity system by 2025. We are seeking an experienced Senior Security Architect to work across all programme workstreams, reporting to the Enterprise Security Architect. This role involves designing secure solutions fit for the future, ensuring NESO's long-term … success. The Senior Security Architect will not only be hands-on when designing architectures, reviewing proposals, designs, and preparing documentation but will also support the Enterprise Security Architect by ensuring that the overall security strategy and policies are considered throughout the design and build process. The Senior Security Architect will play a crucial role in promoting … collaboration among various teams, eliminating siloed workflows, and integrating secure design principles along with other critical security protocols across different stages of the delivery lifecycle. In this role, you will regularly attend the Security Architecture Group meetings, contributing to the development of essential architecture strategies and patterns for NESO. Building and managing relationships with the business is key More ❯
This position offers a unique opportunity to shape the security architecture of an organization at the forefront of technology. You will have the freedom to innovate security solutions, influence strategic decisions, and work with cutting-edge technologies. Ideal for a seasoned professional looking to make a significant impact on our security posture and lead initiatives that protect … our digital assets. Responsibilities Security Architecture: Architect secure solutions that meet both functional and security requirements, integrating security into system designs from the ground up. Strategy Formulation: Develop and update the security architecture strategy, ensuring alignment with business goals and compliance with industry standards. Risk Management: Perform detailed risk assessments, threat modeling, and vulnerability analyses to … guide security architecture decisions. Implementation Oversight: Oversee the implementation of security controls, ensuring they are effective and scalable across our infrastructure. Technology Leadership: Lead the evaluation, selection, and integration of security technologies, ranging from identity management to network security and cloud security solutions. Collaboration: Work closely with development, operations, and executive teams to ensure securityMore ❯
Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Boca Raton FL Background Oversee daily SOC activities, ensuring prompt detection and resolution of security incidents for our healthcare-focused clients Manage, mentor, and develop a diverse SOC team of Tier 1, 2, and 3 analysts Coordinate incident response efforts, working closely with internal … to determine root causes and implement corrective actions Regularly review and enhance SOC processes, including playbooks, response protocols, and threat hunting strategies Requirements Bachelor's degree in Computer Science, InformationSecurity, or a related field. 6+ years of cybersecurity experience, with at least 2 years in a SOC leadership role Expertise in cybersecurity frameworks (e.g., MITRE ATT&CK … NIST, CIS), incident response, and threat intelligence In-depth knowledge of security operations, including SIEM, EDR, IDS/IPS, malware analysis, and vulnerability management Strong background in cloud security operations and monitoring across AWS, Azure, and GCP Preferred Proven success in incident resolution within SLAs and based on severity. Experience in threat hunting, digital forensics, or malware analysis. More ❯
With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients. Our cybersecurity operators are experts at assessing and defending mission-critical data and the networks that facilitate their operation. … talented and mission-driven Senior SOC Analyst with Test Access Point (TAP) experience to join our team in Washington, D.C. This role plays a vital part in protecting national security infrastructure by identifying, analyzing, and responding to complex cyber threats. The Senior SOC Analyst will lead efforts in threat detection, packet analysis, and incident response, while mentoring junior analysts … law enforcement, and other partners in secure environments Maintain strict adherence to classification protocols and data handling procedures Additional duties as assigned Requirements Education: Bachelor's degree in Cybersecurity, Information Systems, or a related technical field is preferred. Equivalent military or professional experience may be considered in lieu of a degree. Certificates: Minimum Required Certification: DoD 8140/ More ❯
Position Overview: We are seeking an Information Systems Security Officer (ISSO) to support cybersecurity and information assurance activities at Eglin AFB. The ideal candidate will help ensure the confidentiality, integrity, and availability of mission-critical systems by implementing and managing security controls in compliance with Department of Defense (DoD) cybersecurity policies and standards. Key Responsibilities: Develop … implement, and maintain security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. Participate in security audits, inspections, and assessments. Collaborate with system administrators, engineers, and program teams to ensure secure system design and operations. Support incident response by documenting and coordinating response actions. Provide recommendations to improve system security posture and support security awareness initiatives. Required Qualifications: Active Secret clearance (or higher). Current CompTIA Security+ certification More ❯