global football club. We are excited to bring in passionate people who share our vision and drive for success. The Role: We are looking for a highly skilled Senior InformationSecurityEngineer with deep expertise in security tooling across both on-premise and cloud environments. You will lead threat detection, incident response, and security architecture … efforts within a hybrid environment. This is a highly technical engineering role, where you'll be hands-on developing and maintaining our security operations tooling. Key Responsibilities: Architect, implement, and maintain advanced security configurations across the Microsoft Defender suite (Cloud, Endpoint and Identity), Microsoft Sentinel, Purview and Azure infrastructure (including RBAC, PIM, NSGs and identity protections). Lead … security incident detection, investigation, and response activities alongside the SOC. Lead the implementation and tuning of Microsoft Sentinel: build KQL queries, implement custom rules, conduct threat hunting, workbooks, design and automate playbooks using Logic Apps. Experience collaborating with development, operations and infrastructure teams in a security context. Experience securing cloud platforms and applications using tooling such as CASB More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
we have a team of 22,500 people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at Internal Grade E Job Description Experian's Global Security Office is looking for an InformationSecurity Data Engineer with experience using Power Automate, SQL and PowerBI to build end-to-end automation routines as part … of its Data Fabric implementation. You will also have data analysis skills and the ability to work as part of a team. The InformationSecurity Data Engineer will develop, improving, and maintaining executive security reporting workbooks and interactive PowerBI reporting tied to important security controls. You will design templates for PowerBI reporting, improve data feeds … as part of regular monthly forums and you will interpret reporting requests and turn them into applicable outputs This is a UK remote based position reporting to the Lead Security Data Engineer Important Functions Design, test, and implement critical Business Intelligence ETL solutions in PowerAutomate, PowerBI, PowerQuery and Data Fabric, sourcing data from multiple inputs to include the More ❯
Information Assurance, Nessus, RMF, Windows, Linux, WireShark, System Security Plans, Authorization to Operate, Verification and Validation, NIST, PKI, Scripting Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active … polygraph (Polygraph must be within the last five (05) years). At least fourteen (14) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, InformationSecurity, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may … be substituted for a bachelor's degree. Certified Information System Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing More ❯
U.S. Government clients in the metropolitan Washington D.C area. We are committed to meeting our customer's needs with a dedicated and highly qualified workforce. We are seeking an Information Systems SecurityEngineer to join our growing team. Requirements 14+ years experience as an ISSE on programs/contracts of similar scope, type and complexity. Bachelor's … degree in Computer Science, Information Assurance, InformationSecurity System Engineering or related discipline. DoD 8570.01-M compliance with IASAE Level 2 CISSP Certification 4 years of ISSE experience may be substituted for a bachelor's degree. TS/SCI Clearance Required Please check out our amazing benefits and generous PTO plan on our website at White Sky More ❯
Job Number: 123 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITYENGINEER I - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 145K Background Support the government in the enforcement of the design and implementation of trusted relationships among external systems … and architectures Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components Identify overall security requirements for the proper handling of … government data Interact with the customer and other project team members Support security planning, assessment, risk analysis, and risk management Requirements Bachelor's degree in computer science, information assurance, informationsecurity system engineering, or a related discipline from an accredited college or university 7 years of experience as an ISSE on programs and contracts of similar More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
Role: Information System SecurityEngineer Location: Washington, D.C. - Hybrid with some travel Clearance: Secret minimum, ideally TS Salary: $150K-$185K + Equity My client, a leading defense tech company, is looking to hire an experienced ISSE to join their team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background … in informationsecurity fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal oversight. Providing outstanding customer service, policy expertise, and high-quality documentation. Partnering with engineers to interpret security requirements and plan effective control implementations. Translating and synthesizing complex concepts and architectures into clear body-of-evidence artifacts, including System Security Plans (SSPs) and architecture diagrams. Representing the company and providing credible cybersecurity expertise in government assessments and audits. If you are interested in learning more about this opportunity, please apply below, and I will contact you More ❯
Joint Tactics and Technologies (JTT) is looking for motivated Mid-Level/Senior Information System Security Engineers in Philadelphia, PA! We are a Service-Disabled Veteran Owned Small Business (SDVOSB) specializing in cybersecurity engineering. We offer outstanding benefits and opportunities for leadership development. This work is in support of Naval Surface Warfare Center - Philadelphia. Tasking includes: • Assist with … the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M). … of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO). • Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary • Perform Ports, Protocols, and Services Management (PPSM). • Perform IT and CS vulnerability-level risk assessments. • Execute More ❯
What you'll do: Design, implement, and manage security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to ensure the organization's networks and systems remain secure. Conduct regular security assessments to identify vulnerabilities and weaknesses in systems, networks, and applications. Develop and implement incident response plans to effectively address security breaches … incidents, and breaches. Collaborate with cross-functional teams to establish and enforce security policies, standards, and procedures. Monitor network traffic, system logs, and security alerts to detect and respond to potential security incidents. Analyze and investigate anomalies and security breaches, taking appropriate actions to mitigate risks. Work closely with cross-functional teams, including IT, software development … and compliance, to integrate security into all phases of the development lifecycle and ensure a comprehensive approach to cybersecurity. Maintain thorough and accurate documentation of security processes, procedures, and configurations. Prepare detailed reports on security findings, incidents, and actions taken. What you'll need to succeed: Active TS/SCI Clearance with CI poly. Bachelor's degree More ❯
and abroad. If you are ready to support a high-performing team that truly makes a difference,then come join us! Job Description: Provides subject matter expertise in system security requirements, designs security architecture and develops a security design for program platforms. Develops System Engineering plans, and procedures in accordance with DoD, Army, industry and academia best … and integrates all systems engineering tasks adhering to a disciplined systems engineering process a throughout all acquisition phases of the assigned subsystem, system or system of systems. The Sr. Information Systems SecurityEngineer shall possess the following capabilities: Program Protection - Be the PD SAI Program Protection Expert Work with ARTPC to define and address Program Protection requirements. … Coordinate Information Assurance (IA_ Strategy updates) Coordinate Threat assessments, vulnerability assessments, and risk mitigation plans Review and make recommendations regarding the adequacy of the contractor's anti-tamper objectives and methodology. Monitor contractors progress in development and implementation of approved anti-tamper technology and techniques. Qualifications: Bachelor's degree in electrical, electronic or computer engineering; computer science or related More ❯
Seeking Information System SecurityEngineer candidates for contingent prime award expected June 1, 2025. Must have 12+ years experience with a bachelor's in a STEM field or 16+ years experience without a degree. In addition must be IASAE Level II Certified which includes any of the following: - CASP+CE - CISSP - CSSLP More ❯
Science, Cyber Enablement, Logistics, and Training. Founded in 2019, Swift supports Civilian, Defense, and Intelligence Community customers across the country and around the globe. We are looking for an Information Systems SecurityEngineer (ISSE) with expertise in designing secure systems, supporting critical mission environments, and navigating the complexities of RMF and DoD cybersecurity policy. We're looking … for a candidate who thrives in a cloud-enabled environment and enjoys architecting security into everything from system design to deployment. The ideal candidate will play a key role in securing big data systems across distributed cloud environments. They will shape cybersecurity documentation, guide the development team to meet accreditation requirements, and work with government stakeholders to enforce security … days a week at Fort Belvoir, VA. Responsibilities: Design and secure complex system and network architectures that span multiple enclaves with varying classification levels Create, review, and maintain security authorization documentation in alignment with DoD and federal cybersecurity policies Implement and guide the team through the Risk Management Framework (RMF) accreditation lifecycle; prior DIACAP experience is acceptable Perform in More ❯
Title: Infomation SecurityEngineer Contract: 8 month (Initially) Rate: Up to £625 Per Day (Inside IR35) Location: Remote! Are you passionate about embedding security into the heart of technology change? if so Our client is looking for an experienced Secure by Design Specialist to support their high-profile organisation in strengthening their security posture across major … transformation initiatives. This is a pivotal role where you'll work closely with delivery teams to ensure cyber security, data protection, and compliance frameworks are baked into every phase of the project lifecycle, right from ideation through to delivery. You'll act as the security conscience across multiple programmes, helping to identify risks early, reduce costly late-stage … rework, and deliver robust, secure-by-default solutions. The Role: Provide subject matter expertise on cyber security and secure design across tech change programmes Work hand-in-hand with delivery managers to embed security controls from day one Review and guide third-party risk assessments and product security compliance Support DPIAs and ensure alignment with Cyber Essentials More ❯
Job Number: 408 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITYENGINEER (408) - VIRGINIA - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Belvoir VA Salary: 138K-186K Background Create, review and edit authorization documentation for completeness and accuracy in accordance with required policy Thoroughly … understand and be able to implement RMF system accreditation processes Assess use case and operational risk of integrated open source, and GOTS/COTS software components Provide security planning, assessment, risk analysis, and risk management support Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements Support the … of protocols and services, computer architectures, and network topologies is required xperience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools Ability to work independently and as part of a team is needed Flexibility is essential to adapt to schedule changes as needed Preferred CISSP-ISSEP is highly More ❯
Government in the design, development, implementation, and/or integration of IA architectures, systems, or system components • Provides the Government assistance to ensure that the architecture and design of information systems are functional and secure, including program of record systems and special purpose environments with platform IT interconnectivity • Performs system or network designs that encompass multiple enclaves, to include … knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments " " Education and Experience • 14 years of IA System Architect and Engineer (IASAE) experience, to include recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure … PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and DoD More ❯
Government in the design, development, implementation, and/or integration of IA architectures, systems, or system components • Provides the Government assistance to ensure that the architecture and design of information systems are functional and secure, including program of record systems and special purpose environments with platform IT interconnectivity • Performs system or network designs that encompass multiple enclaves, to include … of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments Qualifications Education and Experience • 14 years of IA System Architect and Engineer (IASAE) experience, to include recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure … PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and DoD More ❯
while still being ever-changing and ever-adapting; we hope you are too. Who is CTP? Service-Disabled Veteran, Woman Owned Small Business; Leading a team on multiple cyber-security, networks, and engineering efforts in the federal government contracting realm. We put our people first and have since 2007. We're passionate about the cause, we're dedicated to … record of dedication, through education & commitment. 4 years of experience may be substituted for a bachelor's degree. CISSP-ISSEP Required We will trust you to: Participate as a security engineering representative on engineering teams for the design, development, implementation, and/or integration of secure networking, computing, and enclave environments Participate as a security engineering representative on … engineering teams for the design, development, implementation, and/or integration of IA architectures, systems, or system components Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement More ❯
Qualifications: Over 10 years of experience required performing the following activities: Design, development, implementation and/or integration of secure networking, computing, and enclave environments. Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components. Participate as the primary security engineering representative on … policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments. Interact with the customer and other project team members. Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components. Minimum Educational Requirements: MA/MS required. More ❯