needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Information Security Systems Engineer Job Code: 24133 Job Location: Huntsville, AL Job Schedule: 9/80 Job Description: Applies current systems security engineering methods, practices and technologies to the architecture … Experience in the application of DISA SRGs and STIGs. Support security engineering activities, including such as basis of estimate development, requirements development, design, test, configuration management and maintenance of information systems and data. Assist program security in the development of policies and procedures for emerging security technologies. Support vulnerability assessment activities as required. Support the evaluation, qualification, testing and … development and administration of SEIM/audit reduction tools (e.g., Splunk). DOD 8570.01M IAT-3 or IASAE-2 certification is desired. Basic understanding of engineering processes, concepts and information security systems engineering principles (NIST SP 800-160 Vol1). Understanding of system test and evaluation methods Experience in Cyber Defense technologies. Top Secret clearance is highly desired. L3Harris More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
on-premise and in the cloud to ensure design implementation, safeguarding Experian's assets. You'll assess control design, performance, and compliance with standards and regulations, reporting to the Information Security Control Assurance Testing Manager. Identifying gaps, documenting findings, and recommending improvements to mitigate risks are important responsibilities. Using data-driven testing techniques and a defined methodology, you'll … Contribute lessons learned by integrating partner feedback to improve the control testing program. About Experian About us, but we'll be brief Experian is the world's leading global information services company, unlocking the power of data to create more opportunities for consumers, businesses, and society. Experian is a global data and technology company, powering opportunities for people and … technologies, experienced people, and new ideas to help all our clients maximize every opportunity. Experience and Skills What your background is A bachelor's degree in computer science, management information systems, or a relevant field, or equivalent demonstrable experience. 5+ years' of experience in Information Security or Information Technology 3+ years' experience performing IT Audit or security More ❯
OVERVIEW The Information System Security Engineer II and III is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated competency with specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C … A) and/or Assessment & Authorization (A&A) process. Must have active Secret clearance and be a US Citizen. The Information System Security Engineer II and III: Support all aspects of Program Information Assurance (IA) activities across the Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) lifecycle. Apply knowledge and experience in cybersecurity, engineering, Test … Evaluation (T&E), and/or Security Control Assessment (SCA) roles. Demonstrate working knowledge of the Risk Management Framework (RMF) and/or prior experience with Defense Information Assurance Certification and Accreditation Process (DIACAP). Interpret and apply relevant security policies and guidance documents to support the development and maintenance of IA artifacts and traceability documents required for Authority More ❯
Information Security & Risk Specialist (ISO 27001:2022) - Energy Location: Brussels Hybrid: 2 days a week My client is looking for an Information Security Specialist to join the team in Brussels. The successful candidate will have the opportunity to work in a hybrid model, allowing for a blend of remote and in-office work to support a … related to overall parties' compliance and risk management. Represent in security related forums on association level. Support activities of our digital section to increase organizational maturity in terms of information security. Profile 5+ years of experience in IT and cybersecurity domains. Degree in IT (Information Technology), OT (Operational Technology), or equivalent experience. CISSP certification or equivalent experience would … be an asset. Additional certifications such as CISM, OSCP, CEH, or equivalent are considered a strong asset. Proven experience in implementing and monitoring Information Security Management Systems (ISMS) is essential. Strong knowledge of information security standards such as ISO 27001:2022, ISO 27002. Technical expertise in security technologies such as cryptography, network security, intrusion detection, access control models More ❯
with one heart, one mind, and one purpose, we can accomplish our mission and be an organization anyone would be proud to be a part of. POSITION SUMMARY The Information Security Specialist is vital in safeguarding the confidentiality, integrity, and availability of systems and data within the Distributed Common Ground System (DCGS) and the STATEFARM programs. This position … cybersecurity postures, implementing RMF controls, responding to vulnerabilities, and supporting continuous monitoring initiatives. Working closely with the Zero Trust Architect, DevSecOps engineers, system administrators, and government cybersecurity personnel, the specialist will manage system security controls, support developing and reviewing System Security Plans (SSPs), and assist with Security Analysis Reports. The specialist monitors network and user activity, enforces policy … with the STATEFARM Program Manager and DoD stakeholders. Support integration and deployment of secure software builds and technical refresh activities. EDUCATION/TRAINING Required: Bachelor's Degree in Cybersecurity, Information Systems, Computer Science, or a related discipline. Preferred: Master's Degree in Information Assurance or Cybersecurity Engineering. Required Certification: IAT Level II (e.g., CompTIA Security+) Preferred Certifications: CISSP More ❯
improve the well-being of all by taking life science further and combine our attention to detail with the extraordinary, because it all matters. The opportunity Reporting to the Information Security Officer you will contribute to the efficiency, capability and profitability of the business by gathering, analysing and recommending changes to processes/systems within BUs, across multiple departments … with the enterprise risk management approach Coordinating the performance of regular business impact assessments (BIAs) and the recording of results and updates Contributing to the design and implementation of information security process and control improvements Mentoring other members of the Information security team and promote risk management best practices across IT Supporting the development and delivery of compliance … Proven ability to work creatively and effectively in a complex organisational environment Strong organisational skills to manage multiple tasks and stakeholders effectively Experience in the development and maintenance of information security policies, standards and processes Excellent verbal and written communication skills If you have the skillset we are looking for, and are interested in working within an organisation growing More ❯
improve the well-being of all by taking life science further and combine our attention to detail with the extraordinary, because it all matters. The opportunity Reporting to the Information Security Officer you will contribute to the efficiency, capability and profitability of the business by gathering, analysing and recommending changes to processes/systems within BUs, across multiple departments … with the enterprise risk management approach Coordinating the performance of regular business impact assessments (BIAs) and the recording of results and updates Contributing to the design and implementation of information security process and control improvements Mentoring other members of the Information security team and promote risk management best practices across IT Supporting the development and delivery of compliance … Proven ability to work creatively and effectively in a complex organisational environment Strong organisational skills to manage multiple tasks and stakeholders effectively Experience in the development and maintenance of information security policies, standards and processes Excellent verbal and written communication skills If you have the skillset we are looking for, and are interested in working within an organisation growing More ❯
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required We are seeking an Information Systems Security Specialist II; this role is focused on conducting Security Technical Implementation Guide (STIG) assessments and performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS). You will manage security authorization packages and risk … maintaining Plans of Actions and Milestones (POA&M) to remediate security vulnerabilities. As part of your responsibilities, you'll execute Risk Management Framework (RMF) Step 5 authorizations as an Information System Security Engineer (ISSE), providing critical security risk mitigation recommendations and guidance to stakeholders. On-site only, no telework. Position Responsibilities: Conduct Security Technical Implementation Guide (STIG) assessments, utilizing … risk assessment documentation within eMASS. Develop and maintain Plans of Actions and Milestones (POA&M) to remediate security vulnerabilities. Execute Risk Management Framework (RMF) Step 5 authorizations as an Information System Security Engineer (ISSE). Provide security risk mitigation recommendations and guidance to stakeholders. Ensure compliance with DoD 8570.01-M IAM Level II certification requirements and other relevant regulations. More ❯
Type: Full Time Location: Washington, DC Overtime Exempt: No Reports To: ARMADA HQ Security Clearance Required: Active Top Secret CONTINGENT UPON AWARD Duties & Responsibilities: The Security Specialist IV - Information Management shall provide technical database management and administration support to effectively and efficiently manage the security databases. The Security Specialist IV - Information Management shall d evelop a … training plan to teach new and existing staff the day-to-day elements of the security database. The Security Specialist IV - Information Management shall m aintain and update the database by continuous day-to-day update of content and ensuring accurate and adequate security measures are in place to safeguard government and contractor sensitive and priority data. Prepare … Design report capabilities to maintain and deliver sensitive security metrics and statistics and provide associated briefings. Design and develop report capabilities, generate reports containing security metrics and other statistical information; and further prepare and present briefings on security database operations, and metrics. Design, develop and maintain Security related websites, emails, SharePoint sites and other technology-related platforms. Other duties More ❯
Information Systems Security Specialist vacancy in Berkshire (060DM) Are you a former military professional with a background in information security, risk management, and assurance? Your experience in secure environments, risk analysis, and stakeholder engagement makes you the perfect fit for this Information Systems Security Specialist role. This is an opportunity to continue making an impact … by protecting critical systems and ensuring robust security measures in a complex environment. 12-month contract, with a chance of extension. Key Responsibilities Conduct risk analysis for information systems, providing strategic recommendations to decision-makers. Advise senior leadership and project teams on information security best practices. Develop and implement security architectures to safeguard critical data and infrastructure. Assess … and manage information risks across projects, supply chains, and stakeholders. Stay ahead of evolving security threats, leveraging industry standards and best practices. Oversee vulnerability assessments and ensure security compliance across IT systems. Provide technical risk assessments and contribute to the professional development of information security standards. What We're Looking For Security Assurance Expertise - Strong background in risk More ❯
retain. At MAG, we look for individuals who thrive in a high-performance environment where challenges are the norm and success is expected. We are looking for a Jr Information System Officer (ISO) to join our team to support the Navy Cyber Warfare DevGru (NCWDG). Your role would be to provide Cybersecurity support as an Information Systems … Officer (ISO) ensuring the confidentiality, integrity, availability, authentication, and non-repudiation of information systems operating in a classified environment. Must be a US Citizen Requires a current Top Secret security clearance. A CI Polygraph will be required within 6 months. Essential Duties and Responsibilities Essential Duties and Responsibilities include the following. Other duties may be assigned. Monitor the Command … s information systems. Ensure that all servers, switches, routers, crypto, fiber connections, attached leased circuits and distant end hardware are all fully secure and following proper operations through security scans and implementation of security controls as directed, Monitor user accounts ensuring correct permissions are assigned for level of access. Validate in hold accounts of detaching personnel from the Command. More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
DGH Recruitment
Information Security Specialist (Information Security and Cyber Security) Hybrid working: 3 days per week in the office. The Information Security Specialist will play a pivotal role in shaping my clients cyber resilience strategy. The role involves providing expert guidance to stakeholders on information security matters, managing technical cybersecurity tools and operations, and overseeing compliance … with regulatory standards. It will lead the development and execution of the cyber and information security strategy, ensuring alignment with ISO 27001, GDPR and Cyber Essentials. The ideal candidate will have strong information security experience alongside hands-on technical knowledge of SIEM, EDR, vulnerability management, and incident response. Responsibilities: - Serve as a subject matter expert for information … incidents, coordinating with internal teams and third-party providers. - Oversee regular vulnerability scans and third-party penetration tests; track and report remediation efforts. - Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. Required Skills/Experience: - Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR More ❯
Buckinghamshire, England, United Kingdom Hybrid / WFH Options
identifi Global Resources
INFORMATION SECURITY GRC SPECIALIST Buckinghamshire | Hybrid Working (Flexible Days) Contract: Permanent Salary: Up to £65,000 + BONUS Reports to: GRC Manager Individual Contributor Role – No Direct Reports Are you a security governance expert looking to play a crucial role in an evolving and high-impact environment? We are seeking an Information Security GRC Specialist to … join our InfoSec Governance, Risk and Compliance (GRC) team. In this role, you’ll help protect the confidentiality, integrity, and availability of our information assets by embedding best-in-class governance practices, assessing risk, and ensuring compliance with key industry standards like ISO27001. You'll work across the business as a trusted security advisor, helping teams understand and manage … their risk profile and compliance obligations. What You’ll Bring A strong understanding of the current threat landscape, security risks, and compliance standards. Extensive experience in information security, ideally within a GRC or risk management role. Experience delivering risk assessments and managing compliance against standards like ISO27001. Skilled in writing and implementing security policies, standards, and procedures. Working knowledge More ❯
ship's service life. The organization also maintains inactive ships for future disposal, donation, or transfer, to include follow-on technical support to our partner navies. Duties include: The Information System Security Specialist is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to … Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. The specialist should demonstrate a working knowledge of the Risk Management Framework (RMF) process and/or include prior experience with the Defense Information Assurance & Certification Accreditation Process (DIACAP). … Familiarity with security policies & guidance documents to assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements. The specialist is expected to evaluate security solutions to ensure they meet security requirements for processing up to classified information and supervise and/or maintain the operational security posture for More ❯
Information Security Risk & Compliance Specialist About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk to help … GDPR). Assist in the development, maintenance, and improvement of internal GRC processes, policies, and documentation. Collaborate with cross-functional teams (Security, Legal, IT, Product, etc.) to gather information and ensure compliance obligations are met. Participate in risk assessments, control testing, and continuous monitoring activities to support the overall risk and compliance program. Support customer contract negotiations by providing … evidence and documentation for internal and external audits. Track and report on compliance project status and risks to leadership. Qualifications 3+ years of experience in Governance, Risk, and Compliance, Information Security, or a related field. Experience supporting sales processes, including responding to RFx security assessments. Solid understanding of cybersecurity principles, information security best practices, and regulatory requirements (DORA More ❯
Responsibilities Noblis ESI is seeking a highly motivated Information System Security Specialist with a strong focus on JWICS to join our dynamic team in Dayton, Ohio. This critical role offers a unique opportunity to contribute to the security and advancement of information systems and network-delivered solutions. The selected candidate will primarily be responsible for providing Information … troubleshooting complex hardware and software issues, performing machine imaging, managing user accounts and access controls, and supporting SIPRNet and NIPRNet systems as needed. Responsibilities Include: Primarily responsible for providing Information System Security Manager (ISSM) support for JWICS systems, ensuring compliance with DISA STIGs, NIST Special Publications, and other relevant security regulations. Develop, maintain, and update System Security Plans (SSPs More ❯
ship's service life. The organization also maintains inactive ships for future disposal, donation, or transfer, to include follow-on technical support to our partner navies. Duties include: The Information System Security Specialist is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to … Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. The specialist should demonstrate a working knowledge of the Risk Management Framework (RMF) process and/or include prior experience with the Defense Information Assurance & Certification Accreditation Process (DIACAP). … Familiarity with security policies & guidance documents to assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements. The specialist is expected to evaluate security solutions to ensure they meet security requirements for processing up to classified information and supervise and/or maintain the operational security posture for More ❯
Overview Abacus Technology is seeking an Information Assurance Specialist to support security and information assurance activities for the Aberdeen Proving Ground. This is a full-time position. Responsibilities Provide cybersecurity services to protect information and information systems from unauthorized access and to protect the data within systems. Validate technical standards and security policy for LAN … and required key management services, as well as PKI solutions for email, web applications, file transfer, and VPNs. Provide PKI authentication for users' devices and applications to utilize global information services data and enable CAC Cryptographic Logon (CCL), when applicable, for controlling logical access. Register and install PKI certificates on Army-owned PKI protected devices. Utilize the eMASS to … on experience and training on the verification and enforcement of Security Technical Implementation Guide (STIG) identification and remediation. Hands-on experience and training on the verification and enforcement of Information Assurance Vulnerability Management (IAVM) identification and remediation. Experience with reporting, scanning and analysis using ACAS. Knowledge of Certification & Accreditation (C&A) processes and the RMF. Experience with Enterprise Mission More ❯
medical benefits, a 401(k) match, generous PTO accrual, professional development reimbursement, corporate-funded technology certifications, and robust employee recognition and appreciation programs. We are seeking a highly skilled Information Assurance Systems/Network Specialist to work in Washington DC. Job Summary: Responsible The contractor shall provide assessment and authorization (A&A) and technical cyber security support to … the System Owner (SO) to include, but not limited to: Determines enterprise information assurance and security standards. Develops and implements information assurance and security standards and procedures. Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance and security solutions to support customer's requirements. Identifies, reports, and resolves security violations. Establishes and satisfies information … may include mainframes, workstations, and personal computers. Designs, develops, engineers, and implements solutions that meet security requirements. Provides integration and implementation of the computer system security solution. Analyzes general information assurance related technical problems and provides basic engineering and technical support in solving these problems. Performs vulnerability/risk analysis of computer systems and applications during all phases of More ❯
Dungannon, Northern Ireland, United Kingdom Hybrid / WFH Options
Bela Recruitment
Bela Recruitment is recruiting an IT Security/ISO 27001 Specialist based in Dungannon, Co.Tyrone, Northern Ireland. The Company I’ve worked with this company for over 10 years sourcing staff across all departments. They are a great company to work for and have been investing heavily in their own ISO & IT Systems for several years, hence the need … for this ISO Compliance Specialist, to ensure ISO systems and data is central to their success. Responsibilities Support the business across ISO 27001 - developing, managing and maintaining policies and paperwork. Be detail-oriented, with strong knowledge of ISO 27001 standards and a proven track record in helpling secure audits. Any ethical standards experience will also be a big help. More ❯
value everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 Create & Maintain an information security management system (ISMS) capable of demonstrating compliance against internal security requirements and external commitments including certification and regulatory requirements. Provide subject matter expertise in the application of established … ensure that policies are managed throughout their lifecycle and updated through yearly or ad-hoc reviews. Produce relevant security standards documentation in consultation with Technical teams. Lead on providing information to Three UK Customers (B2B) regarding Three UK's security practices. Support proactive and effective oversight of technology and security risk management frameworks, methodologies, processes, assurance, remediation, and reporting … assessments and identifying emerging risks through continuous assessment of inherent and residual risks. Provide robust challenge to operational teams as they identify, assess, manage, and report technology risks (including Information Security and Cyber Risk) using various tools and activities. Manage and improve Three's Security Exception process. Work effectively with Enterprise risk and compliance functions to escalate enterprise-level More ❯
Information Security Specialist Overview Ref: (phone number removed) Information Security Specialist/ISO 27001/GDPR Exciting opportunity to join a global business that is still growing, the environment is fast paced and interesting and they really look after their people. Role Responsibilities Responsibilities will include: Providing technical expertise relating to the implementation and operation of … technical security controls Providing technical support and ensuring understanding and investigation of information security vulnerabilities and threats Providing advice to support teams on how to remediate and reduce identified vulnerabilities Liaising with 3rd party support and product organisations Providing technical leadership on security incident response and investigation Essential skills will include: Proven experience in implementing and managing security frameworks … and analysing phishing simulations and other security awareness activities NB Where this is a GRC biased role, and the team have a range of shared Technical SME's, the Information Security Specialist MUST be able to create and interpret solutions design documents with a technical understanding of encryption, security tooling and network protocols nuances such as TLS v More ❯
Information Security Specialist Overview Ref: (phone number removed) Information Security Specialist/ISO 27001/GDPR Exciting opportunity to join a global business that is still growing, the environment is fast paced and interesting and they really look after their people. Role Responsibilities Responsibilities will include: Providing technical expertise relating to the implementation and operation of … technical security controls Providing technical support and ensuring understanding and investigation of information security vulnerabilities and threats Providing advice to support teams on how to remediate and reduce identified vulnerabilities Liaising with 3rd party support and product organisations Providing technical leadership on security incident response and investigation Essential skills will include: Proven experience in implementing and managing security frameworks … and analysing phishing simulations and other security awareness activities **NB Where this is a GRC biased role, and the team have a range of shared Technical SME's, the Information Security Specialist MUST be able to create and interpret solutions design documents with a technical understanding of encryption, security tooling and network protocols nuances such as TLS v More ❯
Diverse Systems Group, LLC is seeking an Information Assurance/Security Specialist to play a pivotal role in safeguarding the integrity, confidentiality, and availability of information systems and data within the Information Technology Department at Walter Reed National Military Medical Center (WRNMMC). This role involves implementing and maintaining security measures, conducting risk assessments, developing security … and application of system security practices within the organization/agency to ensure the integrity, confidentiality, and availability of systems and data. Collaborate closely with the system owner and Information System Security Officer (ISSO) to provide expertise and support in various aspects of designing, developing, and writing certification and accreditation (C&A) documentation packages. Assist in the preparation and … ISO, GDPR, HIPAA). Experience with security tools and technologies. Excellent analytical, problem-solving, and decision-making skills. Effective communication and interpersonal abilities. Education/Experience: 6+ years of information assurance/cybersecurity, or related roles. Certification(s): Minimum certification - CompTia Security + or higher certification required Baseline certification as stipulated in DoD 8140.01/8570.01-M shall be More ❯
RiverTech is seeking a skilled Information Security (INFOSEC) Specialist to support the Joint Staff Security Office (JSSO) at the Pentagon in providing comprehensive security services. The ideal candidate will be responsible for ensuring that classified information, SCI, and controlled unclassified information (CUI), under the control of the JS, is protected in accordance with authoritative policies. To … security procedures and policies in coordination with government personnel. Investigates, prepares, and submits incident reports as required. Participates in the development of security education programs. Develop, implement, and enforce information security policies, standards, and guidelines. Key responsibilities include: Maintain repository for information security policies, standards and guidelines, ensuring timely reviews and updates. Develop, implement, and conduct specialized training … tracking completion status. Track and developed detailed report analyses on all security incidents to address areas of concern. Address security incidents involving non-compliance with security procedures for classified information, from initiation to completion, in accordance with authoritative policies and JS SOPs. Develop and implement mitigation strategies to address identified risks. Collaborate with other security disciplines such as PHYSEC More ❯