demonstrated understanding of required content and ability to generate a range of security artifacts to include SAR, SSP, Automated Scan Tool Report, POA&M, etc.). Conduct architecture and system scanning to detect vulnerabilities and compliance with automated tools, and perform an analysis based on tool reports, to include/alse positive analysis and compensating controls. In depth understanding … ICD 705, and other ICDs as appropriate. Skill in conducting vulnerability scans and recognizing vulnerability in security systems (e.g., Cloud Environments) ASW, Google, IBM, Azure, and Oracle. Knowledge of system and application security threats and vulnerabilities. Knowledge of network access, identity, and access management e.g. public key infrastructure (PKI). Knowledge of network protocols such as Transition … Control Protocol/Internet Protocol (TCP/IP), Dynamic Host Configuration, Domain Name System (DNS), and directory Services. Ability to assess the robustness of security systems and designs. Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Three years of experience performing security assessments in a cloud computing environment. Strong writing skills. More ❯
supporting patient care across Velindre Cancer Service. As Digital Applications Lead, you'll bring a flexible, innovative approach and strong interpersonal, communication and organisational skills to deliver high-quality system configuration, change management and support across the Trust. You'll support and develop key clinical applications including: Welsh Clinical Portal (WCP) Welsh Patient Administration System (WPAS … Welsh Nursing Care Record (WNCR) ChemoCare Document ManagementSystem (DMS) Attend Anywhere (AA) Plus, contribute to the rollout of Electronic Prescribing and Medicines Administration (EPMA). Key responsibilities: Provide technical leadership in design, configuration and implementation of changes. Advise colleagues on application functionality and best practice. Ensure availability and performance of business-critical systems. Supervise a team … boundaries Experience of successful team working Experience of leading others and offering guidance Record of achievement of delivering objectives and finding innovative solutions to problems Experience of the complete system life cycle Experience of a risk based approach to system development Experience of working within a quality driven environment Previous NHS experience Working in an environment with more More ❯
University Hospitals Sussex NHS Foundation Trust (279)
Job summary This key role within the PACS team provides a high quality, comprehensive and efficient administration support service to all imaging system users. The post holder will utilise excellent time management, organisational and communication skills and an adaptable, flexible approach to produce work of a high standard focusing on being the first point of contact for … requests/queries and actioning as appropriate. Use the Image Exchange Portal (IEP) to manage and support image exchange with external organisations. Frequently liaising with IT and suppliers for system support. Develop a high level knowledge of the PACS/RIS System and using this to troubleshoot in times of system downtime. Configure and trouble shoot connections … quality and stable reporting environment. Be able to deliver CRIS and PACS training to staff of all levels and disseminate knowledge to address the requirements of a range of system users. Create CDs copies of patient images to be used for multi-disciplinary meetings/case studies and to be sent to neighbouring Trusts and organisations. Run audits to More ❯
position will conduct security event monitoring, advanced analytics and response activities in support of the government's mission. This position requires a solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, this candidate must be familiar with intrusion detection systems, intrusion analysis, security information event … management platforms, endpoint threat detection tools, and security operations ticket management. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information … network environment. Experience with one or more of the following technologies Network Threat Hunting, Big Data Analytics, Endpoint Threat Detection and Response, SIEM, workflow and ticketing, and Intrusion Detection System Experience: 2+ years related experience Prior performance in roles such as ISSO or ISSM SAP experience desired Education: Bachelor's degree in a related area OR Associate's degree More ❯
provide a layered approach to cybersecurity. • Assist in the review and drafting of policies against applicable standards for regulatory compliance. • Cross-reference and validate physical, personnel, facility, and information … systems, through policies and controls IAW Army Regulations, Department of Defense (DoD) Directives and Instructions. • Manage information security risks and report findings to the Government. • Work with system owners to maintain current Authorities to Operate (ATO) in a manner compliant with the Federal Information Security Management Act (FISMA), DoD Risk Management … AOR and familiar with the command structures. • Knowledgeable working with the Mission Partner Environment (MPE). • A relevant educational degree in one of the following fields: Computer Science, InformationSystems, Information Technology, Cyber Security, Statistics, Business Administration, Systems Engineering, Computation Science, Computer Engineering, Electrical Engineering, Data Analytics, Information Technology, Information Security and More ❯
enterprise data architectures, strategies, and solution recommendations in support of business strategies. The Data Architect (Senior) leads design of high-level conceptual and logical models that facilitate a cross-system/cross functional view of data requirements and establishing processes for governing the identification, collection, and use of corporate metadata and takes steps to assure metadata accuracy, validity, and … Leads the development of enterprise data architectures, strategies, and solution recommendations in support of business strategies. Leads design of high-level conceptual and logical models that facilitate a cross-system/cross functional view of data requirements. Establishes processes for governing the identification, collection, and use of corporate metadata and takes steps to assure metadata accuracy, validity, and quality. … Provides leadership to system and local work groups. Designs and builds relational and non-relational databases. Translates business needs into long-term architecture solutions. Reviews object and data models and the metadata repository to structure the data for better management and quicker access. Possesses and applies a comprehensive knowledge across key tasks and high impact assignments. Plans More ❯
Must have an active Secret clearance. Key Responsibilities Monitor and analyze security events and alerts reported by the TSA Security Information and Event Management (SIEM) system on a 24x7x365 basis. Identify and investigate suspicious or malicious activity and cyber events that violate TSA policy. Analyze logs and events from current and future device types that … events from the following types of devices such as, but not limited to: Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS), Host-based Intrusion Detection System/Host-based Intrusion Prevention System (HIDS/HIPS), proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow), Virtual Private Network … VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP), network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.) Clearance Requirements More ❯
do at GDIT will be impactful to the mission of the US Navy. You will play a crucial role in supporting our CNIC Enterprise Infrastructure Services team which provides system administration and development/maintenance support of Commander, Navy Installation Command (CNIC) TWMS application. Web applications developer/Cyber security Engineer for the Department of the Navy's (DoN … Total Workforce Management Services (TWMS) software application in an AWS Cloud Environment. Develop, design, and code modules development for the Navy Total Work Force Management (TWMS). Utilize Visual Studio, Classic ASP, ASP.NET, C#, HTML, CS, Bootstrap, MS SQL language, MS-SQL Server Management Studio Build IA into systems deployed to operational environments (Windows … Tier II/III Remedy tickets Requests supporting TWMS functionality and data errors, and correcting issues as identified Coordinate with TWMS via TWMS tickets Track tasking through TWMS tracking system Status reporting. WHAT YOU'LL NEED TO SUCCEED Security Clearance Level: Active Top Secret or SSBI. Required Experience: 3 years of Web Development experience. Experience developing applications in an More ❯
networks, and applications across NATO environments. Engineer, implement, and monitor technical and organizational security measures for the protection of computer systems, networks, and sensitive information. Identify, define, and document system security requirements, ensuring they align with NATO security standards and operational priorities. Design secure architectures and develop detailed Cybersecurity designs, supporting enterprise-scale solutions and mission-critical systems. Plan … assessments using established tools and frameworks, advising stakeholders on mitigation strategies. Conduct incident response planning, disaster recovery preparation, and contribute to forensic investigations where required. Collaborate closely with developers, system administrators, and product managers to ensure security requirements are met throughout the lifecycle. Clearly communicate complex cybersecurity risks and issues to technical teams, leadership, and non-technical audiences. Qualifications … Prisma, Qualys, Burp Suite, OpenVAS, or equivalent. Experience in risk assessment and security auditing methodologies. Experience planning, developing, and maintaining security policies, standards, and procedures. Proven track record in system administration across multiple operating systems and platforms. Strong communication skills to present complex security issues to peers, management, and leadership. Security certifications (CISSP, CISM, Security+, CEH, or More ❯
wide variety of transport types and levels of service. The candidate will be responsible for coordinating meetings, assessing performer technical progress, projecting performer outcomes, and ensuring that project management best practices are followed by performers. The candidate will prepare and deliver technical reports, briefings, and presentations to government officials and technical stakeholders. The ideal candidate should possess technical … in cybersecurity, network development, network security, and/or enterprise systems First-hand experience with research and/or development of secure platforms, security software for endpoints, and information security software systems Substantial experience with decentralized software services across a wide variety of transport types and levels of service Substantial experience with private key encryption, authentication mechanisms, access … Servers, fixed, mobile, etc.) Familiarity with variable-trust/variable-security systems and services, concepts of Zero Trust, and continuous integrity Experience with general purpose enterprise services Familiarity with System Certification and Accreditation Ability to work with little oversight to achieve team goals Excellent written and verbal communication skills, with the ability to effectively convey complex technical informationMore ❯
field configurations (rack/stack, power, fiber/copper, VLANs, routing, virtualization) and produce "as-built" packages. Develop and execute test procedures for Developmental Test & Evaluation (DT&E) and System Operational Verification Tests (SOVTs); support Test Readiness Reviews (TRRs) and capture objective evidence. Harden Windows/Linux and virtualized hosts (VMware ESXi/NSX) using Defense Information … Produce and maintain engineering artifacts: block/rack elevations, interface control, cable running sheets, Bill of Materials (BOM), site survey checklists, Installation Design Package (IDP) inputs, and Base Electronic System Engineering Plans (BESEPs). Analyze network performance (Wireshark, iperf, NetFlow), troubleshoot L1-L3 issues, and recommend Quality of Service (QoS)/routing changes; contribute to Gigabit-capable Passive Optical … and Intelligence (PEO C4I)/PMW-160, shipyards, and Fleet users; brief status, risks, and mitigations to Integrated Product Teams (IPTs)/Working IPTs (WIPTs). Draft inputs to System Engineering Plans (SEPs), test plans/reports, and readiness briefs; maintain disciplined documentation in Jira/ServiceNow/Confluence or equivalent. Support site installs and upgrades on ships/ More ❯
Milton Keynes, United Kingdom Hybrid / WFH Options
Milton Keynes University Hospital NHS Foundation Trust
Applications The post holder will be expected to support a wide range of core clinical and non-clinical applications which includes but is not limited to a Patient Administration System/Electronic Patient Record (PAS/EPR (eCARE)), Pathology System and a Radiology System through to an email infrastructure, Virtual Server estate, database services, telephony services, backup … excellent inter-personal and written and verbal communication skills. Communication responsibilities will include: Communicating the progress of logged incidents, problems and changes. Assist with communication to key stakeholders and system owners in connection with major incidents (e.g. unscheduled outages causing significant disruption to Trust system users). Training The post holder will understand the importance of training for … Analogue and Mobile telephony technologies. Advanced understanding of Storage Area Network (SAN) technologies Advanced understanding of LAN/WAN/WLAN/VPN technologies Working knowledge of the Microsoft System Centre suite of applications. Advanced knowledge of backup technologies and strategies. Advanced knowledge of PC imaging technologies. Advanced knowledge of patching, anti-virus and encryption software. Experience of working More ❯
Global Solutions Management - Operations II (GSM-O II) contract at DISA. This contract includes the Operations, Sustainment, Maintenance, Repair, and Defense of the Defense InformationSystem Network (DISN) within the DOD Information Network (DODIN) in support of the Defense InformationSystems Agency (DISA). It also includes support to other key … receiving mentoring from senior developers. Preferred Qualifications ServiceNow Certified Application Developer Experience or familiarity with Agile development and testing methodology Exposure to ServiceNow applications like Telecommunication ManagementSystem (TSM), Telecommunications Network Inventory (TNI), Order Management Telecommunications (OMT) modules, etc. Experience with JIRA, Git and Confluence. Understanding of ITIL foundation or ITIL certified. AWS cloud and … ServiceNow certifications. Bachelor's degree in a technical field such as System Engineering, Computer Science, InformationSystems, Engineering Science, Engineering Management, or related discipline Experience working with large software systems including hardware integration and test. Experience working with multi-disciplinary technical development teams. Experience using SAFe as the agile development methodology. Experience moving from a More ❯
contractual objective to ensure work results meets customer requirements. Ensures all contract deliverables are of high quality and delivered on time. Serves as primary point of contact for information to and from the customer. Serves as technical point of contact for Epsilon's subcontractors. Manages personnel including hiring, training, performance reviews and related personnel management functions … and approval of all associated invoices. Strives to increase business opportunities. Understands and develops business proposals, financial performance reports, contract required reports and documents. Implements and executes program informationmanagementsystems and controls to carry out program tasks. Determines work schedules, prioritizes tasks, and implements procedures for performing work activities. Sets-up, coordinates, and prepares materials … emphasis in business, finances, marketing Minimum 5 years of project management experience Minimum of 10 years of professional work-related experience Familiarity with US Navy, to include System and Type Commanders, Regional Maintenance Centers, Naval Warfare Centers Proficient in use of Microsoft Office applications, Microsoft Project and other project management tools and software Knowledge of More ❯
per year Core Hours: 9am to 4pm Location: Herndon VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. The Candidate shall document all identified system risks, planned test procedures, and results. The Candidate shall perform analyses of vulnerabilities identified during testing. The Candidate shall review program-level documentation such as requirements specification, system … security or related IT field. • Demonstrated experience with cyber penetration testing. • Demonstrated experience leveraging adversarial tactics to conduct hands-on security testing. • Demonstrated experience applying computer attack methods and system exploitation techniques. • Demonstrated working knowledge of cyber security principles for Linux, Windows, and virtual platforms. • Demonstrated experience designing, testing, or implementing IT security architecture. • Demonstrated experience performing network security … management tools • Demonstrated experience developing risk management methodologies. • Demonstrated experience analyzing test results to develop risk and threat mitigation plans. • Demonstrated experience testing or reviewing system configuration, development, and design specifically around enterprise systems and hypervisors. • Demonstrated experience designing, testing, or implementing complex Windows installations. Details: Labor Category: Program Manager Position Title: Cyber Security Project More ❯
and sustain our company for the next 100 years! Come grow with us! Torch Technologies, Inc. is seeking a Business Programmer/Analyst 1 to join our Business InformationSystems team. This role is crucial for managing and maintaining our ERP systems, including Deltek Costpoint and Workday, as well as other integrated business applications. As a member of … extraction, transformation, and loading (ETL). Create and manage automated workflows. Manage user accounts and security roles for Deltek Costpoint, Workday, and related applications. Troubleshoot and resolve issues for system users, bridging the gap between IT and functional areas like Accounting, HR, and Contracts. Required Qualifications: U.S. Citizenship. Bachelor's degree in Management of InformationSystems, Computer Science, or a related technology field. 1+ years of experience supporting business applications. Experience with an ERP system such as Deltek Costpoint or Workday. Experience writing SQL queries and a strong knowledge of Microsoft SQL Server or Oracle. Ability to handle sensitive materials and maintain the highest level of confidentiality. Excellent communication skills, both oral More ❯
encompasses important services, such as data analytics and visualization, threat analysis, risk management, modeling and simulation, cost estimating, earned value management, program management, system engineering, independent evaluation, and High Consequence Event prevention. SPA's Strategic Division's Strategic Development Group (SDG) supports critical U.S. government programs providing Systems Engineering support, Systems Safety support … both the COLUMBIA and United Kingdom (UK) Dreadnought (DRNT) Class Submarines. The analyst will serve as a liaison between the D.C. and Groton-based SP26 teams, facilitating effective information exchange between these two sites and ensuring coordination between teams on resolving issues and advancing efforts affecting SWS related installation and testing activities. The analyst will also be responsible … construction or shipyard context. Proficiency in Microsoft Office 365 suite (Excel, Word, PowerPoint, Teams, Project). Desired Qualifications: Prior SSP or NAVSEA experience, particularly related to the Strategic Weapon System and/or submarine construction. Background in defense acquisition planning. More ❯
at Hill Air Force Base, Utah are closely aligned to the United States Air Force Nuclear Weapons Center. We support the Center in sustaining the existing Minuteman III weapon system and the new Sentinel missile system in development. We are a uniquely valued mission partner delivering daily technical excellence and innovative solutions to our government customers. BAE Systems … Interface with CDRL owners to meet delivery schedules. Ensure deliverables align with defined requirements. Ensure data transmittals are accurate and on time. Archive deliverables and maintaining the data management repository. Track, monitor, and report delivery metrics. Contribute to the efficiency and effectiveness of the business unit's service to its customers by offering suggestions and directing or participating … Hill AFB, UT. US Citizenship is required DoD Secret Security Clearance upon hire is required Offer pending contract funding approval Required Education, Experience, & Skills 3+ yrs. of project management experience Background in managing deliverables to customer requirements and timelines. Experience with management reports, to include reviewing and editing. Great cross-functional communication and interaction Leading & coaching More ❯
data to ensure CIM compliance, and develop data models to accelerate queries, dashboards, and correlation searches Work closely with all relevant stakeholders to solve technical problems at the network, system, and application levels Conduct periodic architectural reviews of Splunk and related systems to assess effectiveness and propose optimal installation alternatives as required Develop and manage comprehensive documentation, artifacts, procedures … and processes for the optimal management of the Splunk infrastructure Basic Qualifications: Bachelor's Degree and 12-15 years of experience in system administration, database administration, network engineering, software engineering, or software development, with a concentration in Cybersecurity 12-15 years of experience with Linux and Windows system administration or an expert understanding of operating systems … integration Intermediate understanding of SQL and common SQL dialects Proficiency implementing and onboarding data in Splunk DB Connect Experience with Splunk performing systems administration, including performing installation, configuration, monitoring system performance and availability, upgrades, and troubleshooting General networking and security troubleshooting (firewalls, routing, NAT, etc.) Splunk architecture/design, implementation, and troubleshooting experience Experience in managing, maintaining , and administering More ❯
to maintain a secure and compliant environment • Offer technical support to end-users, troubleshoot and resolve communication-related issues, and provide training as needed to enhance user proficiency and system effectiveness • Develop and update comprehensive documentation for unified communications systems, covering configurations, procedures, and best practices to ensure clear guidance and consistency in systemmanagement and … managing vendor relationships to maintain timely delivery, quality, and alignment with organizational needs • Create and uphold disaster recovery plans and procedures to maintain business continuity in the event of system failures Requirements: • At least 10 years of telecommunications technical experience installing, administering, and upgrading Cisco Unified Collaboration appliances and troubleshooting converged networks that leverage Cisco UC capabilities to interconnect … Associate), GCED, GCIH • Must have current Cisco Certified Network Associate (CCNA) Certification Preferred: • Bachelor's degree in IT related field • Foundational knowledge and/or experience with Unified Messaging system, audio conference bridge systems and gateways, voice circuits, and crypto technologies for voice systems • Cisco Certified Network Professional (CCNP) Certification More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
to propose and implement cost-efficient strategies for meeting mission goals Develops and implements long-range plans to accomplish component or directorate goals. Prepares budget exercise submissions; assimilates information about program goals, requirements, costs, and schedules; ensures that submissions are rational, defensible, and executable. Ensures that program execution is proceeding within available resource constraints and remains consistent with … in the budget development and execution processes. Routinely constructs and maintains background documentation on programmatic and resource analyses, discussions, thinking, and decisions to aid the component's resource management continuity. Strategic planning Exhibits awareness of the component's alignment with strategic goals of the component, directorate, Agency, and Intelligence Community. Participates in discussions to identify objectives, specific actions … information needed or relevant for addressing complex issues or taskings (e.g., supporting new policies or procedures, developing business plans), such as trend reports within the Sponsor finance system, billing statements, budget system reports, and component tracking databases). Analyzes multiple, complex pieces of information to form logical, sound conclusions about its value, importance, or More ❯
assumes all cyber advisory responsibility for the Red Team. The Red Cell Cyber Analyst works as needed with Red Cell Program Leads. This will include supporting adversarial cyber information for program objectives, identifying gaps in cyber architecture, and developing cyber emulative courses of action pertaining to vulnerability assessment. The Red Cell Cyber Analyst is responsible for providing advice … papers, after action reviews, final reports, risk analysis products, and other documents necessary to convey assessment findings to customers, partners, and other stakeholders. Be able to explain network/system mechanisms to analysts and ground element in order to facilitate better analysis and operations. Should have a diverse understanding of network and information security operations, network exploitation … networks including experience in Windows Security, Network Security, Linux/Unix Security, Database security, or Mainframe Security. Ability to operate and navigate the Windows and UNIX/Linux operating system from the command prompt/line with ease. Graduate of one of the following Joint Cyber Analysis Course, Cyber Common Technical Core, Cyber Threat Emulation Methodologies or equivalent Bachelor More ❯
Demonstrated proficiency in business modeling, process modeling, and data modeling Knowledge of methods and techniques of computer systems analysis, design, technical terminology, codes, and standard abbreviations Using the available systemmanagement tools (both console and Web-based SystemManagement) Strong Analytical and problem-solving skills, ability to diagnose/receive complex technical issues. Excellent … Architect with solid proven experience in Natural Adabas (Natural One is highly desirable ). The Architect will focus on Adabas and Natural, design, implementation, and maintenance of the MA21 system utilizing these technologies. The TA collaborates closely with the MA21 technical development staff to conceptualize and design system functionality. The Architect will be instrumental in developing a roadmap … maintaining architectural blueprints for Adabas and Natural One application, ensuring scalability, performance, and security. Directly involved in the implementation of Adabas and Natural, including code development, database design, and system configuration. Responsible for identifying and resolving technical issues related to Adabas and Natural applications, ensuring minimal downtime and disruption. Optimize Adabas and Natural systems for performance, ensuring efficient data More ❯
cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiative Establishing a detailed Execution Plan for each USSF location to include SME contact information, expected visitation length, assets being analyzed, SME contact information, and types of information being collected Analyzes a wide range of mission related cyberspace network activities … defense-in-depth architecture against known vulnerabilities. Must have knowledge and experience to support military planning tasks. Must have extensive knowledge of Mission Assurance disciplines to include risk management, mission mapping, vulnerability assessments, and defensive cyber capabilities. Must have a detailed understanding of mission analysis techniques, FMA-C methodologies, and mission dependencies. Must have … the ability to solve complex problems involving a wide variety of information systems. Must be familiar with the purpose and use of the Mission Assurance Database Support System (MADSS) and other similar database repositories. Excellent communication skills both verbal and written. Good time management, prioritization, and multitasking abilities. Excellent interpersonal skills to build strong relationships More ❯
the commitment to grow and sustain our company for the next 100 years! Come grow with us! Torch Technologies is seeking a Senior Survivability Engineer with deep expertise in system resilience, threat mitigation, and defense survivability to join our Counter-Unmanned Aircraft Systems (CUAS) team. In this high-impact role, you will lead survivability engineering efforts to ensure CUAS … As a Sr. CUAS Survivability Engineer your duties will include the following, but are not limited to: Technical: Establishes the requirements for the protective technologies, export controls, and improved system assurance of the major end items that are owned by the Counter-UAS Product Manager. Works with the intelligence community to capture requirements of improvements to counter-act near … C-UAS and tracks their progress to support the fielding resilient systems. Works with Foreign Military Sales to provide input to protect CPI and other technologies of C-UAS system that are selected to be sold to foreign partners. Works with the Protective Technologies office to ensure appropriate technologies are utilize to protect Critical Program Information. Ensures systemMore ❯