Belay Technologies is seeking a System Engineer 2/Process Engineer. The SE shall analyze user's requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. The SE analyzes system requirements and leads design and development activities. The SE guides users in formulating requirements, advises alternative approaches, and conducts feasibility … technical leadership for the integration of requirements, design, and technology. The SE incorporates new plans, designs and systems into ongoing operations. The SE develops technical documentation. The SE develops system architecture and system design documentation. The SE guides system development and implementation planning through assessment or preparation of system engineering management plans and system … Level 2 SE shall possess the following capabilities: Analysis and tracking and configuration management experience Contributes to the development of sections of systems engineering documentation such as System Engineering Plans, Initial Capabilities Documents, Requirements specifications, and Interface Control Document Manages system requirements and derived requirements to ensure the delivery of production systems that are compatible with More ❯
Process Area - Stakeholder Requirements Definition, Requirements Analysis, Architectural Design, Implementation, Integration, Verification, Transition, Validation, Operation, Maintenance, and Disposal Project Process Area - Project Planning, Project Assessment and Control, Decision Management, Risk Management, Configuration Management, InformationManagement, and Measurement. Enterprise (Organizational Project-Enabling) Process Area - Project Portfolio Management, Infrastructure Management, lifecycle Model Management, Human Resource Management, and Quality Management. Agreement Process Area - Acquisition and Supply. Perform analysis of technical alternatives for a project and make preliminary recommendations. Independently analyze and recommend alternatives for elements of project's technical design. You're required to have this: 14+ years' experience with High School Diploma.; 10+ years … be in a Qualified Engineering Field which includes: Aeronautics, Biomedical, Chemical, Civil, Computer, Electrical, Environmental, Mechanical, Nuclear, Software, Systems, and Engineering Management. Related disciplines include Chemistry, Computer Science, InformationSystems, Mathematics, and Physics. Demonstrated experience with systems engineering activities and preparation of multiple work products in Project and/or Technical Process Areas associated with any of the More ❯
Avenue are currently seeking a highly organised and detail-oriented Information Manager to join a well established client in Dunfermline. About the Role: This pivotal role involves managing the flow of information across the organisation, ensuring data is accurate, secure, accessible, and compliant with relevant regulations. You will oversee the development, implementation, and maintenance of informationsystems, supporting teams to work efficiently and make informed decisions based on reliable data. Key Responsibilities (InformationManagement): Lead the management and governance of informationsystems and databases. Develop and maintain policies for data integrity, classification, and security. Work cross-functionally to optimise document and information workflows, including … and analysis by ensuring data is well-structured and accessible. Oversee version control, metadata standards, and archiving procedures. Train and support staff in best practices for data and information management. Control/organise project documentation such as creation of physical and digital project files Manage the processes around documentation within the organisation, including QA/QC documents from More ❯
BAM currently require a dedicated Information Manager. The role will ensure all documentation created by the team within the ProjectWise system are correctly administered. This will bring improvement in Quality control, efficiencies in time spent of design task and improvements in ensuring correct storage of design related information for the TW CoE team. Purpose: To … plan, implement and manage the use of digital tools to capture, share and use information to enhance project delivery. This role is responsible for both model informationmanagement and systems infrastructure information management. Your work environment BAM fully supports a flexible working policy This role can be based at any of our … best talent to join us regardless of race, colour, religion, national or ethnic origin, sexual orientation, gender identity or expression, age, disability or other characteristics. Your mission As Information Manager, you will be responsible for the following: Has detailed knowledge of client and business requirements and expectations ensuring that the appropriate plans, specifications, reviews and controls are in More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … seeking a Lenel System Administrator 2 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates, operates and maintains electronic security services inclusive of intrusion detection, access control, biometric authentication, video surveillance, audio visual, it systems, perimeter defense and command and … control systems for federal, local and commercial customers across high-growth markets. Responsibilities The LENEL System Administrator will be responsible for configuring, testing, troubleshooting, and maintaining large enterprise LENEL systems. Duties include: Provide daily, weekly, monthly, and quarterly system administration tasks to maintain high availability of a Lenel based access control system Verify and maintain systemMore ❯
with senior team members to ensure systems are secure, compliant, and properly configured according to federal regulations. Additionally, in this position you will: Provide aid to the program, organizations, system, or enclave's information assurance program. Assist in proposing, coordinating, implementing, and enforcing informationsystem security policies, standards, and methodologies. Maintain operational security posture … for information system. Assist with the management of security aspects of the informationsystem and perform day-to-day security operations. Provide configuration management for informationsystems security software, hardware, and firmware. Review security documentation to evaluate changes to systems and assess the security impact of those changes. Experience … tracking remediation efforts, validating closure evidence, prioritizing and communicating risk, and ensuring timely. Oversee Configuration Management: Manage changes to security-relevant software, hardware, and firmware to maintain system security. Basic Qualifications: As a requirement of this position, all candidates must be a U.S. Citizen. In accordance with 8 U.S.C. 1324b(a)(2)(C) , Epsilon will not consider More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
as a Lead Security Architect to play a key role in our security architecture function at an exciting time. Are you a proactive problem solver with strong stakeholder management skills? This could be the role for you! You'll take responsibility for the security solutions and Security architecture for applications, information and infrastructure. Providing advice, guidance … benefit of the organization and/or the end user of technology services. This includes devising and managing security initiatives to enable exploitation of digital services, capacity, performance, and system availability improvements that ensure business targets are met or exceeded and legacy services decommissioned, whilst ensuring data security and controlled access to data. 24. Responsible for providing expert help … of business outcomes 3.Creatively interpreting strategy and translate emerging trends and technologies to design innovative security solutions and controls which benefit the organisation, reducing risk and enable opportunity. 4.Complex system, information and security solution design. 5.Developing and implementing security solution and enterprise architecture and design strategies in a multi supplier environment 6.Comprehensive and recent experience in architecting More ❯
with senior team members to ensure systems are secure, compliant, and properly configured according to federal regulations. Additionally, in this position you will: Provide aid to the program, organizations, system, or enclave's information assurance program. Assist in proposing, coordinating, implementing, and enforcing informationsystem security policies, standards, and methodologies. Maintain operational security posture … for information system. Assist with the management of security aspects of the informationsystem and perform day-to-day security operations. Provide configuration management for informationsystems security software, hardware, and firmware. Review security documentation to evaluate changes to systems and assess the security impact of those changes. Experience … tracking remediation efforts, validating closure evidence, prioritizing and communicating risk, and ensuring timely. Oversee Configuration Management: Manage changes to security-relevant software, hardware, and firmware to maintain system security. Basic Qualifications: As a requirement of this position, all candidates must be a U.S. Citizen. In accordance with 8 U.S.C. 1324b(a)(2)(C) , Epsilon will not consider More ❯
Springfield, VA area. The selected candidate duties shall include. • Aid the customer in directing requirements engineering, solutions engineering, and services development, scheduling, integration, testing, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and miscellaneous Agencies. • Assist in the planning and trace of user requirements, architectures trace, procedures, and potential problems … support to the customer in performing systems integration activities. • Lead Analysis and Course of Actions, Trade Studies, and Engineering evaluations. • Assists the Government in strategic technical planning, project management, performance engineering, risk management and interface design. • Provides SME advice to the Government in the areas of relating vision, strategy, plans, needs, requirements, and process and capability … SCI • Expert-level experience working in government or industry in relevant work areas including DoD/IC Acquisition Process, Requirements Process, PPBES Process or systems engineering of large complex System of Systems or Service Oriented Architecture environments residing in cloud, on premise, or hybrid infrastructures. • Experience with and strong understanding of systems engineering lifecycle. Desired, Not Required: • Master's More ❯
System Engineer (Senior): Overall Assignment Description: The N2W Deployment Systems Engineer shall provide systems engineering, systems integration, project management, process and schedule documentation support. The N2W Deployment Systems Engineer will support the Enterprise Deployment process planning, deployment program coordination, schedule development, mission dependency development and documentation of the deployment of the NCW Enterprise to the new N2W … NGA organization. The Deployment Systems Engineer shall work side-by-side with contractor and government personnel to ensure issues related to the NCW deployment are addressed. Duties: Support Deployment System Engineering aspects of the NCW Enterprise including: identify, manage, and resolve specific technical requirement issues affecting the deployment of the NCW Enterprise for the new N2W building; assist in … performing Analysis of Alternatives (AoA); develop Enterprise deployment roadmaps and schedules. The System Engineer will act as a technical point of contact for many of the N2W Deployment activities, work with other teams to complete studies/research, develop concept of operations (CONOPS) in support of establishing deployment processes and schedules. Assist in the development of mitigation strategies and More ❯
Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI … last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a … Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure informationsystem operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA management. Must have at least five (05) years More ❯
with government and company security policies and procedures. The successful candidate is expected to have a working knowledge of National Institute of Standards and Technology (NIST) informationsystem protection policies and Risk Management Framework (RMF) procedures and tools as prescribed within the Defense Counterintelligence and Security Agency (DCSA), DCSA Assessment and Authorization Manual (DAAPM) and … work independently at our facility in Huntsville, AL. Responsibilities: Ensure compliance with the NISPOM and other government and DoD directives for client contract requirements Develop and maintain a formal System Security Plan, submitting and updating in eMASS as required to ensure continued system accreditation Address POAMs Coordinate with internal and external customers including program managers, system users … DCSA, and the Facility Security Officer (FSO) Install, configure, test, and maintain servers, desktop computers, application software, and systemmanagement and auditing tools, backups and redundancy systems. Perform IT ISSM/ISSO related functions within an open storage area Provide support with vendors and other IT personnel for problem resolution. Complete reporting to the FSO, Insider Threat More ❯
with government and company security policies and procedures. The successful candidate is expected to have a working knowledge of National Institute of Standards and Technology (NIST) informationsystem protection policies and Risk Management Framework (RMF) procedures and tools as prescribed within the Defense Counterintelligence and Security Agency (DCSA), DCSA Assessment and Authorization Manual (DAAPM) and … work independently at our facility in Huntsville, AL. Responsibilities: Ensure compliance with the NISPOM and other government and DoD directives for client contract requirements Develop and maintain a formal System Security Plan, submitting and updating in eMASS as required to ensure continued system accreditation Address POAMs Coordinate with internal and external customers including program managers, system users … DCSA, and the Facility Security Officer (FSO) Install, configure, test, and maintain servers, desktop computers, application software, and systemmanagement and auditing tools, backups and redundancy systems. Perform IT ISSM/ISSO related functions within an open storage area Provide support with vendors and other IT personnel for problem resolution. Complete reporting to the FSO, Insider Threat More ❯
Opportunity: IMG is seeking a skilled Linux System Administrator to support our customer's enterprise RedHat Linux environment. This role involves ensuring the stability, security, and performance of these systems while adhering to U.S. government risk management frameworks such as NIST 800-53. the administrator will handle system administration tasks, perform regular updates and security … the development of Plans of Action and Milestone (POA&Ms), Risk Management Framework (RMF) and Risk Based Decisions (RBDs) for deficiencies found during the informationsystem authorization process. Job duties include: Administer and optimize RedHat Linux systems, OpenShift, VMWare, and Cloudera platforms including authentication, cluster management, user management, monitoring, performance and … data management. Implement and enforce security measures to meet NIST 800-53 standards. Monitor system performance, troubleshoot issues, and perform regular maintenance. Manage system updates, patches, and upgrades to ensure system integrity. Develop and enforce backup and disaster recovery plans. Provide support for system configurations, user management, and access control. Document system configurations More ❯
Description Provides support for implementation, troubleshooting and maintenance of information Technology (IT) systems. Manages IT system infrastructure and any processes related to these systems. Provides support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help … problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and installs/loads operating system software, troubleshoots, maintains … and resolution of problems Perform account management, e.g. establishing, activating, modifying, disabling, and removing accounts. Provide configuration management, implementation, and sustainment of compliance with applicable system security controls. Perform periodic vulnerability scans of systems Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server More ❯
your local branch, you might have access to an office, but many volunteers are based at home. This flexible role involves using our on-line financial managementsystem and on-line bank accounts and so can be done when and where suits you best. You will need to attend a number of branch committee meetings each year. … surplus monies from grants as appropriate. Providing reports to the branch committee and to SSAFA's Central Office Maintaining accurate records using our on-line finance managementsystem Being a positive ambassador for SSAFA remembering that anyone you meet could be a potential client, volunteer, or fundraiser. Volunteering within the standards and values of SSAFA including observing … What training and support would you receive? Role specific training to prepare you for your voluntary role - treasurers webinar (with some pre-course learning), and financial managementsystem training. Mandatory on-line training modules to complete at home, so you are up to date on how to keep clients, their families safe and personal informationMore ❯
BCT is seeking an ISSO to serve as a principal advisor to the Government on all matters, technical and otherwise, involving the security of an InformationSystem (IS) A career at BCT-LLC says you want to contribute and make a difference to something larger than yourself where success results from the dedication our team members have … Account Management o Vulnerability Management o Security Incident Management o POA&M Management o Reauthorization o Decommissioning o Collaborate with the System Owner to maintain Approval to Operate (ATO), including the resolution of any Plans of Action & Milestones (POA&M) documents issued by the DAO. o Maintain and validate account and … vulnerability management. o Develop and provide updated System Security Plans (SSPs) and supporting documentation (e.g. SECONOPs, diagrams, Privileged User's Guide). • Respond to any data calls. • Provide security design guidance and analysis to the project team throughout the Risk Management Framework (RMF) process. o Collaborate with the InformationSystem Security Engineer (ISSE) in More ❯
This role is a coordination role supporting the AreaBuilding Information Modelling (BIM)Manager. Responsible for assurance and reporting of BIM information. Also responsible for supporting construction team with model and drawing development. Flexible working: We welcome you to ask about the flexibility you need. This might be part-time, remote working, or compressed hours for example. Anyone who … HS2. It is an SCSJV requirement that all employees, Design House, and Supply Chains must implement and comply with the requirements of ISO 9001:2015 Quality ManagementSystem, ISO 14001:2015 Environmental ManagementSystem with guidance for use", OHSAS 18001:2017 Occupational Health and Safety ManagementSystems and ISO/IEC … Information Security ManagementSystem, Policies, Plans, Procedures and Processes, and statutory requirements as they affect the Joint Venture 's operations and ensure that the requirements, as applicable within their discipline, are effectively implemented on the project. Develop a culture of safety on the project through the absolute commitment to the Zero Accidents target and ethos More ❯
Description Provides support for implementation, troubleshooting and maintenance of information Technology (IT) systems. Manages IT system infrastructure and any processes related to these systems. Provides support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help … problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and installs/loads operating system software, troubleshoots, maintains … and resolution of problems Perform account management, e.g. establishing, activating, modifying, disabling, and removing accounts. Provide configuration management, implementation, and sustainment of compliance with applicable system security controls. Perform periodic vulnerability scans of systems Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server More ❯
Summary The Senior InformationSystem Security Officer (Sr. ISSO) will assist in preparation, development, and maintenance of specialized InformationSystems (IS) security plans used to obtain/retain DCSA accreditation. Essential Duties and Responsibilities may include the following. Other duties may be assigned. Review and revise IS system plans documentation based on analysis of … changes or special security requirements. Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices. You will be required to oversee the system compliance, and auditing of the information systems. Oversees the informationsystems readying system configurations for ISSM certification and/or DCSA accreditation/assessment. … and virtualization hosts and any virtualized systems and appliances. Assists in spill containment and cleanup. Participates in investigations relating to any IS security violations and provides "lessons learned" information to the IS community to prevent reoccurrence. Assists the InformationSystems Security Manager (ISSM) and implements informationsystems security tasks, as required for safeguarding, handling More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
a Cyber Security Team Leader to join our DDAT team. This is a unique opportunity to support our people to ensure the security of our network infrastructure and informationsystems, while enabling open and modern secure digital services. As Team Leader, you will lead a team to support the NHSBSA business areas to understand and shape security requirements … the integrity of the NHS BSAs Information Assets. Assesses the effectiveness of firewalls, Gateways, IDS (Intrusion Detection Systems) and IPS (Intrusion Prevention Systems) to improve network/system resilience3. Ensure that all controls are in place to ensure continued certification to the Information Security Management Standard ISO27001 and continued adherence to the National … them accordingly.8. Fully engage and contribute to delivery of projects, change and continuous improvements by providing specialist information security advice.9. Provides constructive and timely expert advice to system developers on whether proposed solutions are likely to gain assurance.10. Responsible for providing expert help and guidance across the lifecycle of a security solution implementation, including technical and non More ❯
BFI's Data and Digital Preservation department, in the role of Collections Data Manager. This new role will manage the BFI National Archive's Axiell collections managementsystem infrastructure (the Collections Information Database - CID): oversee support and development, implement a roadmap for improvement, enhancement, and integration; ensure that all components meet current and future requirements … for good practice management of BFI National Archive and BFI Reuben Library collections data. The role will also take the lead in the planning and implementation of best practice collections documentation and informationmanagement procedures and workflows. Key responsibilities include: Manage the key components of the Collections Information Database (CID) infrastructure, including … Axiell Collections, Axiell Internet Server, Axiell Move, and Workflow. Take responsibility for creating and implementing informationmanagement and documentation procedures and workflows, ensuring that collections systems and data support BFI National Archive procedures and deliver its strategic objectives and business processes. Provide line management and leadership for a Collections Information Database Specialist More ❯
a safe manner. Manage site and gate operations based on planned forecasts from the logistics team. Produce KPI reports in line with SCS and HS2 requirements. Non-conformance management, supporting solution implementation to avoid repeat occurrences. Any other business relating to organization the Duty Access Managers role. Please note the above list of activities is not a full … HS2. It is an SCSJV requirement that all employees, Design House, and Supply Chains must implement and comply with the requirements of ISO 9001:2015 Quality ManagementSystem, ISO 14001:2015 Environmental ManagementSystem with guidance for use", OHSAS 18001:2017 Occupational Health and Safety ManagementSystems and ISO/IEC … Information Security ManagementSystem, Policies, Plans, Procedures and Processes, and statutory requirements as they affect the Joint Venture 's operations and ensure that the requirements, as applicable within their discipline, are effectively implemented on the project. Develop a culture of safety on the project through the absolute commitment to the Zero Accidents target and ethos More ❯
InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Performance shall include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯
InformationSystem Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of informationsystems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational informationsystems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯