requires collaboration with Global IT, cross-functional teams, and third-party partners. Key qualifications include experience in cybersecurity and compliance, strong knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is a full-time role, with travel up to 30% of the time. Responsibilities Implement security protocols and manage information security … contracts. Report service performance to stakeholders. Coordinate with other Tosca functions for effective implementation. Other relevant responsibilities as required. Requirements, Experience & Education Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field; a Master's degree is preferred. At least 5 years of experience in information security, specifically within security … operations, with proven experience in a leadership or management role. Relevant certifications such as CISSP (Certified InformationSystems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified InformationSystems Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK More ❯
requires collaboration with Global IT, cross-functional teams, and third-party partners. Key qualifications include experience in cybersecurity and compliance, strong knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is a full-time role, with travel up to 30% of the time. Responsibilities Implement security protocols and manage information security … contracts. Report service performance to stakeholders. Coordinate with other Tosca functions for effective implementation. Other relevant responsibilities as required. Requirements, Experience & Education Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field; a Master's degree is preferred. At least 5 years of experience in information security, specifically within security … operations, with proven experience in a leadership or management role. Relevant certifications such as CISSP (Certified InformationSystems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified InformationSystems Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK More ❯
london (city of london), south east england, united kingdom
Tosca
requires collaboration with Global IT, cross-functional teams, and third-party partners. Key qualifications include experience in cybersecurity and compliance, strong knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is a full-time role, with travel up to 30% of the time. Responsibilities Implement security protocols and manage information security … contracts. Report service performance to stakeholders. Coordinate with other Tosca functions for effective implementation. Other relevant responsibilities as required. Requirements, Experience & Education Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field; a Master's degree is preferred. At least 5 years of experience in information security, specifically within security … operations, with proven experience in a leadership or management role. Relevant certifications such as CISSP (Certified InformationSystems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified InformationSystems Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK More ❯
requires collaboration with Global IT, cross-functional teams, and third-party partners. Key qualifications include experience in cybersecurity and compliance, strong knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is a full-time role, with travel up to 30% of the time. Responsibilities Implement security protocols and manage information security … contracts. Report service performance to stakeholders. Coordinate with other Tosca functions for effective implementation. Other relevant responsibilities as required. Requirements, Experience & Education Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field; a Master's degree is preferred. At least 5 years of experience in information security, specifically within security … operations, with proven experience in a leadership or management role. Relevant certifications such as CISSP (Certified InformationSystems Security Professional), CISM (Certified Information Security Manager), or CISA (Certified InformationSystems Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK More ❯
Analyst) is preferred. Preferred Education, Experience, & Skills Master's degree in a quantitative field or a related discipline. 5+ years of experience in data analysis, reporting, end data management, preferably in a business or financial setting. Experience with business intelligence and analytics tools, such as data visualization software Strong technical skills, including proficiency in SQL and experience with … database management systems. Certification in a specific data analysis tool or technology (e.g., Certified Analytics Professional, Certified Business Intelligence Analyst). Pay Information Full-Time Salary Range: $146670 - $249330 Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but not limited to: business … an international defense, aerospace and security company which delivers a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. Improving the future and protecting lives is an ambitious mission, but it's what we do at BAE Systems. Working here means using More ❯
MSP/MSSP tool stack solutions, ensuring high availability, security, and operational efficiency across both internal and client environments. This position is collaborative with Cybersecurity, Compliance, and Program Management teams to ensure that infrastructure solutions align with security frameworks, operational best practices, and client needs. Success in this role is measured by improvements in customer retention, profitability, and … cloud environments (Azure, AWS, GCC/GCC High) with a focus on automation, scalability, and performance. Develop and implement automation strategies (PowerShell, Python, Ansible) to streamline provisioning, monitoring, and system management. Maintain 99.99% uptime and high availability through proactive infrastructure monitoring, redundancy strategies, and disaster recovery planning. Ensure compliance with NIST 800-171, CMMC, and FedRAMP, partnering with Cybersecurity … knowledge of networking (firewalls, VPNs, SD-WAN, SASE), Windows/Linux infrastructure, and virtualization technologies. Hands-on experience with automation/scripting (PowerShell, Python, Ansible) to optimize deployments and system management. Proficiency in infrastructure monitoring, performance tuning, and high-availability designs. Strong understanding of MSP/MSSP tool stack management (RMM, PSA, SIEM, EDR, Email Security, Backup More ❯
network traffic and logs for suspicious activity, intrusions, or policy violations. Respond to and investigate security incidents, providing remediation and root cause analysis. Maintain and tune SIEM (Security Information and Event Management) tools for effective alerting. Risk & Compliance Management Conduct regular vulnerability assessments and penetration testing on network systems. Ensure compliance with frameworks and … improvements to strengthen network defenses against evolving threats. Stay current with emerging security technologies, threat landscapes, and industry best practices. Qualifications Education: Bachelor's degree in Computer Science, Information Security, Engineering, or related field (or equivalent experience). Experience: 3-5+ years of experience in network security engineering, administration, or related IT security roles. Hands-on experience … Knowledge of encryption, authentication, and secure access technologies. Excellent troubleshooting, problem-solving, and communication skills. Certifications (Preferred but not required): Cisco Certified Network Professional Security (CCNP Security) Certified InformationSystems Security Professional (CISSP) Certified Ethical Hacker (CEH) GIAC Security certifications (e.g., GSEC, GCIH, GCIA) Soft Skills Strong analytical and critical-thinking skills. Ability to work independently and in More ❯
daunting challenges facing our customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview Encompasses technical, engineering, data analytics, cyber security, management, operational, logistical, and administrative support for Bureau of Diplomatic Security, Cyber and Technology Security Directorate in three key offices/functional areas: Cyber Monitoring and Operations, Cyber Threat and …/or streamline processes and automate work flow. Need to have a strong technical background and expertise in various areas of cybersecurity. Promote awareness of security issues among management and ensure sound security principles are reflected in organizations' visions and goals. Communicate complex security concepts to both technical and non-technical stakeholders, including senior management. Possess strong problem … coaching to team members. Create bulletins, alerts, and/or advisories related to published or developmental standards and/or security principal documents. Ensure that rigorous application of information security/information assurance policies, principles, and practices are implemented in the delivery of all IT services. Evaluate a wide array of existing, new, modified, and/ More ❯
to achieve significant outcomes and impact Assuming responsibility for the entire project and its final deliverablesby maintaining direct engagement with clients Lead cross-functional teams in implementing project management strategies to achieve project objectives, including scope, schedule, and budget Focus on delivery assurance to ensure the efficient and effective implementation of strategic recommendations, utilizing project management … tools such as Microsoft Project, ServiceNow, LeanIX from inception, guiding the team through onboarding to ensure seamless project operations and efficiency Collaborate with senior leadership to align project management practices with organizational goals and objectives Drive continuous improvement of the project management process to enhance project delivery efficiency, effectiveness, and quality Monitor and evaluate project performance … with clients on case goals, critical issues, workplan, implications, recommendations, and implementation plan. Develop and secure client commitment to recommendations and implementation plans Coordinate initiatives and oversee project management processes, standards and governance to ensure project delivers value according to timeline and quality standards Contribute to the key firm building initiatives (Practice/Capability area knowledge building and More ❯
aligning with enterprise logging standards. Architect and guide the design of dashboards, data models, and advanced analytics to support threat detection, forensics, and reporting. Establish and enforce configuration management, security hardening, and change control processes for Splunk platforms. Produce and maintain architecture documentation, including conceptual designs, reference architectures, and operational standards. Provide technical leadership and mentorship to engineers … to inform future platform evolution. Collaborate with cybersecurity leadership and stakeholders to align Splunk architecture with mission objectives. Qualifications and Requirements Bachelor's degree in Cybersecurity, Computer Science, InformationSystems, Engineering, or a related technical discipline; OR 10+ years of equivalent IT experience. 7+ years of IT experience, with at least 3+ years focused on Splunk engineering and … architecture. Current Splunk Enterprise Certified Architect certification (required). Demonstrated expertise in Splunk Enterprise and Splunk ES, including SPL and the Common Information Model. Proven experience in architecting and maintaining Splunk in cloud environments, including familiarity with SmartStore and ASR/MSR. Strong background in distributed systems design, performance tuning, and capacity planning. Proficiency with scripting languages such More ❯
and implement new functionality into software products Document and communicate highly technical concepts effectively to technical and non-technical audiences in a clear and effective manner Communicate with management, customers, developers, and users Work directly with internal and external developers to transition applications into the computer vision platform Maintain the strict confidentiality of sensitive information Observe … and contributions of individuals with diverse backgrounds and experiences and welcome all qualified individuals to apply. Job Qualifications: Typically requires a bachelors or masters degree in computer science, informationsystems or related discipline and two or more years progressive software development experience with a bachelors degree. May substitute equivalent experience in lieu of education. Strong experience with cloud More ❯
Citizenship A minimum of a Department of Defense (DoD) Secret level Security Clearance Proven experience in managing AWS-based hosting and PeopleSoft environments Expertise in cloud infrastructure, stakeholder management, and technical project execution Ability to lead technical meetings and translate complex cloud and ERP concepts into actionable strategies Familiarity with security, compliance, and performance optimization for cloud-hosted … applications Excellent communication, problem-solving, and stakeholder management skills Bachelor's or Master's degree in Computer Science, Engineering, Business, or a related field Thorough understanding of project management techniques and tools. Excellent written and verbal communication skills. Strong analytical, critical thinking, and problem-solving skills. Strong decision-making and leadership skills. Solid organizational skills including … attention to detail and multitasking skills. Must Haves: Working experience with ITIL Processes and Agile teams Self-Motivated, strong work ethic and commitment to quality Understanding of information technology systems including end-user computing devices We would be impressed if you have experience with: BA/BS or higher degree 6 or more years of professional experience as More ❯
ETL/ELT processes and data architectures using modern tools and techniques Lead database design, data modelling, and integration strategies to support analytics at scale Drive Data Integration & Management Design and implement secure, scalable, and efficient data ingestion frameworks across structured, semi-structured, and unstructured data Partner with product owners and engineers to develop data exchange protocols, ensuring … datasets are model-ready Contribute to a cross-functional engineering culture with a focus on quality, automation, and continuous improvement Ensure Secure & Compliant Practices Apply strong knowledge of information security principles to ensure compliant handling of sensitive client data Build and deploy solutions with security, maintainability, and scalability top of mind What You'll Bring An ideal candidate … Solid understanding of software engineering best practices - code reviews, testing frameworks, CI/CD, and code maintainability Experience deploying applications into production environments, including packaging, monitoring, and release management Ability to extract insights from complex and disparate data sets and communicate clearly with stakeholders Hands-on experience with cloud platforms such as AWS, Azure, or GCP Familiarity with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Alpha Omega Integration LLC
.Net/Azure Developer Clearance Required: Public Trust - Federal Client requires US Citizenship Work Location: Arlington, VA - Remote Working at Alpha Omega, a leading provider of IT and management consulting services, is an opportunity to collaborate with great people who have a passion for the services they provide to our clients. We are currently seeking a Sr .Net … release. Respond to, diagnose, and assist in solving production incidents. Participate in root cause analysis and blameless post-mortems. Required Qualifications: Education: BS/BA in Computer Science, InformationSystemsManagement, or similar degree. Experience/Skills: Federal agency requires US Citizenship. Minimum of 10 years' experience developing and maintaining large-scale applications. 5+ years in … as necessary with internal and external support functions when major incidents occur. Preferred Qualifications: Worked in an agile environment as part of an agile team. Salary and Benefit Information: The likely salary range for this position is $114,441 - $170,000. This is not, however, a guarantee of compensation or salary. There are multiple factors that are considered More ❯
area of SPL modeling and simulation characterization, scenario development, and/or analysis. They maintain the daily operations of SPL networks, and work with NSSI IT to define SPL system solutions to meet the NSSI's mission. This role focuses on maintaining the framework and tools needed to validate the software and hardware systems that power the SPL, including … J), GPS Interface and Navigation Tool (GIANT), Integrated Solutions for Situational Awareness Workstation (ISSA-Wks), Spark Chat, Joint Semi-Automated Forces (JSAF), Processing and Display Subsystem Migration (PDS-M), System Toolkit (STK), and Integrated C4I System Framework (ICSF), in a classified, closed environment. • Ensure appropriate security posture is maintained for the Space Power Lab, specifically to maintain its … when changes occur that might affect IT systems accreditation package. • Perform security reviews, identify gaps in security architecture, and update a security risk management plan with other System Administrators, Cybersecurity Liaisons and ISSM/ISSO. • Provide Configuration Management recommendations for security-relevant informationsystem software and hardware. • Perform risk analysis (e.g., threat More ❯
as hands-on vulnerability testing experience. The selected candidate will have numerous responsibilities from day to day drawn from a wide array of activities. Primary Responsibilities Validating and verifying system security requirements and establishing system security designs for large-scale systems, major system elements, and interfacing systems that are part of a large complex network environment with … geographically distributed components. Identifying and implementing appropriate information security architectures and functionality to ensure Recommending and developing technical solutions, products, and standards based on current and desired system security architecture. Assessing and mitigating system security threats and risks throughout the program life cycle. Leading and/or contributing to the security planning, assessment, risk analysis, risk … management, certification and awareness activities for various system and networking operations. Effectively collaborating with other internal technical experts on a day-to-day basis. Communicating with Program Managers and POCs from customer organizations when necessary, regarding Security issues of significant importance. Participating in Program Increment Planning and related agile team activities. Working closely with System Engineering More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency Security Policy and Enterprise Solutions. Supports the building of security architectures. Enforces the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking … operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication; and authorization More ❯
Description & Requirements Maximus is seeking a highly skilled InformationSystems Security Engineer (ISSE) to join our team in Arlington, VA. The ideal candidate will excel in the technical aspects of security, including the design, implementation, and maintenance of security solutions within a highly classified hybrid environment. This role requires a deep understanding of cybersecurity principles and the ability … Duties and Responsibilities: Technical Security Expertise: Provide technical expertise in the design, implementation, and maintenance of security solutions. Ensure that security measures are integrated into the informationsystem throughout its lifecycle. Configuration and Management of Security Tools: Configure, administer, and maintain security tools, including ACAS, Splunk, MS Defender, and other cyber tools to ensure compliance … (SIEM) systems, Intrusion Detection Systems (IDS), Data Loss Prevention (DLP) tools, and security audit log repositories and databases. Collaboration and Support: Work closely with the InformationSystem Security Manager (ISSM), InformationSystem Security Officer (ISSO), and other stakeholders to ensure that security measures align with overall security policies. Support Cyber Analysts by providing More ❯
the ever-growing possibilities in IT and meeting our clients' challenges with up-to-the-minute, customized, and powerful solutions. CTC is looking for talented Senior InformationSystem Administrator with experience accrediting, maintaining, and ensuring cyber security for servers and networks in a classified research and development lab working with space-based information systems. CTC … assurance (IA) functions, particularly those focusing on IA planning, infrastructure protection, and defensive strategy. Contribute to security planning, assessment, risk analysis, risk management, certification, security awareness, system administration, networking, maintenance, and continuous monitoring of Windows and Linux servers, workstations, and virtual machines in standalone and networked environments. Basic Qualifications: BA/BS Degree in Computer Science … related experience, a MA/MS Degree plus 4-6 years of directly related experience or a PhD plus 2-4 years of directly related experience. Working knowledge of system security design process, defense-in-depth/breadth, information security domains, identification, authentication, risk management, contingency planning, incident handling, configuration control, change managementMore ❯
help. Our team is looking for a Senior InformationSystems Security Officer (ISSO). In this role you will get to focus on the cybersecurity aspects of system design to deal with cyber-related disruptions, minimizing misuse and malicious behavior, while supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … concepts and protocols, and network security methodologies; network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth) Implement security policies and procedures including System Security Plans (SSP), Security Controls Traceability Matrices (SCTM), Risk Assessment Reports (RAR), Continuous Monitoring Plans (ConMon), Security Assessment Reports (SAR), and Plan of Actions and Milestones (POA&M) Strong … ability to produce and maintain varied technical documentation, policy, and procedures such as: Ports Protocols and Services Management (PPSM) worksheets, system and network diagrams/descriptions, and Standard Operating Procedures (SOPs) Coordinate and perform security audits and system updates to identify nonstandard events and maintain system and information integrity Play an active role More ❯
Systems Security Engineer (ISSE) to serve as the Program Office's information security professional responsible for managing all aspects of an organization's information security system, including researching, testing, training, and implementing programs designed to safeguard sensitive information from possible compromise. Responsibilities: This position requires travel, up to 25% per month. Works with … System Engineering teams to incorporate cyber resiliency objectives, techniques, and design principles into all system engineering and development efforts throughout the systems development life cycle (SDLC). Develop and maintain documentation and diagrams for security tools, system environments, and cloud operations. Perform requirements analysis, design, and integration for complex software applications and collaboration infrastructures. Participate in the … Requests and assisting in the assessment of security impact of proposed changes. Write implementation and design documents describing how security features are implemented. Create and maintain informationsystem security documentation, Standard Operating Procedures (SOP), and provide guidance on active Plans of Action and Milestones (POA&M). Conduct periodic and continuous monitoring of the system, procedures More ❯
a minimum of 5 days per week and is only located in the location(s) posted. No relocation is offered. Description of Job Duties/Responsibilities: Provide Domain Name System (DNS), IP Address Management (IPAM), Load Balancer, and Webproxy services to end-users. Interface with end-users and other engineering entities. Maintain relevant technical documentation. Develop and … maintain DNS, IPAM, Load Balancer, and Webproxy production system and solution, ensuring high services availability and resiliency. Perform lab vendor equipment, software, application, and solution evaluation, testing, integration, and security certification relevant to DNS, IPAM, Load Balancer, and Webproxy services. Support Tier-4 production troubleshooting of the services above. Develop pro-active analysis and solutions for the NMS and … to include testing, validation, and verification, as well as using modern tools and methods such as Ansible, Python, Terraform, and/or Windows PowerShell. Troubleshoot, diagnose, and resolve complex system and services issues to include Root Cause Analysis (RCA). System performance analysis and tuning to ensure efficient and optimally configured solutions. Leading engineering projects and teams through More ❯
security architectures for informationsystems Conduct risk assessments and provide mitigation strategies for identified vulnerabilities Support the Risk Management Framework (RMF) process, including preparation of System Security Plans (SSP), Contingency Plans (CP), Security Assessment Reports (SAR), and Plans of Action and Milestones (POA&M) Coordinate and respond to external organizations regarding RMF efforts Collaborate with … System Owners and other stakeholders to ensure compliance with organizational security standards Integrate security controls into the software development lifecycle (SDLC) Work with developers and cloud engineers to integrate security and automation in the CI/CD pipeline Support and engineer with tools such as AWS CloudWatch, AWS Security Hub, GuardDuty, Splunk, or ELK for monitoring, logging, and compliance … Manage multiple Splunk environments and develop Splunk queries and dashboards as needed Participate in security testing, audits, and incident response activities Provide security engineering support throughout all system lifecycle phases Stay current with emerging security threats and technologies Qualifications Required: Active TS/SCI with Polygraph (Preferrably from this client) Bachelor's degree in Computer Science, Cybersecurity, InformationMore ❯
Job Number: R InformationSystems Security Manager The Opportunity : Cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to Department of Defense agencies and related components. In all of this "cyber noise," how can these organizations understand their risks and how to mitigate them? The answer is you-an … contained in best practice documentation, such as NIST SP 800-30, SP 800-53, SP 800-128, SP 800-160, SP 800-171, or CIS benchmarks, in support of system security configurations, practices, and oversight 3+ years of experience providing cybersecurity leadership in an ISSM capacity and interfacing with internal and external SMEs, such as PMs, Cyber Assessors, and … control implementations asso cia ted with RMF, FedRAMP, ICD 503, and DoD Information Levels, including applying them to the design and implementation of IT solutions to achieve system authorizations Experience implementing and maintaining security controls within AWS cloud, containerized, CI/CD pipeline, and agile development environments Experience developing and reviewing ATO authorization packages in Xacta or More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
NTT Global Data Centers EMEA UK ltd
As our Information Security … Management Specialist (m/f/d) , you'llprovide experienced support in the implementation and management of the Information Security ManagementSystem (ISMS) framework in alignment of current ISO 27001 standard and guidelines. With a focus on cybersecurity, this role involves leading risk assessments, ensuring alignment with industry standards and regulations … and following information security practices and policies. What you will do Contribute to implementation, maintenance along with continuous improvement and associated instructional documentation of ISMS and its controls in line with the requirements of ISO 27001:2022 and similar standards. Ensure compliance and maintenance of ISO 27001:2022 standard as well as all Information Security requirements More ❯