d love for you to join our team! Responsibilities Directly support Naval Reactors at NRHQ Day-to-day tasking provided by Naval Reactors; priorities established by B&A management The ability to recognize Naval Nuclear Propulsion Program information Completion of specialized training in E.O. 13526 requirements, the declassification analysis process, use of classification and clarifying guides … recognition of NNPP equities, understanding of information bracketing, following all Operating Instructions (SOP), and be capable of proper disposition of documents reviewed Completion of training by Department of Energy and be certified as Historical Records Reviewers (HRRDR) for the purpose of identifying Restricted Data and Formerly Restricted Data in documents under review Completion of training by Fluor Marine … other agencies and make proper referrals of documents to those agencies Perform the following reviews to a high standard with little to no supervision: Systematic Reviews, freedom of Information Act, mandatory Declassification Review, litigation Reviews, referrals Reviews, records Management, go-no-go Reviews, public Utterance. Perform the following administrative tasks timely and efficiently: Any general administrative More ❯
the enterprise. The Threat Emulation SME will perform activities related to assisting cyber security operations team members to advance organizational understanding over risks and potential exposures related to software, system, and network weaknesses using advanced security/pen testing and auditing methods. Advanced Cyber Threat Emulation members also engage with senior leadership to identify, report, and perform real-world … Analyzes for weaknesses in company systems. Devises tests and scenarios for various penetration tests. Documents results and communicates them to engineers and management. Provides recommendations for new technologies and system designs according to test results. Develops automated testing programs where possible and efficient. JOB DUTIES AND RESPONSIBILITIES • Research and remain up to date with emerging threats and Threat Emulation … Team. • Conduct research on commercial and open-source tools that may address capability gaps in detecting and/or blocking malicious activity. • Be familiar with development of attack vectors, system and infrastructure reconnaissance, collection of open-source intelligence, enumeration, and foot-printing of target networks and services. • Conduct in-depth analysis of computer network and host data to determine More ❯
/or income statements. Prepares reports of findings and recommendations, compiles and consolidates financial plans and provides insights to management. Develops, maintains, and establishes operational specifications for financial informationsystems considering such things as information flow, volume, ad hoc reporting, and analysis. May provide analysis on business development and monitors business performance. What We Are Looking More ❯
manchester, north west england, united kingdom Hybrid / WFH Options
CHEP
Key Responsibilities May Include: Lead the Enterprise Architecture team, guiding them in setting technology policies, standards, and governance practices across the organization, ensuring compliance with lifecycle and asset management standards. Develop and maintain the business, technical, application, information, process, and infrastructure views of the organization's architecture to ensure cohesive and efficient operations. Ensure the technology … particularly in collaborating with Product and Platform teams to align technology solutions with business objectives. This includes experience in leading the design of integrated systems. Team Leadership and Management: A track record of leading and managing teams of architects and specialists. This includes direct experience in providing guidance, mentorship, and direction to ensure adherence to architectural standards and … plans, with a focus on the recovery of all business technology products and services. This also involves collaborating with cross-functional teams to ensure effective DR execution. Knowledge Management and Repository Development: Background in developing and maintaining enterprise-wide knowledge repositories of technology and tools. This encompasses ensuring accessibility and relevance of knowledge resources for architectural decision-making. More ❯
addlestone, south east england, united kingdom Hybrid / WFH Options
CHEP
Key Responsibilities May Include: Lead the Enterprise Architecture team, guiding them in setting technology policies, standards, and governance practices across the organization, ensuring compliance with lifecycle and asset management standards. Develop and maintain the business, technical, application, information, process, and infrastructure views of the organization's architecture to ensure cohesive and efficient operations. Ensure the technology … particularly in collaborating with Product and Platform teams to align technology solutions with business objectives. This includes experience in leading the design of integrated systems. Team Leadership and Management: A track record of leading and managing teams of architects and specialists. This includes direct experience in providing guidance, mentorship, and direction to ensure adherence to architectural standards and … plans, with a focus on the recovery of all business technology products and services. This also involves collaborating with cross-functional teams to ensure effective DR execution. Knowledge Management and Repository Development: Background in developing and maintaining enterprise-wide knowledge repositories of technology and tools. This encompasses ensuring accessibility and relevance of knowledge resources for architectural decision-making. More ❯
activities. Conducts ad hoc analyses to investigate ongoing or operational issues. Conducts benchmarking studies and studies of industry trends. Gathers data from multiple sources, reconciles conflicts, and distills information to appropriate level. Gathers and analyzes requirements. Works with technical staff and stakeholders to align solutions to business requirements. Documents program activities and projects, maintain records of that information, and communicate those results in various forms (reports, data sheets, etc.) to support management needs. Communicates findings and insights to cross-functional team members and management. Gathers and reports critical information from meetings with various stakeholders. Analyzes resource usage and recommends allocations/adjustments to maintain cost efficiency. Prioritizes initiatives based on business needs … with the full development life cycle of technology-based learning products. Knowledge of development tools, methodologies, and best practices for technology-based learning. Knowledge of SCORM and learning management systems. Demonstrated experience creating detailed reports and giving presentations. Demonstrated experience developing and leading teams. Demonstrated experience in gathering requirements, writing requirements, and documenting user stories. Demonstrated experience writing More ❯
network architecture specifications and artifacts. Designs and plans network communications systems. Provides specifications and detailed schematics for network architecture. Conducts cost/benefit analysis and provides specific detailed information for hardware and software selection, implementation techniques and tools for the most efficient solution to meet business needs, including present and future capacity requirements. Conducts testing of network design. … MS/MA or 3 to 5 years with PhD. 2 years of Cisco experience; proven expertise with Cisco network hardware including: routers, switches, firewalls, unified communications equipment. Information Assurance Certifications consistent with the 8570 IAT Level III. Proven experience in VMware environments. Proven experience in virtual and physical Internet Protocol and Fiber Channel networks and routing protocols. … in Software-Defined Networking (SDN). Experience with Infrastructure as Code (IaC) (e.g., Terraform, CloudFormation). Familiarity with Agile Methodologies for iterative network project management. Experience with Change Management Processes to ensure smooth network updates and configurations. Knowledge of DISN (Department of Defense Information Network) or CANES (Consolidated Afloat Networks and Enterprise Services) systems. Proficiency in More ❯
systems engineers to ensure USSPACECOM systems operate at peak functionality. Work supporting USSPACECOM will be conducted at the government's facilities in Colorado Springs, CO. Developing and designing comprehensive system architectures (e.g. VDI, CDI, etc.) that meet USSPACECOM requirements Ensuring systems are scalable, secure, and capable of integrating with existing and future USSPACECOM infrastructure Implementing and enforcing USSPACECOM cybersecurity … protocols and policies within system designs Ensuring all systems comply with USSPACECOM regulations, standards, and best practices, including NIST guidelines and other relevant frameworks Providing technical leadership to the systems engineering team and other IT staff Serving as the subject matter expert on system architecture and informationsystemsmanagement Monitoring system performance to … identify and resolve issues and improve efficiency Implementing optimization strategies to enhance system performance and reliability Evaluating and selecting technologies and vendors that align with USSPACECOM criteria and project requirements Managing vendor relationships and ensuring they meet contractual obligations and performance standards Providing training and knowledge transfer to systems engineers and other relevant personnel Ensuring the team is equipped More ❯
Polygraph Clearance. 2HB Incorporated is seeking a Senior InformationSystems Security Officer to support its government customer in Annapolis Junction, MD. Provides aid to the program, organization, system, or enclave's information assurance program. Lends assistance for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintains operational security posture … for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the informationsystem and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for … processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for informationsystem security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the-shelf cryptography; identification; authentication; and More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Responsibilities • Designs, develops, implements and/or integrates IA and security systems … and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. • Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of security policy and enterprise … solutions. • Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. • Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities More ❯
authorization of current and future systems, as well as to review and revise systems security documentation on proposed systems. ISSOs shall know how to implement common informationsystem security practices, policies, and technologies. Additionally, ISSOs demonstrate self-motivation, initiative, sound judgement, and effective interpersonal skills, team building skills, and effective communication skills. What will you do? Collaborate … with system stakeholders and teammates to enhance system security Communicate effectively with all security stakeholders Create, revise, or review cybersecurity documentation Proactively identify opportunities for increasing customer value and engagement Act as a Data Transfer Agent between systems of varying security domains Inventory, track, and control removable media and portable electronic devices Advise stakeholders on NIST SP … RMF workflows and requirements Review SIEM and RMF workflow tools to advise ISSM on system security baselines and authorization statuses Advise system stakeholders on acceptable use and applicable cybersecurity policy or regulation Properly report and document security incidents and response actions Do you have what it takes? Requirements Clearance: Active TS/SCI with Polygraph Bachelor's degree More ❯
OVERVIEW The InformationSystem Security Engineer II and III is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated competency with specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a … Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. Must have active Secret clearance and be a US Citizen. The InformationSystem Security Engineer II and III: Support all aspects of Program Information Assurance (IA) activities across the Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) lifecycle. Apply knowledge … documents to support the development and maintenance of IA artifacts and traceability documents required for Authority to Operate (ATO) compliance. Evaluate and validate security solutions to ensure they meet system requirements for handling up to classified information. Maintain and/or oversee the operational security posture of assigned informationsystems or programs. Assist in the development and More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Supports the building of security architecture. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking … operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Apply system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization More ❯
Overview VTG is looking for an InformationSystem Security Engineer (ISSE)s in multiple locations. (Note: position is contingent upon program award and the postions are located in Chantilly VA, Auroro CO, Springfield VA, Las Cruces NM, LAAFB, Vanderberg (Lompoc) CA and Ft Meade MD.) What will you do? An ISSE is responsible for conducting IS security … engineering principles, and secure coding techniques and coordinates activities with A&A stakeholders. The ISSE functions are commensurate with the IASAE position description, experience and certifications. ISSEs with Space System experience is required, specific Space System ISSE required qualifications. This IASAE experience requires working relevant types of Space systems based on location, and understanding space requirements and protection … science Minimum 8+ years IA relevant experience Knowledge of and experience with ICD 503 and the Government's certification and accreditation process Networks, computer components, protocols, and COTS technology System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers SW integration of COTS and GOTS products Virtualization More ❯
Responsibilities: • Assist the InformationSystem Security Managers (ISSM) in executing their duties and responsibilities. • Ensure compliance with all NAVSEA, DON, and DoD cybersecurity policies. • Ensure relevant Cybersecurity (CS) policy and procedural documentation is current and accessible to properly authorized individuals. • Coordinate cybersecurity processes and activities for assigned systems. • Maintain and report Assess Only (AO) and Assessment and … Authorization (A&A) status to Program Managers, InformationSystem Owners, and ISSMs. • Provide oversight of Security Plans for assigned systems throughout their lifecycle. • Manage and maintain Plan of Actions and Milestones (POA&M), ensuring vulnerabilities are properly tracked, mitigated, and where possible, remediated. • Assist with the identification of security control baselines and applicable overlays. • Coordinate the validation … . • Register and maintain systems in Enterprise Mission Assurance Support Service (eMASS). • Plan and coordinate security control testing during Risk Assessments and Annual Security Reviews. • Report changes in system security posture to the ISSM. • Ensure the execution of Continuous Monitoring related requirements as defined in the System Level Continuous Monitoring (SLCM) Strategy. • Review all data produced by More ❯
McLaughlin Research has several openings (pending award) for InformationSystems Security Engineers at the Naval Surface Warfare Center, Philadelphia Division. Position Summary The InformationSystem Security Engineer (ISSE) designs, develops, implements, and integrates advanced cybersecurity solutions to protect the organization's informationsystems and data assets. The ISSE III functions as a technical … subject matter expert, applying security engineering principles across the system development lifecycle to identify vulnerabilities, mitigate risks, and maintain compliance with information assurance standards. This position often works with classified systems and complex networking environments. Key Responsibilities • Security Architecture and Design: Designing and implementing security architectures for various environments and ensuring trusted relationships between systems. • Risk Management and Compliance: Assessing and mitigating threats, leading the creation of security artifacts like SSPs and RARs, supporting system accreditation under frameworks like RMF, and ensuring compliance with policies such as DoD and NIST SP 800-series. • Vulnerability Management and Incident Response: Conducting vulnerability assessments and ethical hacking, performing risk assessments, leading incident response, and managing More ❯
s mission to "Define and Redefine the State of Possible," please apply today! The Senior InformationSystems Security Officer (ISSO) will provide aid to the program, organization, system, or enclave's information assurance program and will also lend assistance for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies in … addition to the below. Maintains operational security posture for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the informationsystem and performs day-to-day security operations of the system. Evaluates security … they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for informationsystem security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs More ❯
customer who upholds America's status as the "Land of the Free" every day, at work, or at play. RESPONSIBILITIES Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing InformationSystem Security policies, standards, and methodologies. … Manage operational security posture for an InformationSystem or program to ensure InformationSystem Security policies, standards, and procedures are established and followed. Provide management of security aspects of the InformationSystem and perform day-to-day security operations of the system. REQUIREMENTS 8 years of experience coordinating with … information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for informationsystem security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include SystemMore ❯
maintenance and design of systems within the customer space. The ISSE will perform technical security assessments of computing environments to identify vulnerability and recommend mitigation strategies. They will validate system security requirements definitions and analysis. Design, develop, implement and/or integrate Cybersecurity and security systems and system components and assist architects and systems developers in implementation of … other project team members. Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of Cybersecurity architectures, systems, or system components. Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures. Support security planning, assessment, risk analysis, and risk management. … Identify overall security requirements for the proper handling of Government data. Provide security planning, assessment, risk analysis, and risk management. Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements. Recommend system-level solutions to resolve security requirements. Qualifications Clearance Level TS/SCI level clearance with a Full More ❯
Requisition: S Title: System Administrator I or II - Identity and Access Management - IAM (1 position to be filled) FLSA status: Exempt Hiring Salary: This position is a pay grade 10 or 13. Please see Pay Grade Table at: Occupational Category: Professional Department: IT Systems Division: Information Technology Open Date: 09/24/2025 Open … Until Filled: Yes Educational and Experience Requirement: System Administrator I IAM (Identity and Access Management) - Bachelor's degree with a major in computer science or related field from an accredited institution with one year relevant experience. A combination of education, experience, certifications, and training that would produce the required knowledge and abilities could be considered. System … related field from an accredited institution. Master's degree preferred. Two years of relevant experience. A currently valid Microsoft Technology Associate certificate or higher, or a Red Hat Certified System Administrator certificate or higher could be substituted for one year of experience. A combination of education, experience, certifications, and training that would produce the required knowledge and abilities could More ❯
Seize your opportunity to make a personal impact as an InformationSystem Security Officer (ISSO) supporting customer activities. GDIT is your place to make meaningful contributions to challenging projects and grow a rewarding career. At GDIT, people are our differentiator. As an ISSO, you will help ensure today is safe and tomorrow is smarter. Our work depends … Framework to support a NIST SP 800-53 HHM systems through the A&A process. Construct thorough and complete security documentation to include, but not limited to, System Security Plans (SSPs), Plan of Actions and Milestones (POA&Ms), and any other artifacts to support the Body of Evidence (BOE), for sponsors approval. Identify security controls and work … a closely related discipline) Required Experience: 8+ yrs Clearance: TS/SCI with Polygraph Desired Technical Skills: Demonstrated strong technical skills and analytic abilities, as well as experience performing system security analysis and risk management. Demonstrated experience with security in the Amazon Web Services environment. Demonstrated experience performing complex technical tasks in pursuit of overall goals with minimal direction. More ❯
to best manage the lifecycle of U.S. and partner Navy surface ships and systems from fleet introduction through transfer or disposal. SEA 21 is the dedicated life cycle management organization for the Navy's in-service surface ships and is responsible for managing critical modernization, maintenance, training, and inactivation programs. SEA 21 provides wholeness to the fleet by … life. The organization also maintains inactive ships for future disposal, donation, or transfer, to include follow-on technical support to our partner navies. Duties include: The InformationSystem Security Specialist is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated … to ensure they meet security requirements for processing up to classified information and supervise and/or maintain the operational security posture for an informationsystem or program. More senior specialists may assist or develop system security policy and ensure compliance of change management and configuration control processes. Plan and coordinate the More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and More ❯
Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing operational security implementation, vulnerability management, system assessments, and recovery processes. The ideal candidate will play a key role in safeguarding critical informationsystems and contribute to a comprehensive security posture. Essential Duties and … and maintain an InformationSystems (IS) security program and policies to ensure the protection of sensitive and classified systems and data. • Monitor and enforce security policies for system implementation and configuration management. • Ensure the protection of informationsystems and recommend resources to maintain security. • Continuously monitor system vulnerabilities, assess potential threats, and respond to … Ensure proper recovery procedures are in place to restore security features and systems after an incident. • Report and mitigate security breaches in a timely manner. • Develop, update, and maintain System Security Plans (SSP) for all relevant systems. • Manage and control changes to systems, ensuring compliance with security policies and conducting risk assessments. • Ensure compliance with internal security policies and More ❯