a cornerstone of our business and are fundamental to providing industry-leading customer service. About the Cyber Security Engineer role. The role of our Cyber Security Engineer involves discovering system vulnerabilities via penetration testing or threat modelling, working with DevOps, IT and compliance teams to enforce policies, responding to security incidents, and evolving defences to meet shifting risks. Key … reports and alerts. Security Audits: Perform regular audits to ensure that systems and networks are operating securely. Security Tools Implementation: Recommend and implement security tools to enhance network and system security. Penetration Testing: Work with 3rd Parties to conduct penetration testing to identify vulnerabilities in the system. Technical Advice: Provide technical advice to colleagues and staff to ensure secure … Response: Coordinate with the IT department to maintain and update cyber incident response plans and procedures. Conduct Security Attack Simulations: Undertake security assessments such as Phishing attacks. Change Management: Participate in the change management process, advising on possible security risks. Training: Train staff in security awareness and procedures. Working hours: Monday to Friday, working 40 hours More ❯
initial primary focus for this role will be helping to deliver a major project to expand Paragraf's existing use of ERP to incorporate manufacturing, procurement, and inventory management functions. This will then develop onto MES and SPC systems to further support our production ramp. Typical duties of this role would centre on ownership of assigned systems (especially … team. Proactively identifying opportunities for improvement in existing processes and systems to maximise business efficiency. Write formal requirement and solution proposals, assessing feasibility and suitability, and considering risk management and mitigation measures. Document business change requests and work with IT team and external consultants to implement change in a controlled and secure manner. Write test scripts for changes … Assist the larger I.T. team with project delivery as required. Education and qualifications Degree in IT or Computer Science related field Project Management certification is desirable. Related system certifications are desirable (ERP/CRM/MES). Essential skills Experience in development, implementation and support of ERP and CRM systems (you will be required to detail this More ❯
Marrathon TS is seeking a senior-level engineer with a thorough understanding of the design, configuration, and management of an enterprise Active Directory and Zscaler environment in support of the technical solutions task order for the Executive Office for the U.S. Attorneys (EOUSA) and the U.S. Attorneys' Offices (USAOs). The organization is undergoing a modernization initiative to … enhance its identity management, security posture, and cloud-based network access. To achieve this, the organization seeks an Active Directory SME with extensive experience in Zscaler solutions to provide technical leadership, implementation, and operational support. The candidate should also have working knowledge of Windows Servers and networking (VLANs, TCP/IP, firewalls, etc). Background/Project Description … The Enterprise End User Technologies (EEUT) department of the Executive Office of the U.S. Attorneys deploys and maintains mission-critical technical information technology projects encompassing administrative, technical, and legal support to all 94 US Attorney offices located in over 200 geographically dispersed sites throughout the continental United States and its territories. The EEUT employees the General Integration (GI More ❯
will run initially for 6 months (with definite possibility of extension). This role will need an experienced candidate who has a demonstrable track record of providing project management support and carrying out general project admin duties. Responsibilities: Provide project management support for programmes with an Ops team. This will involve supporting the development of business … cases, planning activities, risk and issues management, monitoring and coordination of tasks Assist project managers in the design, establishment and maintenance of project controls and standards. Participate as an active member of project teams. Act as point of contact for projects and develop an archive of information to allow reporting and information sharing. Be … responsible for implementing and maintaining effective project managementsystems which will enable risk management, performance reporting, sharing of best practice and monitoring. Use agreed project management methodology to maintain changes to project implementation plans and to ensure reporting is carried out by project managers. Work with project managers to investigate causes of any variance More ❯
SNOW certifications, such as the Certified ServiceNow Administrator, Certified Application Specialist, Certified Application Developer, etc. DESIRED QUALIIFICATIONS: One or more advanced certifications in the following areas: ITIL, Project Management, Six Sigma, etc. Experience administering or engineering secure Enterprise informationsystems in one or more of the following areas: endpoints, networks, servers, virtualization, storage, cybersecurity, cloud, or … ITSM. Understanding of NOW platform API integrations with third party technologies. Familiarity with the ITIL Framework, Project Management Framework, IT Governance, Software Development Lifecycle, IT Operations Management, and/or IT Service Management. SECURITY CLEARANCE REQUIREMENTS: This position will require U.S. Citizenship and an active DoD TS/SCI clearance with the ability to obtain and More ❯
as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to … access, network topology and connectivity, certificate services, cryptographic key management, availability & performance monitoring, developer collaboration software, virtual desktop, virtual machines and update management. Experience leading and designing system integration builds to combine IT infrastructure components to create a consolidated solution; co-ordinating test and build activities across infrastructure services. Experience of driving forward the adoption of automation More ❯
as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to … access, network topology and connectivity, certificate services, cryptographic key management, availability & performance monitoring, developer collaboration software, virtual desktop, virtual machines and update management. Experience leading and designing system integration builds to combine IT infrastructure components to create a consolidated solution; co-ordinating test and build activities across infrastructure services. Experience of driving forward the adoption of automation More ❯
as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to … access, network topology and connectivity, certificate services, cryptographic key management, availability & performance monitoring, developer collaboration software, virtual desktop, virtual machines and update management. Experience leading and designing system integration builds to combine IT infrastructure components to create a consolidated solution; co-ordinating test and build activities across infrastructure services. Experience of driving forward the adoption of automation More ❯
as part of a team providing a range of capabilities and may operate across one or more contexts including the following: Hosting environments and landing zone management. Security, management, governance and automation of DfE's centrally managed hosting environments and cloud landing zones. Includes design, build, operate and maintain core cloud computing IT infrastructure services, ensuring that they … they continue to meet requirements. Managed infrastructure service. Build, operate & maintain cloud and on-premises infrastructure resources for business applications. Updates and patching, back-up & restore, security vulnerability management, capacity management, service optimisation, incident resolution, request fulfilment, service controls, and asset management. Service improvement. Develop new, and enhance existing IT infrastructure products, services or processes to … access, network topology and connectivity, certificate services, cryptographic key management, availability & performance monitoring, developer collaboration software, virtual desktop, virtual machines and update management. Experience leading and designing system integration builds to combine IT infrastructure components to create a consolidated solution; co-ordinating test and build activities across infrastructure services. Experience of driving forward the adoption of automation More ❯
Senior Data Management Professional - Data Quality - Data AI Location London Business Area Data Ref # Description & Requirements Bloomberg runs on data. Our products are fueled by powerful information. We combine data and context to paint the whole picture for our clients, around the clock - from around the world. In Data, we are responsible for delivering this data, news … Bloomberg's products. This way, our clients will continue to have high quality data and access to new types of datasets. What's the Role? A Senior Data Management Professional (DMP) is a key role within our organization responsible for providing domain expertise in both financial concepts and annotation program management, to the development of our … the framework in achieving quality and consistency in the evaluation and training datasets for models that power our AI-enhanced products, and delivering scalable governance in annotation program management across Bloomberg Data. Beyond governing data processes and being problem solvers, they are expected to transform the responsibilities of the team and scale the impact beyond what's possible More ❯
The Sr. Product Manager is part of the Engagement Data Management and Financial Compliance Recording product management team and is responsible for leading the product strategy, product roadmap, and feature requirements. This role will focus on software technology which, at its core, integrates and collects data from digital and voice communication platforms making it available for … and high stakes situations. Drive and deliver enablement for sales, presales, partners and services organizations in support of new offering launches. Qualifications Bachelors degree in Computer Science, Engineering, InformationSystems, or other business-related degree, or equivalent work experience Demonstrable experience in product management or product engineering Ability to prioritize and delegate tasks across team boundaries More ❯
computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Additionally, you will help develop mitigations to strengthen network defenses and protect against attacks on … transport methods, including traditional wired networks, wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic … logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport methods, including traditional wired networks, wireless transport (such as Wi-Fi and cellular), collaborative platforms like video teleconferencing More ❯
computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Additionally, you will help develop mitigations to strengthen network defenses and protect against attacks on … transport methods, including traditional wired networks, wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic … logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport methods, including traditional wired networks, wireless transport (such as Wi-Fi and cellular), collaborative platforms like video teleconferencing More ❯
computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Additionally, you will help develop mitigations to strengthen network defenses and protect against attacks on … transport methods, including traditional wired networks, wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic … logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport methods, including traditional wired networks, wireless transport (such as Wi-Fi and cellular), collaborative platforms like video teleconferencing More ❯
computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Additionally, you will help develop mitigations to strengthen network defenses and protect against attacks on … transport methods, including traditional wired networks, wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic … logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport methods, including traditional wired networks, wireless transport (such as Wi-Fi and cellular), collaborative platforms like video teleconferencing More ❯
computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Additionally, you will help develop mitigations to strengthen network defenses and protect against attacks on … transport methods, including traditional wired networks, wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic … logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport methods, including traditional wired networks, wireless transport (such as Wi-Fi and cellular), collaborative platforms like video teleconferencing More ❯
computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Additionally, you will help develop mitigations to strengthen network defenses and protect against attacks on … transport methods, including traditional wired networks, wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic … logs, and host system logs, to identify potential vulnerabilities, respond to cyber events, and defend against possible threats. Develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Support a wide range of data transport methods, including traditional wired networks, wireless transport (such as Wi-Fi and cellular), collaborative platforms like video teleconferencing More ❯
productions, facilities, events, and operations across the region. The Senior Security Manager, EMEA , based in London and reporting to the Director, Security Operations - EMEA , leads corporate security risk management for multiple markets - including TWDC employees and sites, productions in the Nordics, and the EMEA Publicity portfolio. This critical role bridges strategic security planning with operational execution, ensuring all … activities and remedial actions in partnership with internal stakeholders. Deliver training programs and security briefings for employees, contractors, and partners. Collaborate with the Systems & Technical team on physical security system deployments. Lead and contribute to security-related projects supporting EMEA business needs. Crisis Management Partner with site teams to design and implement emergency response plans for facilities … crisis communication protocols. Advise site staff in real-time during crises and incidents; coordinate with EMEA Security Communications Centre (ESCC). Promote adoption of Disney's Global Emergency Notification System (GENS) across EMEA sites. Directly manage regional Security Managers (e.g., Nordics), supporting operations across the UK, Ireland, and Nordics. Cultivate a proactive security culture across the workforce. Provide expert More ❯
You will be joining the innovative Information Security Cybertech Engineering team as a full stack software engineer in a global team responsible for developing web applications (Java/Angular), data engineering (Python) and solutions with third party products. You will be working in a collaborative and inclusive fast-paced environment that leverages agile approaches to deliver solutions quickly. … and design the solution that is both robust and quick to market. The suite of applications developed and maintained by the team are used to enhance the firms information security threat detection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and contribute to … our ongoing success while continuously fostering your own personal and professional growth. Responsibilities: Full stack software development and management of the development life cycle. Developing web applications (Java/Angular), data engineering (Python), and solutions with third-party products. Working in a collaborative and inclusive fast-paced environment that leverages agile approaches to deliver solutions quickly. Working directly More ❯
The PM may be responsible for writing and reviewing technical documents in support of Government IDIQ proposals. Their scope of work will include developing, maintaining, and enhancing project management practices in accordance with PMBOK and industry standards and best practices to support the Office of the Director of National Intelligence (ODNI). The PM will monitor and report … years of demonstrated experience as a program manager managing programs within the ODNI. A bachelor's degree in a technical field (e.g. Computer Science, Computer Engineering, Electrical Engineering, InformationSystems, etc.). A Project Management Professional Certification (PMP) or DAWIA Certification. Experience managing Multi-Award IDIQ contracts with multiple task orders and teammates. Prior program managementMore ❯
Sales Support & Strategy: Partner with account teams to identify technical opportunities, develop sales strategies, and support complex deal negotiations and closures. Cross-functional Collaboration: Work closely with product management, engineering, marketing, and professional services teams to ensure customer feedback influences product development and to facilitate smooth delivery and implementation. Technical Evangelism: Represent Forescout at industry events, webinars, and … multiple stakeholders. Extensive experience delivering solution presentations, technical workshops, and proof-of-concept (POC) engagements to senior technical and business audiences. Strong background in solution architecture, technical account management, and consultative selling. Excellent communication and presentation skills, capable of translating complex technical information into clear business value propositions. Strong collaboration and project management skills … cross-functional teams and work independently. Technical Expertise Required Network Security Technologies: Expertise in Network Access Control (NAC), IPS, Firewalls (FW), Endpoint Protection, Vulnerability Assessment tools, Mobile Device Management (MDM), and other similar cybersecurity solutions for both IT and OT environments. Networking Protocols & Infrastructure: Deep understanding of networking technologies such as routing, switching (Layer 2/Layer More ❯
complex - offering exceptional service and the Precise solution. We are currently seeking a Program Management Analyst/Acquisition Analyst, Senior to support PMA-280's (Tomahawk Weapons System) Missile Systems Integrated Product Team (IPT). The candidate will perform critical program management, acquisition, technical, and business analysis and provide support to ensure program success. The … candidate will collect, complete, organize and interpret technical data and financial information relating to systems acquisition and product programs, track program/project status and schedules, and apply policies and procedures for planning and execution of program requirements. The duties of the Program Analyst will include, but are not limited to: Directly support the Production IPT Lead and … assist with all actions to support the overall goal of the Program Office. Perform critical program management, technical, and business analysis to ensure program success. Collect, organize and interpret technical data and financial information related to systems acquisition and product programs. Support the development of Program acquisition documentation per the DoD 5000 such as Acquisition Plans More ❯
TS) involves supporting the development and acquisition of a new electro-optical sensor system. This role will focus on the initial planning, documentation, and management of the system acquisition, including writing key acquisition documents and interfacing with government and vendor stakeholders. The analyst will be part of an Integrated Product Team (IPT) and will contribute to the … system's lifecycle from cradle to grave. Duties: Acquisition Documentation: Lead the development of acquisition and contract/Other Transaction Authority (OTA) documentation. Coordinate products across the acquisition process, assist with milestone documentation and participate in test events. Support acquisition strategy and plan development, procurement package development, and quality assurance support for contracting processes, ensuring acquisition program requirements identified … Participation: Participate in the Integrated Product Team, contributing to all aspects of the new sensor system. Support budget management, logistics, and risk assessment, as it pertains to system acquisition and lifecycle management. Required Skills & Experience: A strong understanding of the Defense Acquisition System, DoDi 5000, and product life cycle management. Familiarity with project team managementMore ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
gen2fund.com
seeking a skilled and detail-oriented Application Integration Specialist to join our dynamic team. The ideal candidate will possess strong technical expertise integrating enterprise accounting software or investment management software, ideally Investran and/or related platforms like Yardi, eFront, AllVue and Sage Intacct. What you'll be doing As an Application Integration Specialist, you will play a … global technology offering. Your primary responsibilities will include: Managing, developing and supporting the integration of our client service applications, ensuring they meet business requirements and operate efficiently. Providing ongoing system administration, troubleshooting, and issue resolution. Developing and maintaining documentation related to system interface configurations, user guides, and troubleshooting procedures. Developing integrations between Investran and other enterprise applications, ensuring … with enterprise accounting software and/or private equity/investment management software integrations. API Integration experience with MuleSoft and/or API Development experience. Experience in system configuration, customization, and integration of financial applications. Investran or similar platform certifications beneficial. Good working knowledge of Accounting Platform database structures and data models. Proficiency in SQL and data More ❯
CA Clearance Required: TS/SCI (SAP/SAR eligibility preferred) The Enterprise Infrastructure Lead(SME) for 24/7 Operations Support (OS) will provide expert-level technical leadership, system administration, and infrastructure management. This individual will oversee hardware, software, networking, and classified system operations to maintain mission-critical infrastructure. The Infrastructure SME will serve as a technical … authority for network security, system integration, and operational resilience, ensuring compliance with DoD cybersecurity policies, infrastructure best practices, and mission objectives. Candidate must be familiar and worked in a 24/7 Network Operations Center (NOC), or Infrastructure & Operations (I&O) environment, and a hybrid cloud environment. Ideal candidates will have worked in Space Force, Air Force, other Dept … of Defense branches, or Dept of State. Key Responsibilities Infrastructure Operations & System Administration: Oversee IT infrastructure, networks, and system architecture supporting Space C2 operations. Network & Cybersecurity Management: Ensure network integrity, security, and performance in classified and unclassified environments. Incident Response & Troubleshooting: Serve as the Tier 3 escalation point for complex infrastructure and network issues. Agile-Based More ❯