Herndon, Virginia, United States Hybrid / WFH Options
Akima
for our Emerging Markets Group (EMG). This role demands a highly motivated, self-starting individual who can drive growth across the full business development lifecycle - identification, capture management, solutions development, proposal writing/reviewing, and post-award handoff. The Director will focus on differentiated high-end IT and technology solutions (cyber, cloud engineering), software development, digital automation … thrived above the Arctic Circle for more than 10,000 years. For our government customers, Akima delivers agile solutions in the core areas of facilities, maintenance, and repair; information technology; logistics; protective services; systems engineering; mission support; furniture, fixtures & equipment (FF&E); and construction. As an Akima employee, you will be surrounded by a challenging, yet supportive work More ❯
developing and integrating AI/ML models with large-scale data repositories. • Experience supporting command-level decision support tools and logistical data systems. • Familiarity with Cyber, Knowledge, and InformationManagement in military/operational environments. • Ability to collaborate with cross-functional and command staff teams. Responsibilities: • Develop and integrate AI/ML models (machine learning, deep … data repositories. • Deliver advanced analytics solutions with geographic visualizations, dashboards, and predictive/prescriptive analytics. • Partner with stakeholders to align AI/ML workflows with Cyber, Knowledge, and InformationManagement processes. • Build predictive models from large datasets for logistics objectives and decision-making. • Design and implement data ingestion/transformation pipelines to connect with enterprise repositories. More ❯
Education and Training Support, Parental Paid Leave, and much more. Join us and make a difference in National Security! Job Summary: Leidos is seeking an experienced, results oriented Information Technology (IT) Enterprise Architecture Modeler to join our team in the Bethesda, Maryland area. You will play a critical role in creating a model of our client's IT … and business analysts. Foster a culture of innovation and continuous improvement. Basic Qualifications: Active TS/SCI security clearance with polygraph B.S. degree in Systems Engineering, Computer Science, Information Technology, or related field (M.S. preferred); and 8 - 12 years of prior relevant experience or Masters with 6 - 10 years of prior relevant experience. May possess a Doctorate in More ❯
Counterintelligence Specialist - Mid This position requires an active TS/Sensitive Compartmental Information (SCI) clearance with the ability to obtain a Counterintelligence polygraph A government contract requires that this position be restricted to U.S. citizens or legal permanent residents. You must provide documentation that you are a U.S. citizen or legal permanent resident to qualify. Cherokee Analytics is … seeking a Counterintelligence Specialist that identifies, monitors, and assesses foreign intelligence efforts attempting collection of sensitive national security information on U.S. persons, activities and interests, including threats posed by emerging technologies to U.S. operations and interests. Compensation & Benefits: Estimated starting salary range: $110,000 - $130,000. Pay commensurate with experience. Full time benefits include Medical, Dental, Vision, 401K … USG responses to adversary action and insider threats by sharing threat indicators and enabling responsive measures from other agencies and services. Develop and operationalize an enterprise security risk management methodology across Government and industry stakeholders. Research, synthesize, exploit, evaluate, and analyze all-source reporting on FIE targeting USG critical technologies, programs, information, and supply chains. Develop More ❯
communicate issues as necessary with other members of the IT Department Perform work duties with minimal supervision Maintaining and managing Enterprise Imagining Solutions. Maintaining and configuring IT service management software. Incorporate customer feedback to continuously improve service delivery. Other duties as assigned. Degree/Education/Certification Requirements: Bachelor's degree in computer science, information technology … Windows OS 10 in a stand-alone and networked environment. • Proficient in the deployment, troubleshooting, and use of Microsoft 365 (MS Office suite). • Familiar with IT service management ticketing systems. • Experience with smart card multi-factor authentication. • Excellent organizational, communication, and customer service skills are a must. • Must be able to work as a productive team member … installation, repair, and configuration. • Experience in using Active Directory for user account and group management. • Experience using Microsoft Exchange for mailbox and distribution group management. • Experience in the management of Virtual Desktop environments (VMWare - Horizon) is preferred. • Must be skilled in the use of image deployment technologies. • Proficient in both networked and local print management. • Knowledge of and More ❯
expense comparisons by analysis of profit and loss statements and income statements. Prepares reports of findings and recommendations to management. Develops, maintains, and establishes operational specifications for financial informationsystems considering such things as information flow, volume, and document format for data processing equipment. May provide analysis on business development and may monitor business performance by More ❯
as you identify problem areas and opportunities for improvement in a mission-critical network. Your experience and communication skills will come in handy as you turn metrics into information and communicate their meaning. This is an opportunity to gain experience in an innovative and mission-driven environment. We focus on growing as a team, so we'll share … skills Bachelor's degree in Computer Science Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required. Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include More ❯
Our most common opportunities are in the following areas: Software Engineer/Developer: Java, Python, AI/ML DevOps Engineer Reverse Engineer/Embedded Engineer Systems Administration - Linux Information Security Systems Engineer/Officer (ISSE/ISSO) Data Scientist Systems Engineer TechSIGINT Analyst Oracle Database Administration (DBA) And many more technical positions Basic Qualifications: Experience Preferred (and commonly More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Three Saints Bay
letters, reports, electronic messages, requisition forms, and a variety of other Government forms. Prepare investigative financial charts (bank account links, wire transfer analysis). Log and enter pertinent information gleaned from financial analysis and investigative reports into databases. Gather and prepare statistical data. Utilize tools that aggregate data and facilitate analysis. Provide analytical support and case assessments to … agency priority investigations as determined by management; support will include, but not be limited to: FinCEN inquiries, agency internal database searches, open-source database searches, and bank account analysis/processing of grand jury information. Process and organize data (bank statements, financial reports) obtained by the field via the proper legal process in order to provide the field … a minimum of two years' experience working the field of auditing, accounting and/or finance in the private sector Ability to organize and conduct detailed examinations of information generated during complex criminal/civil investigations and information available through alternative sources, for the purpose of conducting financial analyses of personal/business assets of targeted More ❯
Man Group is a global alternative investment management firm focused on pursuing outperformance for sophisticated clients via our Systematic, Discretionary and Solutions offerings. Powered by talent and advanced technology, our single and multi-manager investment strategies are underpinned by deep research and span public and private markets, across all major asset classes, with a significant focus on alternatives. … across multiple offices globally. Man Group plc is listed on the London Stock Exchange under the ticker EMG.LN and is a constituent of the FTSE 250 Index. Further information can be found at . As at 31 March 2025 The Team We are looking for an AI engineer to help us build solutions that utilise the latest GenAI … other legally protected category or status in accordance with applicable federal, state and local laws. Man Group is a Disability Confident Committed employer; if you require help or information on reasonable adjustments as you apply for roles with us, please . Man Group is a global alternative investment management firm focused on pursuing outperformance for sophisticated More ❯
onsite in Huntsville, AL. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and reporting them through case management systems. • Develop & Implement countermeasures against known adversarial tactics, techniques, and procedures (TTPs). • Collaborate with cybersecurity, counterintelligence, and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on … integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education: Bachelor's degree in cybersecurity, information assurance, or related field (or equivalent experience). • Experience: o 3 years relevant experience in UAM or insider threat detection, including bility to develop dashboards, filters, and audit policy More ❯
Saffron Walden, Essex, South East, United Kingdom Hybrid / WFH Options
EMBL-EBI
generating ChEMBL releases which are a mixture of Python and Java). Develop new innovative solutions for enhancing scientific data workflows and support our mission to disseminate scientific information publicly Manage and enhance scientific software tools essential for processing and storing chemical and biological data across the teams services, ensuring adherence to software development best practices. Collaborate with … to integrate computational methodologies into data curation and analysis workflows, including the incorporation of external chemical and bioactivity databases (e.g., BindingDB, PubChem) into the ChEMBL ecosystem. Support database management, including the maintenance and administration of database instances. Document workflows and processes to improve maintainability, efficiency, and reproducibility. Participate in cross functional project meeting with partners on campus (such … willingness to develop expertise and contribute to Java-based pipelines as needed Experience in using AI-based methods, such as NLP, LLM for efficient data processing Other helpful information: Hybrid Working - At EMBL-EBI we are pleased to offer hybrid working options for all our employees. A dedicated desk will be available everyday, but most of our team More ❯
shape our people strategy. Some of the key deliverables for the role will include: Data capture and integrity Ensuring data meets business and legal needs Collaborate with HR and system administrators to improve data accuracy and consistency in Dayforce Define and uphold data quality standard including validation and regular audits Lead initiatives to keep people data clean, Current and … with broader business data sets by working with IT, Finance, and other teams. Act as HR's data conscience, ensuring GDPR compliance and proper handling of personal and management information. Reporting Design tailored HR reports and dashboards for various stakeholders Enable self-service access to HR data and insights Continuously improve reporting processes for accuracy, timeliness and usability … in designing scalable solutions. What we're looking for: Ideally been a HR focused Data Analyst or similar role Previous experience with Dayforce (or any other HR/People System Proven experience with reporting tools such as Power BI, Tableau, SQL Solid experience in using Excel Understanding of data governance, compliance and regulatory reporting (pay, GDPR etc) Benefits include More ❯
Overview Job Application for Senior AI Engineer at Man Group London About Man Group Man Group is a global alternative investment management firm focused on pursuing outperformance for sophisticated clients via our Systematic, Discretionary and Solutions offerings. Powered by talent and advanced technology, our single and multi-manager investment strategies are underpinned by deep research and span public … across multiple offices globally. Man Group plc is listed on the London Stock Exchange under the ticker EMG.LN and is a constituent of the FTSE 250 Index. Further information can be found at . As at 31 March 2025 The Team We are looking for an AI engineer to help us build solutions that utilise the latest GenAI More ❯
CISSP, GSLC, or CCISO Salary: $146,000 - $234,000 Clearance: Active TS/SCI security clearance with a current polygraph is required Job Description: Seeking experienced InformationSystem Security Manager (ISSM) professionals to accomplish the following: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing InformationSystem Security policies, standards, and methodologies. Manage operational security posture for an InformationSystem or program to ensure InformationSystem Security policies, standards, and procedures are established and followed. Provide management of security aspects of the InformationSystem and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing sensitive information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for informationMore ❯
/SCI Poly required Annapolis Junction, MD Information Technology Apply Now Newly awarded contract seeking Senior ISSO with the following skills: Provides aid to the program, organization, system, or enclave's information assurance program. Lends assistance for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintains operational security posture … for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the informationsystem and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for … processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for informationsystem security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and More ❯
perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for … of Agency security policy and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system … Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its content. Support security authorization activities in compliance with NSA/CSS InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM2-001-SD Job Summary: The InformationSystem Security Manager II will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO … C4I. The support will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service Risk Management, Integrated Logistics Support, Technical Oversight of commercial/non-governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and … W-3B1500 (EKMS Manager) or A-4C-1340 (KMI) (or DOD Service equivalent). Knowledge of the following data and communications link equipment and related systems: Communication Data Link System (CDLS) Network Tactical Common Data Link (NTCDL) Tactical Common Data Link (TCDL) Maritime Surface Terminal (MST) Intelligence Carry-On Program (ICOP) systems Naval Tactical Command Support System (NTCSS More ❯
development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a routine basis. • Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package. • Conduct configuration management for security-relevant changes to software, hardware, and firmware. • Perform and … deliver security impact analyses of changes to the system or its environment of operation. • Assess the effectiveness of system security controls on an ongoing basis to determine system security status. • Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments. • Provides configuration management for security-relevant informationsystem software, hardware, and firmware. " Education and Experience: • 10 years of related work experience in the field of security authorization. • A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field may be substituted for 4 years' experience. • DoD 8570.1 compliant IAM Level I certification, such as the CompTIA Security+ certification. A More ❯
Requisition: S Title: System Administrator I-III - Endpoint Management (one position to be filled) FLSA status: Exempt Hiring Salary: This position is a pay grade 10, 13 or 16. Please see Pay Grade Table at: Occupational Category: Professional Department: Endpoint Services Division: Information Technology Open Date: 07/31/2025 Open Until Filled: Yes … Educational and Experience Requirement: System Administrator I Endpoint Management: Bachelor's degree with a major in computer science or related field from an accredited institution. One-year relevant experience in related field. A combination of education, experience, certifications, and training that would produce the required knowledge and abilities can be considered. System Administrator II Endpoint Management … computer science or related field preferred from an accredited institution with two years relevant experience. A currently valid Microsoft Technology Associate certificate or higher, or a Red Hat Certified System Administrator certificate or higher could be substituted for one year of experience. Proficiency in Windows, Red Hat Linux, and Mac Operating Systems, and in one or more endpoint and More ❯
experience working as an ISSO or security relevant field and must be comfortable operating in a senior role and mentor for junior ISSOs. The selected candidate will support the System Security Managers (ISSM) and support security within assigned boundaries. Responsibilities: • Support day-to-day operations required to perform RMF • Manage tasks and meet deadlines to meet security requirements • Support … customer interactions which will translate into system requirements • Implement the Risk Management (RMF) process throughout the entire A&A lifecycle of the system(s) or multiple ATOs across different locations, supporting all efforts pre and post Authority to Operate (ATO) determination • Assist the ISSM in meeting their duties to support A&A activities and coordinate with … system's Security Controls Assessor (SCA) and Authorizing Official (AO) • Perform and review technical security assessments of the system(s) to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems • Conduct risk analyses from vulnerability, compliance scans, penetration testing results, and/ More ❯
will provide management support for a program's Information Assurance requirements. Provide management support for proposing, coordinating, implementing, and enforcing InformationSystem Security policies, standards, and methodologies. Maintain operational security posture for an InformationSystem or program to ensure InformationSystem Security policies, standards, and … procedures are established and followed. Assist with the management of security aspects of the InformationSystem and perform day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements fror processing information. Perform vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration … management (CM) for informationsystem security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Prepare and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Support security authorization activities in More ❯
will provide management support for a program's Information Assurance requirements. Provide management support for proposing, coordinating, implementing, and enforcing InformationSystem Security policies, standards, and methodologies. Manage operational security posture for an InformationSystem or program to ensure InformationSystem Security policies, standards, and … procedures are established and followed. Provide management of security aspects of the InformationSystem and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. … Provide management support to configuration management (CM) for informationsystem security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and SystemMore ❯
secure networking, computing, and enclave environments Participate as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments Participate … as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement … assessment, risk analysis, and risk management Identify overall security requirements for the proper handling of Government data Interact with the customer and other project team members Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements Provide security planning, assessment, risk analysis, and risk management Recommend More ❯
to best manage the lifecycle of U.S. and partner Navy surface ships and systems from fleet introduction through transfer or disposal. SEA 21 is the dedicated life cycle management organization for the Navy's in-service surface ships and is responsible for managing critical modernization, maintenance, training, and inactivation programs. SEA 21 provides wholeness to the fleet by … life. The organization also maintains inactive ships for future disposal, donation, or transfer, to include follow-on technical support to our partner navies. Duties include: The InformationSystem Security Specialist is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated … to ensure they meet security requirements for processing up to classified information and supervise and/or maintain the operational security posture for an informationsystem or program. More senior specialists may assist or develop system security policy and ensure compliance of change management and configuration control processes. Plan and coordinate the More ❯