Test Engineer Our client is seeking qualified, creative, and customer-focused technical representative to provide Patch/Software Test Engineering management and support remotely and at our customer site as the Software Test Engineer. You will work in a fast-paced and diverse environment and will have a management team that encourages your career development and … growth. In this role, you will gain many intangible skills, such as time and task management, critical thinking and problem solving, the ability to communicate complicated problems in a concise manner, as well as solve complex problems using available tools. This job is for you, if you have an interest in joining a dynamic and respected team of … but not always required. A degree in Cybersecurity and/or IT Management is a plus but not required. 2-5 years of experience in software testing, system administration, or IT operations. Experience in an enterprise IT environment supporting patch deployment and validation. Hands-on experience with test automation frameworks (Selenium, JUnit, or PyTest) is beneficial. Project More ❯
possess advanced analytical skills, relevant certifications, and experience working cross-functionally-including direct client engagement-to support regulatory and business objectives. Primary Responsibilities Conduct comprehensive risk assessments of informationsystems, applications, business processes, and underlying technical infrastructure-including desktops, phones, network devices, operating systems (Windows, macOS, Linux), and cloud platforms (AWS, Azure, GCP). Collaborate closely with compliance … to understand operational requirements, regulatory obligations, and risk tolerance. Serve as a technical point of contact for clients, addressing and managing their technical requirements, security concerns, and risk management needs. Clearly document identified risks and work with stakeholders to propose, evaluate, and track compensating controls that address security gaps when standard controls are not feasible. Support and participate … are clearly communicated and remediation plans are actionable and understandable by both technical and non-technical teams. Prepare and deliver risk assessment reports and risk register updates to management, clients, and relevant teams, tailoring communication style and technical depth to the audience. Monitor the effectiveness of compensating controls and recommend improvements as needed to maintain compliance and reduce More ❯
the features and benefits of our products and solutions. Conduct in-depth assessments of customer environments and requirements to architect effective solutions. Create and present compelling technical proposals, including system architectures, integration plans, and project timelines. Provide thought leadership on industry trends, challenges, and the competitive landscape to inform sales strategies. Liaise with product management and engineering … answer technical queries for customers across the Sales Cycle, including information security, risk, architecture, and platform performance. Individuals will have access to our content managementsystem, Responsive, to find detailed answers that can be leveraged to support fast response to customers in support of their decision making process. Required Qualifications: 5+ years of experience in … preferably in payments, fintech, financial services, or similar Experience with identifying customer requirements and experience in documenting these for handover to other internal teams Strong understanding of software development, system integration, and relevant technologies Proven ability to articulate complex technical concepts to both technical and non-technical audiences. Exceptional presentation, communication, and interpersonal skills. Experience with CRM tools (such More ❯
the features and benefits of our products and solutions. Conduct in-depth assessments of customer environments and requirements to architect effective solutions. Create and present compelling technical proposals, including system architectures, integration plans, and project timelines. Provide thought leadership on industry trends, challenges, and the competitive landscape to inform sales strategies. Liaise with product management and engineering … answer technical queries for customers across the Sales Cycle, including information security, risk, architecture, and platform performance. Individuals will have access to our content managementsystem, Responsive, to find detailed answers that can be leveraged to support fast response to customers in support of their decision making process. Required Qualifications: 5+ years of experience in … preferably in payments, fintech, financial services, or similar Experience with identifying customer requirements and experience in documenting these for handover to other internal teams Strong understanding of software development, system integration, and relevant technologies Proven ability to articulate complex technical concepts to both technical and non-technical audiences. Exceptional presentation, communication, and interpersonal skills. Experience with CRM tools (such More ❯
recommend adoption strategies where appropriate. - Ensure alignment of IT strategy with the overall business strategy and objectives of the firm. - Develop and maintain an inventory of business capabilities, information assets, and technology assets. - Lead the evaluation and selection of strategic technology platforms and vendors. Solution Architecture: - Design and document end-to-end solutions for specific business initiatives and … solutions adhere to relevant legal and regulatory requirements (e.g., GDPR, data privacy). - Contribute to the development of architectural patterns and best practices within the IT department. Stakeholder Management & Communication: - Effectively communicate architectural concepts and solutions to both technical and non-technical stakeholders. - Build strong relationships with key stakeholders across the firm to understand their needs and priorities. … Facilitate discussions and workshops to gather compliance requirements and define architectural solutions. - Present architectural proposals and recommendations to senior management and governance bodies. Governance & Standards: - Contribute to the establishment and enforcement of architectural standards, policies, and guidelines. - Participate in architectural reviews to ensure and consistency. - Promote the adoption of best practices in software development, infrastructure managementMore ❯
part of your responsibilities, you will focus on the following key areas: Architectural Design: Design and implement secure Azure enterprise architectures and cloud-based solutions tailored for sensitive information environments. Cloud Migration Leadership: Establish and execute comprehensive cloud migration project plans to ensure seamless transitions of workloads to a secure cloud environment. Technical Consulting: Provide strategic guidance on … with product managers, engineers, and cross-functional teams to develop specifications for new cloud-based products and services. Performance Evaluation: Oversee the deployment and performance evaluation of cloud management platforms, implementing enhancements based on feedback and operational metrics. Portfolio Development: Expand and enrich the product portfolio of cloud services, conducting cost-benefit analyses of various hosting options. Operations … 8+ years of experience, or Master's Degree and 6+ years of experience, or 3+ years with PhD. Bachelor's degree should be in one of these areas: Information Technology, Cybersecurity, Computer Science, InformationSystems, Data Science, or Software Engineering. Active Secret clearance required to start Active IAT Level II (CompTIA Security +, SSCP, CCNA Security More ❯
A WS Cloud Infrastructure Analyst The AWS Cloud Infrastructure Analyst is a hands-on role planning and managing AWS cloud infrastructure delivery, including daily management, capacity planning, and participating in defining the Company’s global infrastructure architecture. The Analyst will ensure the quality and timely delivery of technology efforts to support strategic infrastructure projects and works closely with … teams to design and implement cloud solutions that fit organizational requirements. As an expert in AWS infrastructure and security configurations, recommends standards and security requirements that match written information security policy. Prior experience in an international enterprise environment is essential . Responsibilities: Collaborate with IT teams for input and operational requirements to design and implement overall cloud infrastructure … and security strategy. Coordinate and lead infrastructuresecurity initiatives in the AWS cloud. Serve as the technical lead in AWS cloud DR and recovery strategies that align with information security policies. Develops and implements backup and recovery strategies to support data retention requirements. Evaluates and designs highly available, scalable, and redundant applications in the AWS cloud. Participate in the More ❯
Citizenship A minimum of a Department of Defense (DoD) Secret level Security Clearance Proven experience in managing AWS-based hosting and PeopleSoft environments Expertise in cloud infrastructure, stakeholder management, and technical project execution Ability to lead technical meetings and translate complex cloud and ERP concepts into actionable strategies Familiarity with security, compliance, and performance optimization for cloud-hosted … applications Excellent communication, problem-solving, and stakeholder management skills Bachelor's or Master's degree in Computer Science, Engineering, Business, or a related field Thorough understanding of project management techniques and tools. Excellent written and verbal communication skills. Strong analytical, critical thinking, and problem-solving skills. Strong decision-making and leadership skills. Solid organizational skills including … attention to detail and multitasking skills. Must Haves: Working experience with ITIL Processes and Agile teams Self-Motivated, strong work ethic and commitment to quality Understanding of information technology systems including end-user computing devices We would be impressed if you have experience with: BA/BS or higher degree 6 or more years of professional experience as More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Noblis
Responsibilities Noblis-ESI is seeking a ManagementInformationSystems Specialist with a background in designing, implementing, and maintaining informationsystems to optimize business operations and decision-making to support the customer Mission Integration Directorate (MID). Job Responsibilities Develop and customize MIS solutions tailored to the organization's needs. Oversee the integration of new … IT infrastructure. Ensure data accuracy, security, and accessibility through regular audits and updates. Provide ongoing support for MIS, troubleshooting issues, and implementing enhancements. Collaborate with IT teams to maintain system stability and minimize downtime. Maintain detailed documentation of system configurations, updates, and processes. Serve as a liaison between technical teams and business stakeholders to align MIS initiatives with … organizational goals. Required Qualifications US Citizenship is required. Active Top Secret/SCI clearance with a Counter Intellience Polygraph. Bachelor's degree in ManagementInformationSystems , Computer Science, or a related field. Alternatively, demonstrate an additional 4 years of related acquisition experience per level if no bachelor's degree is held. Proficiency in database managementMore ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Sycurio
The Information Security Director develops, shapes, and maintains Sycurio's information security capability, driving the attainment and maintenance of the ISO27001, PCI-DSS, and SOC2 compliance. They are the subject matter expert on all things regarding security and compliance, owning the information risk management processes. They are the thought leader on all … matters within the security and compliance domain such that the company remains secure against the ever-changing security threat and compliance landscape. Information Security Strategy Create and maintain the Company's strategy, ensuring alignment to the Company's strategy and business goals. Work across internal and external stakeholders, communicating … the information security strategy to relevant parties and providing assurance of policies, procedures, and systems. Develop, maintain, and expand the information security managementsystem ('ISMS') to optimise compliance for ISO27001, PCI-DSS, and SOC2. Identify gaps in the information security capability, both technical and operational, and propose remediation and mitigation plans More ❯
o Subject Matter Expert for assigned systems, processes, and duties o Configure and manage UNIX/Linux and Windows (or other applicable) operating systems and installs/loads operating system software, troubleshoot, maintain integrity of and configure network components, along with implementing operating systems enhancements to improve reliability and performance o Provide support to IT systems including day-to … day operations, monitoring, and problem resolution for all the client/server/storage/network devices, mobile devices, etc. o Optimize system operations and resource utilization, and perform system capacity analysis and planning o Support the design of systems, mission architecture and associated hardware o Aid users in accessing and using IT systems o Analyze and resolve … status to agency management and internal customers o Provide detailed analysis on issues identified and/or on support tickets assigned o Provide support for the dispatch system and hardware problems and remains involved in the resolution process Contract/Project Support Responsibilities: • Assist PE with Customer Relationship & Account Management (relationship building and Issues escalation More ❯
Select how often (in days) to receive an alert: Senior Process Management Consultant Location: UK - Hatfield, UK - London, UK - Manchester, UK - Milton Keynes, UK - Nottingham Job-ID: 213483 Contract type: Standard Business Unit: Information Technology Life on the team Senior Process Management Consultant Responsible for defining and improving processes within Group IS through high … and implement process improvement initiatives triggered notably by the CI function ensuring optimisation of IT processes and the elimination of inefficiences. What you'll do The Senior Process Management Consultant will collaborate with cross-functional teams, mentoring staff, and providing strategic insights to enhance overall performance. Transformation Programme The purpose of the transformation programme is to establish a … through others. Acute business acumen and understanding of organisational issues and challenges. Experience with large-scale organisational change efforts and demonstrate a strong track record in business change management or programme management to lead the change, ideally in a Lean6Sigma context. Comprehensive data analysis and reporting skills. Leadership requirements: Accountable for the management of More ❯
celebrates new ideas and diverse perspectives. You can experience a world of opportunity and the chance to shape a career as unique as you. Position Summary WSP's Information Security Office (ISO) is responsible for the deployment and maintenance of the information security framework for both the IT organization and wider business community. This includes the … Governance mechanisms, policies and processes, tools and technologies, and employee training required to protect WSP information and that of our clients. The role of Regional Information Security Officer reports directly to the Business Information Security Officer and is responsible for delivering the Information Security Framework into the applicable region of WSP. This … is primarily an internally facing role, although some interaction with clients and third parties may be required. This position requires a senior management professional with relevant experience and a strong working knowledge of IT security, risk management, regulatory compliance, information and public cloud service technology, IT operations management principles, and third-party More ❯
Experience & Strategic Planning Collaborate with senior leadership to align IT/OT and Information Technology strategy with broader organizational goals. Collaborate with IT/OT stakeholders and system owners to seamlessly integrate information technology initiatives into IT and OT infrastructure, ensuring alignment with organizational goals and security standards. Support and coordinate the planning and implementation … privilege access, and real-time threat mitigation across IT and OT infrastructures. Provide guidance and mentorship to junior cyber analysts and staff. Risk Management & Compliance Consult with system owners to review risk assessments for IT and OT systems, identify vulnerabilities, and provide governance-focused recommendations for mitigation strategies in compliance with RMF and NIST standards. Support system … up-to-date and aligned with the Army's and organizations RMF process. Provide clear, concise reports on risk posture to senior leadership. Incident Response & Mitigation: Support and advise system owners in responding to security incidents across IT and OT environments, offering guidance on the development of incident response protocols and procedures. Assist with reviewing and analyzing post-event More ❯
performance to ensure compliance with SLAs, managing ticket queues and ensuring incidents are resolved in a timely manner. • Proactively identify and mitigate potential SLA breaches through regular reviews of system performance and troubleshooting incidents. • Develop and implement corrective actions for downtime or service unavailability, ensuring compliance with contractual obligations and maintaining uptime targets (e.g., 99.8% system availability). … Trust are enforced and that sensitive information is handled in accordance with company policies and compliance requirements. Facilitate regular reviews of access controls, permissions, and security posture. System Maintenance and Performance Optimisation: • Manage the scheduling and execution of preventive maintenance activities, including updates, patches, and hardware replacements. Project Management and System Configuration: • Collaborate with … service levels are met and improve overall service delivery. Training and Documentation: • Maintain up-to-date technical documentation for IT services and systems, including troubleshooting guides, best practices, and system configurations. • Lead the development of user training programs, ensuring effective onboarding and knowledge transfer to end-users and staff. Business Minded and Continuous Improvement: • Actively drive improvements in IT More ❯
all duties within the Cyber Security Asset Management portal. Update all cybersecurity documentation and attend all related IT and Cybersecurity meetings. Provide knowledge for maintaining awareness of system/network security posture, including vulnerability scanning to facilitate the application of quick and effective corrective measures, while ensuring configuration management requirements are met. Provide technical knowledge … and information assurance analysis support, including security assessment of applications and systems, operating systems, internet-facing interfaces, intranet, and other interconnections. Provide analysis of existing system vulnerabilities, including possible intrusion/entry points, resource manipulation, denial of service, and/or destruction of resources. Provide technical support and analysis to document the organizational information protection … Oversee information security incident response activities, risk assessment and risk management activities, and vulnerability assessment and vulnerability management activities. Manage detailed network, operating system, database, and application vulnerability assessments and security configuration audits. Manages information security initiatives. Prepare information security awareness and education materials and other documentation. Determine and More ❯
About Us FlexTrade Systems is a provider of customized multi-asset execution and order management trading solutions for buy- and sell-side financial institutions. Through deep client partnerships with some of the world's largest, most complex and demanding capital markets firms, we develop the flexible tools, technology and innovation that deliver our clients a competitive edge. Our … safeguarding our systems and supporting our Application teams, Clients and the larger ITSMission. Responsibilities Develop and implement comprehensive security strategies, policies, and procedures to protect the organization's information assets. Design, deploy, and manage security solutions, including PAM/IAM, intrusion detection/prevention systems, endpoint protection, data loss prevention, encryption, and vulnerability management tools. Design … focusing on designing and implementing security solutions and managing security infrastructure, both on-premise and cloud. Experience working with privilege and identity management solutions. Experience with operating system security and system hardening. Knowledge of network security principles, protocols, and technologies. Strong analytical and problem-solving skills, with the ability to assess risks and develop appropriate security More ❯
certification and accreditation activities, including building and shepherding of RMF packages Ensure successful implementation of assigned security controls Implement audit measures to ensure compliance with regulatory requirements Participate in system fieldings, operations, and upgrades Assist Program Management Offices with cybersecurity-related acquisition documentation Ensure adherence to DoD Inspector General (IG) Cybersecurity Self-Assessment checklist compliance and Federal … Information Security Management Act (FISMA) Participate in organizational inspections and surveys of computer systems; provide inspection results and assess the adequacy of corrective actions Advise on complex and unique computer security systems, make recommendations on the approval of various computer operations, and provide alternatives to meet security requirements Assist in developing, maintaining, implementing, and delivering a … contract deliverables Develop SOPs and templates for standardizing and streamlining cybersecurity process across the product office Prepare and review cybersecurity strategies, test plans, procedures, and reports Review and evaluate system performance against cybersecurity related specification requirements, monitor and assess field performance, and assess risk of meeting user and specification requirements Assist with cost, schedule, performance, and risk analyses Assist More ❯
platforms such as eFront, Yardi, Viewpoint, Fenergo, and Aztec Connect (Client Portal). You will also play a key role in evaluating emerging technologies and establishing best practices for system architecture, data management, and cloud adoption. As a key advisor to senior stakeholders, the Enterprise Solution Architect will bridge business needs with technology capabilities, contributing to the … framework to enable seamless connectivity between Aztec's key applications, third-party services, and client-facing platforms. Establish architectural principles, standards, and governance models that promote best practices across system development and operations. Drive the adoption of cloud-native architectures, microservices, and API-first strategies where relevant to enhance scalability and performance. Ensure security, compliance, and resilience are embedded … integrated data sources. Technology Selection & Innovation Evaluate emerging technologies, trends, and vendors to drive innovation and maintain a competitive edge in financial services technology. Provide architectural guidance on new system implementations and integrations, ensuring they align with the enterprise roadmap. Collaborate with business and IT stakeholders to identify gaps, assess risks, and recommend solutions that support business growth. Define More ❯
platforms such as eFront, Yardi, Viewpoint, Fenergo, and Aztec Connect (Client Portal). You will also play a key role in evaluating emerging technologies and establishing best practices for system architecture, data management, and cloud adoption. As a key advisor to senior stakeholders, the Enterprise Solution Architect will bridge business needs with technology capabilities, contributing to the … framework to enable seamless connectivity between Aztec's key applications, third-party services, and client-facing platforms. Establish architectural principles, standards, and governance models that promote best practices across system development and operations. Drive the adoption of cloud-native architectures, microservices, and API-first strategies where relevant to enhance scalability and performance. Ensure security, compliance, and resilience are embedded … integrated data sources. Technology Selection & Innovation Evaluate emerging technologies, trends, and vendors to drive innovation and maintain a competitive edge in financial services technology. Provide architectural guidance on new system implementations and integrations, ensuring they align with the enterprise roadmap. Collaborate with business and IT stakeholders to identify gaps, assess risks, and recommend solutions that support business growth. Define More ❯
Fairfax, Virginia, United States Hybrid / WFH Options
M.C. Dean
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … day software operations, managing productivity to ensure release targets are consistently met by managing work assignments, balancing resources, and remediating blocking conditions. Create, manage, and maintain detailed and accurate system documentation, including design and configuration plans, design diagrams, task-oriented procedures, operations and maintenance plans, etc. Plan and conduct user testing (UAT). Establish KPIs, identify gaps, and improve … . Qualifications Clearance/Citizen Type: Applicants selected will be subject to a government security investigation and may meet eligibility requirements, including U.S. Citizenship, for access to classified information; ACTIVE TOP SECRET Clearance is REQUIRED Key Requirements: Education: Bachelor's degree in Computer Science, Information Technology, or a related Engineering Discipline with 7+ years of progressive More ❯
level agreements (SLAs), ensuring that our business receive reliable, timely, and high-quality IT support. As our IT Manager, youll lead the strategic development and day-to-day management of our IT infrastructure. Youll oversee our outsourced IT service provider, manage internal IT resources, and ensure our systems are secure, efficient, and future-ready. Were looking for someone … quality and service delivery, and strategic development. Facilitate effective communication between the charity and the managed service provider, ensuring an appropriate escalation process for urgent IT requests. Support IT system procurement projects across the organisation, providing technical challenge, support, and input. Ensure training and guidance for staff on IT systems and best practices are available and accessible. Collaborate with … of Azure and licensing provision costs and usage. Oversee management of the IT asset register, including logging and reporting of hardware, software, and IT assets. Ensure regular system checks and scheduled maintenance activities are completed to maintain IT infrastructure integrity and compliance with relevant regulations. Oversee management and maintenance of the charity's IT infrastructure More ❯
risk analysis and recommendation Collaborate between the AO and the program as well as program leadership Identify the security baseline based on the mission and security impacts to the system Determine assessment criteria, develop, review, and create a plan to assess the security requirements Assess the security requirements in accordance with the assessment procedures defined in the security Assessment … plan (SAP) Prepare the SAR Monitor POAM actions based on findings and reassess remediated risk(s) as appropriate Develop the risk recommendation and AO determination brief Develop a system-level continuous monitoring strategy Author and present briefs regarding status of authorizations to AO and other senior government officials Provides security architecture and DoD compliance advisory support Perform other duties … Experience would include cloud compute, cloud storage, cloud native solutions, cloud data transfer, cross domain solutions, and cloud networking Experience assessing STIGs, cloud compliance guides, Shares responsibility models, and system mission owner responsibilities within government cloud environments Experience working with OSD leadership or military component or branch Expert understanding of NIST 800 series guidelines, DoDI 8500.01, DoD 8140.03, rISO More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
s cyber superiority by delivering robust and resilient IT security solutions. Our mission is to enhance the Air Force's defensive cyber operations through innovative security engineering, risk management, and continuous compliance. We're looking for a Senior IT Security Specialist to join our team supporting the U.S. Air Force's Unified Platform software factory in San Antonio. … In this role, you will play a pivotal role in shaping and maintaining the security posture of complex cyber systems and infrastructure. You will work closely with security engineers, system administrators, software developers, and mission owners to ensure systems are built and operated in compliance with DoD cybersecurity standards and frameworks. We are hiring for both fully remote positions … systems. Manage implementation and maintenance of security controls in accordance with NIST SP 800-53, DoD RMF, and DISA STIGs. Oversee preparation and continuous updates of security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Perform threat modeling and recommend mitigation strategies to reduce attack surface and address known vulnerabilities. Collaborate with More ❯
collaboration and delivery, and the capability to manage incidents, service requests, and change processes. Familiarity with SQL, SSIS, and experience with DevOps practices is advantageous. Key responsibilities: Workload Management and Scrum Facilitation: Collaborate with the Team Lead to prioritize, allocate, and monitor tasks across the development team, using Scrum methodologies, ensuring timely and efficient delivery of integration projects. … Oversight: track project milestones, and uphold streamlined team processes to support operational excellence, ensuring all Scrum artifacts (e.g., product backlog, sprint backlog) are up-to-date. Documentation & Knowledge Management: Maintain up-to-date technical documentation, including API/interface catalogues, data flow diagrams, environment runbooks, and integration design patterns Incident and Service Request Administration: Assist in root cause … conduit between the development team and project teams to ensure consistent, transparent, and professional communication Education and Experience: Bachelor's degree in computer science, information-technology, engineering, system analysis or a related study, or equivalent experience A minimum of three years in a technology-related capacity with direct exposure to software development or IT project environments. At More ❯