test data needed for consistent, repeatable test execution. Test Strategy and Planning: Collaborate with cross-functional teams to define the automation testing strategy, including test coverage, test data management, and execution plans. Automation Opportunities: Identify and support opportunities to introduce or expand automation within QA processes. Execution and Reporting: Execute automated test cases, analyse results, and report defects … support knowledge sharing and continuity. Mentorship: Provide guidance, support, and knowledge sharing to QA team members, fostering adoption of automation practices and tools. Requirements Degree in Computer Science, Information Technology, or a related field, or equivalent professional experience. Proven experience as an Automation Tester or in a similar role, with a strong track record working on iOS, web More ❯
of experience with data analytics, data engineering, statistical analysis, or artificial intelligence and machine learning • Experience developing and documenting organizational standards for Data Storage, Data Transformation, and Metadata Management • Ability to work independently with minimal oversight and direction • Bachelor's degree in computer sciences, informationsystems, engineering, or other related technical discipline. Employees of Agile Defense More ❯
Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: CACI is seeking a Technical Writer in support of the Enterprise Information Technology as a Service (EITaaS) contract with the Department of the Air Force. The EITaaS program supports our customer to provide a common set of required EIT services across … the way in transforming IT services from an in-house, base-centric delivery model to an advanced enterprise service delivery model. This position will directly support the Configuration Management Database (CMDB) project within the EITaaS program. The Technical Writer will be responsible for creating, editing, and maintaining comprehensive documentation related to our Configuration Management Database (CMDB … and conforms to standards. Create clear, concise, and user-friendly documentation for both technical and non-technical audiences. Collaborate with CMDB analysts, IT teams, and stakeholders to gather information and understand complex technical concepts. Design and create visual aids, diagrams, and flowcharts to supplement written documentation. Regularly review and update existing documentation to reflect changes in processes or More ❯
crawley, west sussex, south east england, united kingdom
Emerson
your career further in a highly skilled team and global leader in automation technology, we welcome you to join us! In this role your responsibilities will be: Deliver managementinformation adding commercial value to the customer and internally. Build and test prototype analysis using SQL, Python & Dash (or equivalent) for internal management tools and … to deliver valuable contributions for customers. Creative and pro-active problem solving approach. Strong communication and presentation skills. Ability to maintain strong motivation, and good time/effort management to achieve results. Preferred qualifications to set you apart: Previous experience working in a matrix organization. Our Culture & Commitment To You At Emerson, we prioritize a workplace where every More ❯
work with technology to operationalise them. Provision of ongoing support for the continued effectiveness of analytics and modelling solutions to users. Demonstrate conformance to all Barclays Enterprise Risk Management Policies, particularly Model Risk Policy. Ensure all development activities are undertaken within the defined control environment. Assistant Vice President Expectations To advise and influence decision making, contribute to policy … work, for business aligned support areas to keep up to speed with business activity and the business strategy. Engage in complex analysis of data from multiple sources of information, internal and external sources such as procedures and practises (in other areas, teams, companies, etc).to solve problems creatively and effectively. Communicate complex information. 'Complex' information could … include sensitive information or information that is difficult to communicate because of its content or its audience. Influence or convince stakeholders to achieve outcomes. All colleagues will be expected to demonstrate the Barclays Values of Respect, Integrity, Service, Excellence and Stewardship – our moral compass, helping us do what we believe is right. They will also be More ❯
experience and operational outcomes. Collaborate with stakeholders to ensure that development aligns with business objectives and user needs. Qualifications Bachelor's degree or higher in Computer Science, Engineering, InformationSystems, or a related field. Minimum of 5 years of software development experience. Experience in Python, .NET (C#), Angular, and Snowflake. Proven track record in architecting scalable, robust software More ❯
collaboratively to resolve complex issues within DoD cloud environments. Escalate risks, constraints, and critical issues to appropriate stakeholders for resolution. Qualifications Bachelor's degree in computer science, IT, informationsystems, or related field. Certified in one of the following: CASP+; CCNP Security; CISA; CISSO; GCIA; GCSA; GCLD; GICSP; GSLC; CISSP; CISSP-ISSAP; or CISSP-ISSEP Six (6+) years More ❯
advanced analytics, enabling them to accelerate research, optimise trading strategies and generate alpha at unparalleled speed and scale. Our culture is inclusive and highly collaborative, with a flat management structure that empowers our employees to get involved in decision making as we continue to grow and scale. We give all our employees share options so they participate in … the growth and development of the business. We offer a combination of remote and office (London based) working, weekly team lunches and plenty of office snacks! For more information, please visit our website, or visit our or About the Role: At BMLL we process financial data in a process we call parsing. We continually add new financial datasets More ❯
demanded from all our highly professional roles. Be the change, lead our change - join us! HOW AN ISSO WILL MAKE AN IMPACT Provide information assurance support to system(s) and program Maintain operational security posture for system(s) through customized Risk Management Framework (RMF) to ensure established security processes and procedures are followed Evaluate … security solutions to ensure security requirements are met for processing classified information Provide configuration management and documentation for system software, hardware, networks, enclaves, etc. Prepare and review system documentation to include Systems Security Plans (SSPs), Certification and Accreditation (C&A) packages, architecture diagrams, contingency plan, incident response plan, and other documentation Support programmatic and … and oral communication skills to write technical analysis reports and security plans Security Clearance Level: TS/SCI with active polygraph Preferred Certifications: CompTIA Security+ Certified InformationSystem Security Processional (CISSP) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH) AWS Certified Cloud Practitioner (CCP) Microsoft Azure Google Cloud Platform (GCP) Location: Reston, VA GDIT More ❯
intelligence priorities as well as internal business processes and mission functions, network communications, database management, security accreditation, and workflow management. The ISSE will design and implement secure system architectures to protect SAF/OC informationsystems from cyber threats. The ISSE will work closely with ISSMs, ISSOs, and IT teams to integrate security controls and … informationsystems in accordance with Department of Defense (DoD) requirements. This role involves collaborating with various stakeholders to ensure that security measures are effectively integrated into the system development lifecycle (SDLC) and that compliance with relevant regulations is achieved. This is a unique hands-on technical role in such that the ISSE is responsible for compliance-based … responsibilities include but are not limited to: • Provide expertise and recommendations in applying security requirements to complex combatant command projects, identifying gaps, and while integrating new technologies. • Develop secure system architectures and hardening solutions. • Conduct vulnerability assessments, security testing, and continuous monitoring. • Implement security controls per RMF and NIST guidelines. • Support risk assessments and incident response efforts. • Ensure security More ❯
assessments to verify compliance with required configuration guidance and support A&A testing and validation of security designs. • Conducting risk analysis reviewing ACAS, CVEs, plugins, CWEs, research, collaborate with System Administrators to mitigate identified vulnerabilities and/or author Plans of Actions and Milestones (PO&AM) as needed. • Execution of continuous monitoring efforts responds to data calls, scan requests … technical input. • Support government activities and reporting to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC) • Support security authorization activities in compliance with the customer InformationSystem Certification and Accreditation Process following the NIST Risk Management Framework (RMF), CNSSI No 1243 and other prescribed business processes for security engineering. • Assist architects and systems developers … in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. • Apply system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the More ❯
for the Secretary of the Air Force - Security, Special Program Oversight, and Information Protection Directorate (SAF/AAZ), to include support to the AAZ InformationSystem Security Manager (ISSM). Per sections 1.3.4.1 and 1.3.9.1, specific responsibilities and tasks include but are not limited to: Specific responsibilities include but are not limited to: •Assist with … of cybersecurity related processes and activities for AAZ InformationSystems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life Cycle Management Processes (e.g. Engineering Change and Configuration Management), Vulnerability Management, Malware Protection, Security Assessments/… AAZ IT and Security staff to determine IT requirements for office space/daily operational needs. •Assist with production of documentation to support cybersecurity assessments, security impact analysis and system authorization of AAZ informationSystems per ISSM guidance. •Assist with maintaining an Information Assurance Program and ensure compliance with DODO 8510.01 - Risk ManagementMore ❯
complex security challenges and making a tangible impact, this is the role for you. Your greatest work is ahead! Responsibilities Include: Enhancing security posture by supporting the program, organization, system, or enclave's information assurance initiatives and enforcing security policies, standards, and methodologies. Overseeing security operations for informationsystems, managing daily security aspects, evaluating security … solutions for classified processing, and conducting vulnerability and risk assessments for accreditation. Managing configuration and system integrity by administering configuration management (CM) for security software, hardware, and firmware, ensuring compliance with security controls, and assessing the impact of system changes. Developing and maintaining security documentation, including System Security Plans (SSPs), Risk Assessment Reports, Certification & Accreditation … C&A) packages, and System Requirements Traceability Matrices (SRTMs). Ensuring compliance with security authorization activities following the InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF). Providing technical expertise in security policies and operations, supporting the implementation and maintenance of security measures, and collaborating with stakeholders to strengthen More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency Security Policy and Enterprise Solutions. Supports the building of security architectures. Enforces the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking … operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication; and authorization More ❯
Solutions, a nationally recognized "Great Place To Work", has exciting opportunities providing Engineering solutions for innovative new-entrant space companies, as well as established space systems manufacturers, commercial space system operators and service providers, and other industry stakeholders including investors. At Stellar Solutions, we offer talented, energetic, and immediately productive resources to satisfy our customers' critical needs in systems … experience working with complex systems within the space industry. They will also possess excellent communication, problem-solving, and teamwork skills. This position is full-time on LAAFB. The qualified System of Systems Engineer (SoSE)/Risk Manager will have: Required skills : Systems Engineering Expertise: Minimum of 5-7 years of experience in systems engineering, with a focus on complex … systems, preferably within the space industry. Experience with System of Systems (SoS) engineering principles is highly desirable. Demonstrated experience in risk management processes and techniques is essential. Strong understanding of the systems engineering lifecycle (requirements definition, design, development, integration, testing, verification, validation, and operations). Experience with systems engineering methodologies (e.g., Agile, Model-Based Systems Engineering (MBSE More ❯
Department of Defense security clearance required. Candidate must be SAP and SCI program eligible. This position is in-person. Toyon Research Corporation is seeking a skilled InformationSystem Security Engineer to join our IT team and work closely with the ISSM and security officers. The successful candidate will be responsible for protecting our organization's information … understanding of network security concepts, protocols, and technologies (firewalls, intrusion detection/prevention systems, VPNs) Experience configuring and managing firewalls and switches for secure network segmentation and access control System Administration: Experience with virtualization technologies and hypervisors (e.g., VMware, Hyper-V). Proficiency in building and configuring both Windows and Linux virtual machines (VMs) for various purposes Understanding of … operating system security hardening techniques for relevant platforms (Windows, Linux) to include STIGs or other industry standards Scripting: Familiarity with scripting languages (e.g., Bash, PowerShell) for automating security tasks is a plus Requirements Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent experience) Minimum of 2-3 years of experience in a More ❯
Computer Technologies Consultants (CTC) is seeking an InformationSystems Security Engineer (ISSE) to support the Defense Intelligence Agency (DIA) in Washington, DC. With offices in Washington DC and San Diego, CA, CTC is a leading technology company providing lifecycle IT, data analytics, cloud managed hosting services, agile software development, DevOps, Test Automation, Cyber Security, and infrastructure solutions. Additionally … Operations solutions and strategic adherence to all aspects of the Cyber Security program as stipulated by various U.S. Government requirements include: IC Directive (ICD) 503, Committee for National Security System's Instruction (CNSSI 1253) and associated NIST publications. Preparation of Assessment and Authorization documents and procedures. Interface with other Cyber Security team members, other security disciplines (industrial security, physical … Demonstrated experience leading projects in the IC ISSE/ISSO must have certifications and/or comprehensive hands-on technical experience in the technology area(s) of their assigned system(s) in order to effectively carry out their duties. Familiarization with NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal More ❯
CSCI, a trusted classified environment partner for over 30 years, is seeking an InformationSystems Security Officer (ISSO) with 4-6 years of experience in information security, information technology, enterprise risk or compliance field to join our cybersecurity team. This role provides strategic coordination across information security functions, ensuring strong inter-team … and their effectiveness in real-time . Analyze security-related information to identify trends and potential threats. Prepare and maintain documentation for security status reporting. Collaborate with system owners and other stakeholders to address security findings and implement remediation plans. Assist in the development and updating of System Security Plans (SSPs) and other RMF documentation. Stay … skills. Excellent written and verbal communication skills. Ability to work effectively in a team environment and collaborate with various stakeholders. Experience with Splunk. Strong understanding of network security principles, system hardening techniques, and vulnerability management. Experience with vulnerability scanning tools and security logging/monitoring. Preferred Qualifications: CISSP certification. An Active DoD Top Secret Clearance. Familiarity with Federal informationMore ❯
Are you an SME-level, highly skilled and motivated InformationSystems Security Engineer (ISSE)? Ardent Principles is searching for a full-time InformationSystems Security Engineer (SME) to join the DevOps team onsite in Herndon, VA. If you're passionate about innovation, thrive on collaboration, and are ready to make an impact, this is the opportunity … Company's mission to life. You must have the following required skills, certifications and demonstrated experience in and/or with: Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent experience). CISSP, CASP+, CEH, GSLC, Security+, AWS Certified Security certifications or other relevant cybersecurity certifications. Hands-on experience with tools such … team of innovators, problem-solvers, and collaborators dedicated to pushing the boundaries of what's possible. Our mission is to empower organizations with transformative IT solutions and program management services, while our values of integrity, excellence, and teamwork guide everything we do. We foster a culture of open communication, where every voice is heard, and every idea is More ❯
to the defense industry, Anduril is changing how military systems are designed, built and sold. Anduril's family of systems is powered by Lattice OS, an AI-powered operating system that turns thousands of data streams into a realtime, 3D command and control center. As the world enters an era of strategic competition, Anduril is committed to bringing cutting … instructional documentation and convey highly technical ideas in non-technical terms for end-users. Perform security hardening of systems using DISA STIG's and other best practice security guidelines. System/database/software/firewall/account maintenance and monitoring. Maintaining smooth, secure operation of multi-user computer systems through coordination with peers, and engineers. System re … data that collects snapshots of parameter files and checks database for logical and physical corruption. Virtual Machine Management Service (Hyper-V/VMware). Maintaining/upgrading system hardware and startup/shutdown of rack components. Applying OS updates, anti-virus/anti-spyware updates, and Application updates. Importing/Exporting large data volumes. Red Hat Certified More ❯
design, implementation, maintenance, and security of the organization's Linux and Windows server infrastructure. The ideal candidate should possess strong expertise in Linux and Windows operating systems. Key Responsibilities: System Administration: Install, configure, and maintain Linux and Windows servers. Perform routine system monitoring, analysis, and troubleshooting to ensure optimal system performance. Collaborate with cross-functional teams to … design and implement system upgrades, patches, and new applications. Security Management: Implement and maintain security measures to safeguard systems against unauthorized access, vulnerabilities, and data breaches. Conduct regular security audits, vulnerability assessments, and implement corrective actions. Stay updated on the latest security trends, vulnerabilities, and best practices. Scripting and Automation: Develop and maintain scripts using Bash, Python … or PowerShell to automate routine tasks, streamline processes, and improve system efficiency. Create and update documentation for scripts, configurations, and procedures. User Support: Provide technical support to end-users for Linux and Windows-related issues. Collaborate with the helpdesk team to resolve escalated support tickets in a timely manner. Monitoring and Performance Tuning: Implement and maintain monitoring solutions to More ❯
design, implementation, maintenance, and security of the organization's Linux and Windows server infrastructure. The ideal candidate should possess strong expertise in Linux and Windows operating systems. Key Responsibilities: System Administration: Install, configure, and maintain Linux and Windows servers. Perform routine system monitoring, analysis, and troubleshooting to ensure optimal system performance. Collaborate with cross-functional teams to … design and implement system upgrades, patches, and new applications. Security Management: Implement and maintain security measures to safeguard systems against unauthorized access, vulnerabilities, and data breaches. Conduct regular security audits, vulnerability assessments, and implement corrective actions. Stay updated on the latest security trends, vulnerabilities, and best practices. Scripting and Automation: Develop and maintain scripts using Bash, Python … or PowerShell to automate routine tasks, streamline processes, and improve system efficiency. Create and update documentation for scripts, configurations, and procedures. User Support: Provide technical support to end-users for Linux and Windows-related issues. Collaborate with the helpdesk team to resolve escalated support tickets in a timely manner. Monitoring and Performance Tuning: Implement and maintain monitoring solutions to More ❯
Description TS/SCI Required Join our secure IT operations team to manage and maintain critical Windows-based infrastructure in a classified environment. We're seeking an experienced Windows System Administrator with active TS/SCI clearance to ensure the reliability, security, and performance of our enterprise systems. You'll be responsible for managing Windows Server environments, Active Directory … group policies, and organizational units • Install, configure, and maintain Windows-based servers, workstations, and enterprise applications • Implement and maintain security policies, patches, and compliance measures for classified systems • Monitor system performance, troubleshoot issues, and ensure maximum uptime and reliability • Perform regular backup operations and disaster recovery procedures for critical systems • Manage virtualized environments using VMware vSphere or Hyper-V … platforms • Configure and maintain network services including DNS, DHCP, and file sharing services • Implement and maintain endpoint security solutions and antivirus systems • Create and maintain system documentation, procedures, and configuration standards • Conduct security assessments and vulnerability management for Windows infrastructure • Coordinate with cybersecurity teams to implement security controls and incident response procedures • Manage software deployment, updates, and More ❯
field provides customized solutions to our customer's unique needs. Summary: The Information Assurance Analyst - Mid Level will support the Overseas Buildings Operations (OBO) InformationSystem Security Officer (ISSO). The Senior Analyst will act as a subject matter expert (SME) for Federal Assessments & Authorizations (A&A); provides sound advice and recommendations to lower risk … Management Act (FISMA) implementation efforts Help implement information security policies, procedures, and guidelines developed in collaboration with senior staff. Conduct risk assessments, vulnerability assessments, and system audits to identify potential security threats to OBO information systems. Provide recommendations to mitigate identified risks and ensure compliance with applicable regulations and standards. Provide support for … A&A process in support of obtaining Authority to Operate (ATO) approvals of OBO systems Perform Security Impact Analysis (SIA) review of change requests and provide reporting requirements to system owners. Analyze and report on security findings identified during assessment Create Plan of Action & Milestones (POAMs) for identified security control findings. Evaluate security control implementations for all OBO SystemsMore ❯
of the Head of IT Systems. Coordinate day-to-day operations of IT systems and support teams to ensure smooth delivery of services and exceptional user experience. Collaborate with system administrators to monitor system health and resolve issues proactively. Support the Head of IT Systems in resource allocation and workload management for IT teams. Systems Monitoring … behalf of the Head of IT Systems, to ensure all systems operate efficiently, including performance tracking and incident escalation. Ensure timely application of patches and updates in collaboration with system administrators. Provide input on the technical aspects of system upgrades and enhancements. Policy Compliance & Standards: Assist Head of IT Systems in the implementation and enforcement of IT policies … IT projects, ensuring milestones and deliverables are met. Work closely with the PMO team to maintain project documentation and support stakeholder engagement throughout the project lifecycle. Data & Reporting: Generate system performance reports, highlighting key metrics, trends, and areas for improvement. Contribute to the development of dashboards for better visualization of IT system performance and usage. Innovation & Continuous Improvement More ❯