About Our Organization: Dow Jones is a global provider of news and business information, delivering content to consumers and organizations around the world across multiple formats, including print, digital, mobile and live events. Dow Jones has produced unrivaled quality content for more than 130 years and today has one of the world's largest news-gathering operations globally. … of initiatives. You Have: 7+ years of SEO experience, with at least 3+ years in a leadership role managing teams and SEO product strategy. Proven experience in product management or product ownership within an SEO or digital marketing context. Deep understanding of SEO best practices, search algorithms, and the technical elements of SEO (crawling, indexing, sitemaps, etc.). … all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law.EEO/AA/M/F/Disabled/Vets. Dow Jones is committed to providing reasonable accommodation for More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
functional teams to find out the feasible design and solution which is adhere to the bank standard. Perform clear choice analysis for multiple solutions and provide to senior management for decision making. POC the solution for VM migration. Requirements and skills: Bachelor's degree in Computer Science, Information Technology, or a related field. 5+ years of More ❯
Job Title: Malware Analyst Location: Washington, D.C. Metro Area (Onsite) Clearance Requirement: Active Top Secret (TS) with SCI eligibility preferred Position Summary: Magnus Management Group LLC is seeking a highly skilled Malware Analyst to provide deep malware analysis and reverse engineering support aligned with our clients active incident response (IR) operations and evolving cybersecurity priorities. This position is … actors. Participate in threat hunts and detection engineering efforts to improve the clients proactive defense posture. Required Qualifications: U.S. Citizenship is required. Bachelor's degree in Computer Science, Information Security, or related field (or equivalent practical experience). 5+ years of hands-on experience in malware analysis, digital forensics, or reverse engineering. Deep familiarity with x86/x64 More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
eTeam
functional teams to find out the feasible design and solution which is adhere to the bank standard. • Perform clear choice analysis for multiple solutions and provide to senior management for decision making. • POC the solution for VM migration. Requirements and skills • Bachelor's degree in Computer Science, Information Technology, or a related field. • 5+ years of More ❯
I professional, you will work in a junior/support role as part of a software development team supporting defense programs. This position involves software development, cyber compliance, and system integration activities. Youll participate in code reviews, learn team coding standards and best practices, and shadow senior developers to understand system architecture and workflows. Duties and Responsibilities Development … Activities Participate in code reviews and learn team coding standards and best practices. Shadow senior developers to understand system architecture and workflows. Write, debug, and test code modules. Assist in maintaining internal tools and scripts. Develop and run tests using team-approved frameworks. Optimize existing code and log, track, and close bugs. Adhere to security coding practices. Follow established … existing code for clarity and maintainability. Contribute to internal knowledge base sharing and management. Take meeting notes and summarize discussions for the team. Review and improve user guides and system diagrams. Maintain accurate and up-to-date documentation for code and design decisions. Collaboration and Support Attend meetings, create presentations, and present technical information. Collaborate across teams on integration More ❯
work will involve closely liaising with cross-functional teams to ensure that all project deliverables meet business expectations and business goals. The ideal candidate will have strong project management experience, excellent problem-solving skills, and a proven track record of delivering complex projects successfully in related applications and platforms. You will be working as part of a team … organized and in conformance with timeline and deliverables requirements Develop and maintain project plans, tracking overall progress and achievement of milestones Report project risks and outcomes to appropriate management channels, and escalate issues according to project communication plan Support the functions of the PMO and in the coordination and control of change management processes and procedures … the responsibilities listed above, the job holder may be required to perform other duties as assigned from time to time by their manager or a senior leader. Relationship Management: Primary point of contact for project delivery throughout the project lifecycle, ensuring clear and consistent communication. Build strong relationships with stakeholders to ensure satisfaction and understanding of the business More ❯
Financial Analyst Puerto Rico We are seeking a driven, detail-focused, and analytically minded Financial Analyst to join our team, to support the Financial Management Division. The role may include handling sensitive information and interacting with individuals at all levels within and outside the organization. ESSENTIAL DUTIES AND RESPONSIBILITIES: • Provide investigative support to the money laundering … reports and special data sheets for analysis relative to conducting financial/forfeiture analysis. • Prepare investigative financial charts (bank account links, wire transfer analysis). • Log and enter information databases pertinent information gleaned from financial analysis and investigative reports into databases. • Gather and prepare statistical data. • Utilize tools that aggregate data and facilitate analysis. • Provide analytical … PREFERRED QUALIFICATIONS and KNOWLEDGE, SKILLS, AND ABILITIES: • Experience in a contracting environment or federal government is preferred but not required. • Ability to organize and conduct detailed examinations of information generated during complex criminal/civil investigations and information available through alternative sources to conduct financial analyses of personal/business assets of targeted organizations/individuals. More ❯
Newcastle Upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
policies to ensure that ethical considerations are embedded. 8. Identifying, recording and mitigating organisational risks and issues associated with analytics and data ethics. Working within the NHSBSA risk management framework. 9. Representing the organisation in relation to analytical assurance and data ethics. Sharing and learning best practice. About us Here at the NHS Business Services Authority (NHSBSA), what … while focusing on user needs. 4. Works collaboratively with a range of teams, networks and product owners across the organisation to embed principles. Including but not limited to Information Governance, Data Governance, Data Platforms, Data & Analytics Communities, Heads of Service, Inclusion Accessibility and Social Impact Lead, Statistical Publication Lead, Data Science & Advanced Analytics Lead and Open Data Lead. … strengths and limitations are fully understood and communicated. 11. Identifies, records and mitigates organisational risks and issues associated with analytics and data ethics. Working within the NHSBSA risk management framework. 12. Jointly leads on the development of the Data & Analytics communities across the NHSBSA. 13. Contributes to the leadership of the Data Science, Advanced Analytics & Statistics service. This More ❯
liaison between business units, IT teams, and external vendors to ensure alignment on project goals. Documentation: Create comprehensive documentation, including process maps, business requirements, and user guides. Project Management: Assist in planning, tracking, and reporting to ensure timely delivery of payment solutions. Compliance: Ensure that all solutions meet regulatory standards and industry best practices. What We’re Looking … For: Education: Bachelor’s degree in Business Administration, Finance, Information Technology, or a related field. Experience : Proven experience as a Business Analyst, with extensive experience in testing within the banking payments sector. Technical Skills: Proficient in testing tools and methodologies, with a solid understanding of payment systems. Analytical Skills: Strong problem-solving abilities and the capacity to interpret More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the-shelf cryptography; identification; authentication; and More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Responsibilities • Designs, develops, implements and/or integrates IA and security systems … and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. • Builds IA into systems deployed to operational environments. Assists architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of security policy and enterprise … solutions. • Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. • Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. • Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities More ❯
perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for … of Agency security policy and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system … Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its content. Support security authorization activities in compliance with NSA/CSS InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes More ❯
Systems Security Manager (ISSM) to drive information assurance initiatives, including security authorization activities, compliance with Risk Management Framework (RMF) policies, and the development of System Security Plans (SSPs). Strengthen Our Defense: Perform Security Technical Implementation Guide (STIG) reviews, self-assessments, and participate in Assessment & Authorization (A&A) testing to ensure our systems stay … secure and compliant. Stay Ahead of Threats: Analyze system audit logs for unusual activity, conduct vulnerability assessments, and implement mitigation strategies to protect against potential risks. Shape Security Policy: Use your expertise to apply a comprehensive range of cybersecurity policies, principles, and techniques to maintain the integrity of systems processing classified information. Drive Risk Management: Perform risk … analysis for system changes, contribute to the Risk Management Framework process, and recommend security solutions to address any identified gaps. Collaborate with Experts: Partner with government customers to support Continuous Monitoring (ConMon) activities, manage security incidents, and ensure timely vulnerability remediation. Maintain Security Documentation: Ensure all system documentation is up to date in government record-keeping More ❯
BCT is seeking an ISSO to serve as a principal advisor to the Government on all matters, technical and otherwise, involving the security of an InformationSystem (IS) A career at BCT-LLC says you want to contribute and make a difference to something larger than yourself where success results from the dedication our team members have … Account Management o Vulnerability Management o Security Incident Management o POA&M Management o Reauthorization o Decommissioning o Collaborate with the System Owner to maintain Approval to Operate (ATO), including the resolution of any Plans of Action & Milestones (POA&M) documents issued by the DAO. o Maintain and validate account and … vulnerability management. o Develop and provide updated System Security Plans (SSPs) and supporting documentation (e.g. SECONOPs, diagrams, Privileged User's Guide). • Respond to any data calls. • Provide security design guidance and analysis to the project team throughout the Risk Management Framework (RMF) process. o Collaborate with the InformationSystem Security Engineer (ISSE) in More ❯
mission-critical systems by implementing and managing security controls in compliance with Department of Defense (DoD) cybersecurity policies and standards. Key Responsibilities: Develop, implement, and maintain security documentation, including System Security Plans (SSPs), Plan of Action & Milestones (POA&Ms), and risk assessments. Support system accreditation and continuous monitoring activities under the Risk Management Framework (RMF). … Conduct vulnerability assessments, track remediation efforts, and verify that security requirements are effectively implemented. Monitor system compliance with DoD, NIST, and organizational security policies. Participate in security audits, inspections, and assessments. Collaborate with system administrators, engineers, and program teams to ensure secure system design and operations. Support incident response by documenting and coordinating response actions. Provide recommendations … to improve system security posture and support security awareness initiatives. Required Qualifications: Active Secret clearance (or higher). Current CompTIA Security+ certification (IAT Level II). 2-5 years of hands-on experience in information security, cybersecurity compliance, or system security roles. Familiarity with DoD cybersecurity policies, RMF processes, STIGs, and NIST frameworks. Experience developing or More ❯
Job Summary We are seeking a skilled and dedicated InformationSystems Security Engineer to join our team. In this role, you will be responsible for safeguarding our organization's informationsystems and ensuring the integrity, confidentiality, and availability of data. You will work closely with IT teams to implement security measures, respond to incidents, and maintain … Clearance Bachelors Degree with 5 years experience 2+ years experience in cybersecurity or information assurance in a DoD environment Active CISSP or similar certificate Proven experience in system security or a related field. Strong understanding of network security concepts including OSPF and APIs. Familiarity with ITIL practices related to incident management and service delivery. Knowledge … of disaster recovery planning and execution. Experience with CI/CD processes for secure software development. Proficiency in using monitoring tools such as PRTG for system performance analysis. Excellent analytical skills and attention to detail in identifying vulnerabilities. Knowledge of Federal and/or DoD Information Security regulations, publications, and policy Applicants will be accepted until July More ❯
InformationSystem Security Officer (ISSO) L Garde is a full-service design, development, manufacturing, and qual-test supplier to Tier 1 primes and government agencies. We provide systems engineering and skilled technicians to make your Skunk Works-type project a reality. With over 50 years of aerospace and defense expertise, our deployable systems test the limits of … what's possible in the harshest of environments - in space, on the moon, and even on other planets. We are seeking a diligent and resourceful InformationSystem Security Officer (ISSO) to join our team. If you are a proactive cybersecurity professional with a passion for protecting critical systems and making an impact in national security, this role … a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring, and continuous improvement of cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetration testing, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. More ❯
to identify points of vulnerability, non- compliance, establish information assurance standards and confirm regulations and recommend mitigation strategies are being met. The ISSE will validate and verify system security requirements and build IA systems deployed to operational environments. Responsibilities: Participate as the primary security engineering representative on engineering teams for the design, development, implementation, and evaluation of … architectures, systems, or system components. Knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments. Make recommendations on the system- level to resolve security requirements. Perform system or network designs that encompass multiple enclaves, to include those with differing data protection. Provide security planning, assessment, risk analysis, and … risk management. Advocate and recommend system- level solutions to resolve security requirements. Monitors and suggests improvement to IA policy. Interact with customers, IT staff. And high- level corporate officers to define and achieve required IA objects. Provide assistance to ensure that the architecture and design of informationsystems are functional and secure, including program of record systemsMore ❯
Joint Tactics and Technologies (JTT) is looking for motivated Mid-Level/Senior InformationSystem Security Engineers in Philadelphia, PA! We are a Service-Disabled Veteran Owned Small Business (SDVOSB) specializing in cybersecurity engineering. We offer outstanding benefits and opportunities for leadership development. This work is in support of Naval Surface Warfare Center - Philadelphia. Tasking includes: • Assist … with the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and … IT and CS vulnerability-level risk assessments. • Execute security control testing as required by a risk assessment or annual security review (ASR). • Mitigate and remediate IT and CS system level vulnerabilities for all assets within the boundary per STIG requirements • Develop and maintain Plans of Actions and Milestones (POA&M) in Enterprise Mission Assurance Support Service (eMASS). More ❯
guide engineering teams in taking a multi-discipline approach to requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies to ensure timely and accurate GEOINT. Location: Patriot Ridge (Springfield, VA)/Chantilly, VA Duties … Guides Mid-level and Junior-level system engineers performing requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies. Guides the planning, analysis/traceability of user requirements, architectures traceability, procedures, and problems to … automate or improve existing systems and review cloud service capabilities, workflow, and scheduling limitations. Guides Mid-level and Junior-level system engineers developing solutions designs based on analysis of requirements and new technology. Assists the Government in the capture and translation of mission and customer requirements/needs into systems/capability requirements and solutions. Supports the analyses and More ❯
guide engineering teams in taking a multi-discipline approach to requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies to ensure timely and accurate GEOINT. Duties may include: Guides Mid-level and Junior-level … system engineers performing requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies. Guides the planning, analysis/traceability of user requirements, architectures traceability, procedures, and problems to automate or improve existing systems and … review cloud service capabilities, workflow, and scheduling limitations. Guides Mid-level and Junior-level system engineers developing solutions designs based on analysis of requirements and new technology. Assists the Government in the capture and translation of mission and customer requirements/needs into systems/capability requirements and solutions. Supports the analyses and allocation of requirements to systems architecture More ❯
guide engineering teams in taking a multi-discipline approach to requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies to ensure timely and accurate GEOINT. Duties may include: Guides Mid-level and Junior-level … system engineers performing requirements engineering, solutions engineering, scheduling, reliability, resiliency, services development, integration, test and evaluation, maintainability, and analysis across the National System of Geospatial-intelligence (NSG), Allied System of Geospatial-intelligence (ASG) and Federal Agencies. Guides the planning, analysis/traceability of user requirements, architectures traceability, procedures, and problems to automate or improve existing systems and … review cloud service capabilities, workflow, and scheduling limitations. Guides Mid-level and Junior-level system engineers developing solutions designs based on analysis of requirements and new technology. Assists the Government in the capture and translation of mission and customer requirements/needs into systems/capability requirements and solutions. Supports the analyses and allocation of requirements to systems architecture More ❯
System Administrator GES is seeking a skilled Systems Administrator to join the I3TS team supporting DTRA. The I3TS program provides enterprise-wide IT support to enable DTRA's InformationManagement & Technology Directorate (ITD) to consolidate, modernize, and continuously innovate the delivery of IT services and mission capabilities to DTRA's internal and external mission partners … operating in CONUS and OCONUS locations. The candidate will be responsible for ensuring the security and integrity of IT systems by applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will … The candidate must be able to work in a high-energy environment and adapt to shifting priorities. Key Responsibilities Continuous upkeep, monitoring, analysis, and response to InformationSystem, network and security events. STIG Application and Compliance: o Implement and maintain Security Technical Implementation Guides (STIGs) across various systems and applications. o Conduct regular STIG compliance checks using More ❯
Job Title: System Administrator - Linux Location: Schenectady, NY Clearance: DoE Q or DoD OR Top-Secret clearance Job Type: Contract - Long Term Key Responsibilities • Administer and optimize RedHat Linux systems, OpenShift, VMWare, and Cloudera platforms including authentication, cluster management, user management, monitoring, performance and data management. • Implement and enforce security measures to meet NIST … standards. • Monitor system performance, troubleshoot issues, and perform regular maintenance. • Manage system updates, patches, and upgrades to ensure system integrity. • Develop and enforce backup and disaster recovery plans. • Provide support for system configurations, user management, and access control. • Document system configurations, procedures and updates. • Collaborate with IT teams to integrate and manage applications … related field, or equivalent experience. • At least five years' experience with RedHat Linux, VMware, and OpenShift cumulative, • At least two years of experience supporting development of informationsystem security authorization packages in accordance with Risk Management Framework (NIST 800-37, 800-53, 800-53a) • Strong understanding of system security principles and experience with More ❯
Opportunity: IMG is seeking a skilled Linux System Administrator to support our customer's enterprise RedHat Linux environment. This role involves ensuring the stability, security, and performance of these systems while adhering to U.S. government risk management frameworks such as NIST 800-53. the administrator will handle system administration tasks, perform regular updates and security … the development of Plans of Action and Milestone (POA&Ms), Risk Management Framework (RMF) and Risk Based Decisions (RBDs) for deficiencies found during the informationsystem authorization process. Job duties include: Administer and optimize RedHat Linux systems, OpenShift, VMWare, and Cloudera platforms including authentication, cluster management, user management, monitoring, performance and … data management. Implement and enforce security measures to meet NIST 800-53 standards. Monitor system performance, troubleshoot issues, and perform regular maintenance. Manage system updates, patches, and upgrades to ensure system integrity. Develop and enforce backup and disaster recovery plans. Provide support for system configurations, user management, and access control. Document system configurations More ❯