Newcastle Upon Tyne, Tyne And Wear, United Kingdom Hybrid / WFH Options
Deloitte LLP
architecture (e.g. AWS, Azure, Google Cloud) Expertise in software development methodologies and best practices Ability to design and implement secure and scalable digital solutions Strong communication and stakeholder management skills Experience in leading and mentoring technical teams Knowledge of data privacy and protection regulations (e.g. GDPR) Understanding of enterprise architecture frameworks (e.g. TOGAF) Familiarity with agile and DevOps … architecture and its application in digital solutions Proven ability to collaborate closely with delivery teams to ensure successful implementation of digital solutions Certifications in cybersecurity practices (e.g. Certified InformationSystems Security Professional (CISSP) or equivalent) Software development and scripting experience to build proof-of-concepts ahead of passing designs to delivery teams Strong knowledge of API design and More ❯
analytics capabilities, risk transfer and transactional expertise to provide advice and counsel to our clients. We help our clients interpret the data to guide their decisions surrounding the management of their risk portfolio. How you'll make an impact About the role We are seeking an experienced Lead Data Visualisation Developer to join our Global Digital team. In … platform. Keep abreast of the wider landscape of data visualization, data, and digital technologies. About you Education Bachelor's or Master's degree in Computer Science, Data Science, Information Technology, or a related field preferred Experience Extensive experience designing and implementing data visualisation solutions, with a focus on the Power BI platform. Proven track record of delivering Power More ❯
Job Number: 59 Job Category: GovTech Job Title: SENIOR INFORMATIONSYSTEM SECURITY MANAGER - VIRGINIA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: Remote Job Location: Arlington VA Salary: 250k - 300k Background Utilize expert knowledge and experience regarding risk management strategies in support of a major DoD program Collaborate between the … assessments and identify potential vulnerabilities and threats to informationsystems Develop and implement risk mitigation strategies and controls to minimize the impact of security incidents Collaborate with system administrators, network administrators, and other stakeholders to plan and implement security measures for information systems. This includes establishing security controls and standards for informationsystems … including Continuous monitoring Develop and implement incident response procedures to reconstitute system operations to address security incidents and breaches Ensure compliance with relevant security standards, regulations, and frameworks Conduct periodic security audits and assessments to evaluate the effectiveness of security controls and identify areas for improvement Maintain accurate and up-to-date security documentation, including security plans, risk assessments More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency Security Policy and Enterprise Solutions. Supports the building of security architectures. Enforces the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and networking … operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication; and authorization More ❯
your help. Our Team is looking for a InformationSystems Security Officer (ISSO). In this role you will get to focus on the cybersecurity aspects of system design to deal with cyber-related disruptions, minimizing misuse and malicious behavior, while supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … IATT), and Authority to Connect (ATC) for all existing and new InformationSystems (IS) that require accreditation to include on premise and cloud platforms. Maintain and develop System Security Plans (SSP), Security Controls Traceability Matrices (SCTM), Risk Assessment Reports (RAR), Continuous Monitoring Plans (ConMon), Security Assessment Reports (SAR), and Plan of Actions and Milestones (POA&M). … Ability to Develop and update documentation, policy and procedures such as: Ports Protocols and Services Management (PPSM) worksheets, system and network diagrams/descriptions, and SOPs. Coordinate and perform security audits and system updates to identify nonstandard events and maintain system and information integrity. Play an active role in conducting continuous monitoring activities More ❯
Experience Required Qualifications: 5+ years of experience in system administration, network administration, or a related role Excellent problem-solving skills and communication skills, with the ability to interact effectively with both technical and non-technical users and collaborate across multiple teams and external entities Experience managing multiple concurrent tasks, projects, and priorities to meet customer deadlines Excellent organizational skills … in maintaining documentation of system configurations and procedures, and providing reports on system performance, incidents, and maintenance activities Experience providing technical support to end users: monitoring system performance, troubleshooting and resolving hardware/software issues, optimizing network performance, managing system backups and recovery processes, and implementing necessary upgrades and patches Ability to install, configure, administer, manage … Familiarity with database managementsystems (MySQL, PostgreSQL, SQL Server) and web servers (Apache, Nginx, IIS) Ability to assist in planning and executing IT projects, such as system upgrades, migrations, or new technology deployments Ability to communicate and work collaboratively with team members, government clients, and stakeholders across teams to problem solve and recommend and implement systemMore ❯
Experience & Strategic Planning: Collaborates with senior leadership to align IT/OT and Information Technology strategy with broader organizational goals. Collaborates with IT/OT stakeholders and system owners to seamlessly integrate information technology initiatives into IT and OT infrastructure, ensuring alignment with organizational goals and security standards. Supports and coordinates the planning and implementation … least-privilege access, and real-time threat mitigation across IT and OT infrastructures. Provides guidance and mentorship to junior analysts and staff. Risk Management & Compliance: Consults with system owners to review risk assessments for IT and OT systems, identify vulnerabilities, and provide governance-focused recommendations for mitigation strategies in compliance with RMF and NIST standards. Supports system … from Army policies and DoD directives to the OT environment. Security Documentation & Reporting: Provides clear, concise reports on risk posture to senior leadership. Incident Response & Mitigation: Supports and advises system owners in responding to security incidents across IT and OT environments, offering guidance on the development of incident response protocols and procedures. Assists with reviewing and analyzing post-event More ❯
cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Senior Information Assurance Analyst will support the Overseas Buildings Operations (OBO) InformationSystem Security Officer (ISSO). The Senior Analyst will act as a subject matter expert (SME) for Federal Assessments & Authorizations (A&A); provides sound advice and recommendations to lower risk … part of the Department's Information Assurance policy and Federal Information Security Management Act (FISMA) implementation efforts Conduct risk assessments, vulnerability assessments, and system audits to identify potential security threats to OBO information systems. Provide recommendations to mitigate identified risks and ensure compliance with applicable regulations and standards. Provide support for … A&A process in support of obtaining Authority to Operate (ATO) approvals of OBO systems Perform Security Impact Analysis (SIA) review of change requests and provide reporting requirements to system owners Update expired security controls in ArchAngel to support security findings and reporting Analyze and report on security findings identified during assessment Create Plan of Action & Milestones (POAMs) for More ❯
U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone's Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as … human intelligence, and critical missions and networks. DevOps Systems Engineer Job Description DevOps Systems Engineer Herndon, VA Work directly with the DevOps team and Senior DevOps manager to understand system deployment and installation processes. Manage all computer systems and oversee the daily performance, keeping an eye out for issues and inefficiencies. Respond to user issues, answering inquiries and resolving … more complicated issues firsthand. Maintain records of system performance, combining raw information into a useful and beneficial performance report for monthly board meetings. Create training material whenever new recruits are hired to explain the correct and most efficient way to operate the implemented systems. Other duties as assigned. Required Experience: Must hold an Active TS/SCI More ❯
Experience & Strategic Planning: Collaborates with senior leadership to align IT/OT and Information Technology strategy with broader organizational goals. Collaborates with IT/OT stakeholders and system owners to seamlessly integrate information technology initiatives into IT and OT infrastructure, ensuring alignment with organizational goals and security standards. Supports and coordinates the planning and implementation … least-privilege access, and real-time threat mitigation across IT and OT infrastructures. Provides guidance and mentorship to junior analysts and staff. Risk Management & Compliance: Consults with system owners to review risk assessments for IT and OT systems, identify vulnerabilities, and provide governance-focused recommendations for mitigation strategies in compliance with RMF and NIST standards. Supports system … from Army policies and DoD directives to the OT environment. Security Documentation & Reporting: Provides clear, concise reports on risk posture to senior leadership. Incident Response & Mitigation: Supports and advises system owners in responding to security incidents across IT and OT environments, offering guidance on the development of incident response protocols and procedures. Assists with reviewing and analyzing post-event More ❯
multi-cloud environment. You will play a vital role in engineering solutions and maintaining compute and storage infrastructures, delivering efficiency through automation, and ensuring scalability, flexibility, and compliance. Responsibilities • System administration tasks for Windows Server 2022 and RHEL 8 including regular platform upgrades, vulnerability management, troubleshooting, automation with native scripting languages, performance management, application inventory … native services and deployments. • Administer the lifecycle of SSL certificates and associated infrastructure and domains. • Manage and test data backups and disaster recovery policies. • Active Directory • Manage human and system identity lifecycles including onboarding, offboarding, role management, just-in-time privilege escalation, and regular access reviews. • Implement, update, and regulate group policy and identities in Active Directory … and CIDR whitelists/blacklists. • Collaboration • Communicate effectively and promptly with DevSecOps teams to implement appropriate cloud-native solutions and maintain accurate and up-to-date documentation of the system and network infrastructure including diagrams, configuration details, and operational procedures. • Participate in in-house training programs to foster and spread knowledge and awareness to project teams, promote and empower More ❯
Information Security Specialist opportuntiy in Washington, DC Public Trust will be required We are seeking a proactive, detail-oriented Information Security Specialist to join our growing team. In this role, you will be responsible for implementing and maintaining our organization's security posture, monitoring for threats, and ensuring compliance with relevant frameworks and regulations. The ideal … Ensuring security updates are current across all systems • Implement and manage security tools (e.g., SIEM , endpoint protection). • Monitor for compliance with security standards such as NIST Risk Management Framework (RMF), • Collaborate with IT and Engineering teams to embed security in infrastructure and applications. • Investigate security breaches and document findings and recommendations. • Participate in security awareness training and … programs. • Stay current with emerging threats, trends, and technologies. Required Qualifications: • Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience). • 3+ years of hands-on experience in cybersecurity roles. • Strong understanding of networking, operating systems (Windows, Linux), and cloud security (AWS/Azure,). • Hands-on experience with tools such as Splunk More ❯
Network Knowledge Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: We are seeking an experienced ITIL Network Knowledge Management Quality Assurance Analyst to join … our IT service management team. The ideal candidate will ensure the quality, accuracy, and effectiveness of our network knowledge management processes in alignment with ITIL best practices . Responsibilities: Assist in developing, implementing, and maintaining ITIL-based knowledge management processes for network … operations Develop and enforce quality standards for network knowledge articles and documentation Monitor, manage, and maintain knowledge articles within ServiceNow Conduct regular audits of the knowledge managementsystem to ensure compliance with customer's policies, procedures, governance and ITIL guidelines Collaborate with network teams to capture, validate, and organize knowledge effectively Analyze and report on knowledge usage More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
premise and in the cloud to ensure design implementation, safeguarding Experian's assets. You'll assess control design, performance, and compliance with standards and regulations, reporting to the Information Security Control Assurance Testing Manager. Identifying gaps, documenting findings, and recommending improvements to mitigate risks are important responsibilities. Using data-driven testing techniques and a defined methodology, you'll … lessons learned by integrating partner feedback to improve the control testing program. About Experian About us, but we'll be brief Experian is the world's leading global information services company, unlocking the power of data to create more opportunities for consumers, businesses, and society. Experian is a global data and technology company, powering opportunities for people and … technologies, experienced people, and new ideas to help all our clients maximize every opportunity. Experience and Skills What your background is A bachelor's degree in computer science, managementinformationsystems, or a relevant field, or equivalent demonstrable experience. 5+ years' of experience in Information Security or Information Technology 3+ years' experience More ❯
Paid Leave, and much more. Join us and make a difference in National Security! Experience with classified IC dissemination platforms, information sharing rules, and Intelligence Community Markings System Register and Manual Standards. You must have an active TS/SCI Polygraph up front. No exceptions and no sponsorship available, unfortunately. Come join a high performing agile team … to support a fast-paced, complex program! Program execution follows DEVOPS best practices and employs robust development, test and production environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain … capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system with exacting interface, performance and security requirements. You will become part of a team of Security Engineers working on providing improvements to our operational, test, integration, and development systems and solving challenging issues on a More ❯
Paid Leave, and much more. Join us and make a difference in National Security! Experience with classified IC dissemination platforms, information sharing rules, and Intelligence Community Markings System Register and Manual Standards. You must have an active TS/SCI Polygraph up front. No exceptions and no sponsorship available, unfortunately. Come join a high performing agile team … to support a fast-paced, complex program! Program execution follows DEVOPS best practices and employs robust development, test and production environments. Our team of security engineers support enhancements to system security architecture and cyber security capabilities; manage multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain … capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. You will provide support for adding new capabilities to a complex system with exacting interface, performance and security requirements. You will become part of a team of Security Engineers working on providing improvements to our operational, test, integration, and development systems and solving challenging issues on a More ❯
events and potential threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Develop procedures to ensure system users are aware of their CS responsibilities before granting access to DoD information Systems. Process and review DD-2875s. Support Risk Management Framework (RMF) system categorization process and memorandum for Confidentiality, Integrity, and Availability impact level determinations Ensure that CS requirements are integrated into the Continuity of Operations Plan (COOP) for that system or DoD Component. Ensure that CS security requirements are appropriately identified in computer environment operation procedures. Develop security requirements and maintain list of hardware, software, and services acquisitions specific to … CS security programs. Ensure that IA and IA enabled software, hardware, and firmware comply with appropriate security configuration guidelines, policies, and procedures. Create and review System Security Plans (SSP), as required Prepare for Assess and Authorize (A&A) and Security Control Assessor (SCA) validations and/or inspections and ensure that CS inspections, tests, and reviews are coordinated. Qualifications More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … contributing to the overall efficiency, reliability, and scalability of the customer's technology infrastructure. Working with third-party tools to manage scripts and automate and monitor deployment workflows, enhancing system reliability and scalability. Proactively monitoring the health of deployments, identifying and resolving issues, and redeploying after remediation. Working with system architects and lead engineer to maintain and improve … management. Planning, evaluating, and executing capacity optimization, updates, upgrades and other lifecycle activities associated with the solution; troubleshooting of functional and performance problems. Creating and maintaining detailed and accurate system documentation, including design and configuration plans, design diagrams, task-oriented procedures, operations and maintenance plans, etc. Designing, developing, deploying, and maintaining data flow pipelines to integrate applications and federate More ❯
and continuous monitoring efforts during deployment, Operations and Sustainment Supporting offensive architecture analysis and design of defense-in-depth solutions Supporting Development Security Operations (DevSecOps) integration Developing and assessing system security plans including, security concepts of operation, risk management matrix, security control traceability matrix, security test procedures, and plan of action and milestones Conducting and analyzing vulnerability … assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) Analyzing static code scans and dynamic code scans to validate Application Security and Development STIG compliance This position may require business travel to customer locations in support of customer meetings, product demonstration, Integration and/or systems testing. Required Education, Experience, & Skills … industry partners, and teammates Demonstrated leadership skills (supervisory experience, building teams, building customer relationships) Ability to support proposal and cost activities Working knowledge of Earned Value ManagementSystem (EVMS) systems and Project management tools such as Cost Performance Index (CPI) and Integrated Master Schedule (IMS) Experience with leading and coordinating security test events to achieve More ❯
RMF) for the Air Force Information Technology (IT), and the "DoD Program Manager's Guidebook for Integrating the Cybersecurity Risk Management Framework (RMF) into the System Acquisition Lifecycle" Supports efforts to integrate Cybersecurity throughout the lifecycle of IT systems. This includes the development and review of Cybersecurity-related artifacts, including System Security Plans, Cyber … policy improvements Leads the development of security policies, plans, and procedures to meet government regulations and industry best practices Coordinates and reviews technical assessments Uses automated tools to analyze system security control compliance Collaborates with technical managers to ensure required controls are implemented and security processes are followed Builds collaborative internal relationships with program and project teams, as well … and explain technical systems and data Experience with matrix organizations Project Management Professional (PMP) Certification or similar Lean Six Sigma Certification or similar Experience as a DoD System Program Manager Experience working with senior organizational leaders, including Authorizing Officials and senior customer leadership Recent experience working cybersecurity in a DoD environment Pay Information Full-Time More ❯
code, software listings, test files, installation procedures, technical documentation, flow charts, and designs. Sponsor standard configuration management practices, information security and governance policies for implementing system-level requirements that address Sponsor and/or Product Owner mission needs, or as directed by legislation or policy changes. Propose business use cases to inform the Sponsor Leadership … transformed into a data and software architecture at a concept level, and at a detailed level. Develop features and functionalities utilizing both Primavera and a Workforce ManagementSystem, ensuring seamless integration and performance. Develop RESTful APIs to validate data types, conduct business logic to transform data and transfer data to other systems. Develop automated test scripts to … technical documentation for software components and development processes. Continuously learn and apply new technologies and methodologies to improve software development practices. Open to learn other Workforce ManagementSystem coding constructs and infrastructure configuration. Recommend cloud-based infrastructure requirements based on capacity planning, performance, and Sponsor goals and strategies. Comply with coding standards when developing software modules that More ❯
Charleston, South Carolina, United States Hybrid / WFH Options
Imagine One Technology & Management Ltd
technical experience supporting C4ISR engineering, software development, integration programs, or similar USMC/Navy efforts, to include: Compiling source code using various automation tools and processes Knowledge of operating system scripting, interactive software loading scripts, and backup and restore scripts, as well as knowledge of Information Assurance Vulnerabilities Management and software updates as well as … patching necessary to repackage software Schema development, software assurance code review and integration, finding remediation, adherence to standardized secure coding guidelines and practices, maintenance support for system imaging and software selection applications, software development for deficiency corrections/fixes or changes to existing code Expertise and support to the government concerning system design and interoperability in order to … and/or supporting one or more of the following programs of record: Command and Control Personal Computer (C2PC), Army Data Dissemination Service (DDS), Advanced Field Artillery Tactical Data System (AFATDS), Global Command and Control System - Tactical Combat Operations (GCCS-TCO), Tactical COP Server (TCS), Joint Tactical Common Operation Picture (COP) Workstation (JTCW), Tactical Service Oriented Architecture (TSOA More ❯
the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Senior Cloud Cyber Security Engineer will support the Overseas Buildings Operations (OBO) InformationSystem Security Officer (ISSO). The Senior Cloud Cyber Security Engineer will provide Subject Matter Expertise (SME) to support cloud-based services by ensuring all aspects comply with DOS policies. … as a Service (SECaaS) program for a holistic security monitoring solution for all cloud environments Build, optimize and maintain conceptual and logical database models to support meta-data management, data catalog, data dictionary Interface with analysts gather requirements to ensure security controls are addressed Monitor cloud infrastructure requirements utilizing DevSecOps tooling and practices Report on all cloud instances … and validates cloud systems; tests cloud products and systems to detect cloud security weakness; analysis of mission requirements, secure architecture design, organizational and vulnerability assessments, intelligence and threat analysis; system security/network analysis, works under immediate supervision and usually reports to a supervisor. Minimum of ten (10) years of cybersecurity experience. Strong problem solving and resolution skills. US More ❯
AMERICAN SYSTEMS is an employee-owned federal government contractor supporting national priority programs through our strategic solutions in the areas of Information Technology, Test & Evaluation, Program Mission Support, Engineering & Analysis, and Training. Responsibilities Product Vision and Strategy: Define and communicate the product vision, strategy, and roadmap for assigned software products or features, aligning with specific DoD mission objectives … operational requirements, and relevant regulations. Stakeholder Management: Engage and collaborate effectively with diverse stakeholders, including military personnel, government civilians, and other contractors, to understand their needs, gather requirements, manage expectations, and ensure alignment with mission goals. Product Backlog … Management: Own and prioritize the product backlog, ensuring it reflects user stories, technical requirements driven by DoD specifications, and mission value. Maintain traceability to operational needs and system requirements. Technical Understanding: Possess a strong understanding of software development processes, technologies relevant to DoD systems (e.g., cybersecurity protocols, data handling requirements, specific platforms), and system architectures often More ❯
Systems Integrator (MSI) Service is unique to the Irish & UK markets. It is a combination of our Technology Disciplines within Hereworks coupled with our Mechanical, Electrical, BMS & Project Management expertise from the wider McKeon Group. Hereworks' MSI's ensure all intelligent building systems within a smart building communicate properly, they collaborate with the client and all project stakeholders … who are pushing the boundaries of what is possible with Smart Buildings. Our Team is made up of Project Managers, Network & Software Engineers, Building Services Engineers, Controls specialists and System Architects. What's the Opportunity? (Role) We are currently seeking an experienced Project Manager to join the team. Working as part of a highly technical team you will be … aligned to Lean & Agile project management an advantage. Ability to lead teams with a vast array of skills across Software, Network & Building Services Engineering, Controls specialists and System Architects. Good understanding of networking principles. Knowledge of working in AWS, GCP and migration of data from building outputs to data lake an advantage. Must have excellent verbal and More ❯