computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. RESPONSIBILITIES Participate as a security … IA architectures, systems, or system components Support the Government in the enforcement of the design and implementation of trusted relationships among external systems and architectures Support security planning, assessment, riskanalysis, and risk management Identify overall security requirements for the proper handling of Government data Provide security planning, assessment, riskanalysis, and risk management More ❯
the UAS PO product directors by planning, coordinating and executing a comprehensive system safety program for the product area required. This position is located in Huntsville, AL. Duties: Perform risk management task, risk analyses, hazard identification and classification, hazard tracking as part of the overall engineering effort. Evaluate risk related mitigation corrective actions to determine their effectiveness … and accuracy; then provide the Government with recommended changes to contractor's documentation based on these evaluations. Perform research, analyses and other related staff coordination for the preparation of risk documentation such System Safety Risk Assessments (SSRAs) and Risk Determination (RDs), then prepare risk documentation as required in accordance with AR 385-10, for the appropriate … risk acceptance authority. Prepare, update, review, or assist in development of system safety analysis to include both hardware and software safety analysis, Functional Hazard Analysis (FHA), Fault Tree Analysis (FTA), System Safety Program Plans (SSPP), System Safety Management Plans (SSMP), and System Safety Assessment Reports (SSAR). Ensure system safety principles, criteria and techniques are More ❯
government customer. In this role you will help design and develop new ships and ship system concepts. What You'll Get to Do: Perform System Safety Engineering tasks and analysis, applying technical knowledge to ensure compliance of system safety requirements as part of Design verification (risk analyses, hazard analyses, software system safety analyses) Apply understanding of system requirements … customer specifications and military standards to develop appropriate safety requirements which eliminate or reduce hazard risk to an acceptable level Prepare internal and customer reports describing various analyses relevant to the System Safety Program Interface with Team Leads to understand issues associated with product architecture and design Take an analytical approach and utilize technical knowledge to solve safety challenges … with optimal solutions Conduct independent and collaborative assessments to identify hazards, propose and manage hazard risk reduction plans, follow NAVSEA processes for accepting risks, and track outcomes from safety testing/verification. Participate in engineering and system safety working groups identifying and resolving system safety issues to ensure customer needs are met More About the Role: Day to day More ❯
architectures, systems, or system components Identify overall security requirements for the proper handling of government data Interact with the customer and other project team members Support security planning, assessment, riskanalysis, and risk management Requirements Bachelor's degree in computer science, information assurance, information security system engineering, or a related discipline from an accredited college or university More ❯
computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include … design and implementations of trusted relationships among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to security planning, assessment, riskanalysis, risk management, certification and awareness activities for systems and networking operations. Reviews certification and accreditation (C&A) documentations, providing feedback on completeness and compliance of content. … systems security design process/engineering life cycle; information domain; cross domain solutions; commercial off the shelf and government off the shelf cryptography; identification; authentications; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing certification and accreditation process; principles of IA and security testing. Support security authorization activities in compliance with More ❯
clients to develop and implement innovative technology solutions to drive growth and efficiency. Gain hands-on experience in data analytics, cybersecurity, cloud computing, and digital transformation projects. Actuarial and Risk Management Services (RMS): Collaborate with our actuarial and risk management teams to provide financial modelling and riskanalysis for clients in sectors such as insurance and … pensions. Help clients make data-driven decisions to manage risks and improve their long-term financial health. Economics Consulting: Apply economic analysis and financial modelling to help clients make informed business decisions. Support projects across a variety of industries, including financial services, government, and health. What to Expect: During the Women in Business Insight Programme, you will: Work on More ❯
Oversight Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and result analysis Align scanning activities with organizational priorities for maximum impact Tool and Infrastructure Management Maintain and enhance the FBI's enterprise vulnerability scanning tools and infrastructure Ensure tools are secure … and effectively utilized across the organization Comprehensive Vulnerability Assessments Participate in technical execution of enterprise-wide assessments across networks, systems, and ICS infrastructure Assist in analyzing vulnerabilities to assess risk and recommend remediation strategies Ensure assessments cover diverse technologies including operating systems, databases, applications, and network devices Collaboration and Cross-Team Coordination Assist with providing technical support during incident … years of Cybersecurity experience, with experience administrating and engineering IT Infrastructure Expertise in vulnerability assessment tools, scanning methodologies, and enterprise infrastructure Strong understanding of vulnerability management lifecycle, riskanalysis, and remediation strategies Excellent communication skills with the ability to translate technical findings into actionable insights Preferred Certifications: Advanced knowledge of Microsoft Certification(s) Ability to assist with the More ❯
incidents within information systems and networks while supporting dynamic cyber defense operations. Your role involves coordinating security toolsets for continuous monitoring and authorization programs, establishing frameworks for measuring cyber risk, and performing Risk Management Framework (RMF) activities. You will determine security requirements, conduct vulnerability analyses, perform risk assessments, and implement security systems. You'll design and integrate … with 8+ years of experience. Recognized authority providing innovative solutions to complex technical problems and leading advanced development efforts. Experience with cyber security frameworks, intrusion detection systems, vulnerability assessments, riskanalysis, DoD IA architectures, security compliance standards, and incident response procedures. Highly preferred: Industry security certifications (CISSP, CISM, CEH). DoD security standards and authorization experience. RMF implementation … and ISSO/ISSE/ISSM experience. Experience with DoD security standards and authorization processes. Knowledge of enterprise security architectures and threat analysis methodologies. Clearance Requirements: Active Top Secret with ability to obtain and maintain SCI Work Type: Onsite in Colorado Springs, CO May require up to 10% travel Salary Range: $130,000 - $150,000 The determination of compensation More ❯
Nessus and Trellix ePO (HBSS/ESS) across Windows and Red Hat Linux environments. Responsibilities include applying DISA STIGs, conducting vulnerability assessments, implementing system hardening measures, and supporting the Risk Management Framework (RMF) process. The ideal candidate has experience with tool administration, system architecture, Tier 3 troubleshooting, and security documentation. A strong understanding of IA integration and secure systems … o Build IA into systems deployed to operational environments, validating and verifying system security requirements, and establishing system security designs for stand-alone systems. o Support security planning, assessment, riskanalysis, and risk management. • Security Tool Troubleshooting & Support: o Provide Tier 3 troubleshooting support for cybersecurity tools such as ACAS and HBSS/ESS. • RMF Support & Documentation … o Support the documentation of security control implementations and gathering of artifacts to support Risk Management Framework (RMF) and ICD 503 Security Accreditation. o Assist with RMF related tasks as needed. Education, Experience and Qualifications: • Security+ certification. • 5+ years of hands-on experience administering and maintaining Tenable Nessus, Trellix ePO (HBSS/ESS), and related security tools in a More ❯
opportunities. The candidate should be able to evaluate and clearly communicate high-level, differentiated solutions to effectively collaborate with independent cost estimators and solution development teams. Responsibilities Perform detailed analysis to deliver a PTW recommendation based on competitive research, published competitor pricing, prior wins/losses, third party tools and KPIs, and market trends. Interface with federal contract pursuit … team members to comprehend the opportunity requirements, budget, contract type, evaluation criteria, customer risk and award tendencies, and competitive landscape/positioning. Model potential competitor solutions from a solution and price perspective to drive development of competitive bid strategies for each key opportunity. Create and utilize qualitative and quantitative metrics for each pursuit to be used as indicators for … Business, Economics, and/or Engineering). Additional experience in lie of a degree will be considered. 8+ years (or 6+ with a Masters degree) professional experience in PTW analysis, cost modeling, federal contract price competitions and/or federal contract solution architecture. Minimum 5 years of experience modeling basis of estimates and/or experience pricing federal contract More ❯
s cybersecurity operations. You'll be working on-site, helping to manage the security posture of sensitive information systems. The focus will be on Authorization to Operate (ATO) processes, risk assessments, and network/system security. Key Responsibilities (Summarized for Candidate Call) Work with system owners to manage and renew ATOs Assess security controls, identify risks, and resolve vulnerabilities … and track remediation (POA&Ms) Apply NIST 800-53 rev 5, FISMA, and FIPS 199 to ensure compliance Develop and implement security standards, policies, and procedures Perform system-level riskanalysis throughout the entire system development life cycle , Lead change control and configuration management for security systems Stay up-to-date with encryption, authentication, and cybersecurity tools Required More ❯
weekly and monthly program schedule review packages and compliant external Contractual Data Requirements List submittals. Participate in the preparation of schedules for all contract work and perform critical path analysis, schedule riskanalysis, variance analysis and other forms of in-depth and actionable schedule related analysis. Incorporate contractual and programmatic changes into the IMS to maintain … required, as only U.S. citizens are eligible for a security clearance. Qualifications We Prefer: Prior work experience analyzing schedule data including driving paths, schedule metrics and trends, and Schedule RiskAnalysis (SRA) Demonstrated experience with MS Office Suite Demonstrated understanding of product development principles including Agile Software development Ability to interface and influence at all levels of an More ❯
monthly and quarterly status reports with schedule data and analysis. Ensure all project schedules comply with internal standards and customer reporting requirements. Provide schedule-related input to cost estimating, risk management, and resource planning teams. Track actuals versus planned activities and update forecasts accordingly. Basic Qualifications TS/SCI w/Poly Clearance is required Bachelor's degree in … disciplinary programs. Demonstrated ability to develop and manage budgets, schedules, and key performance indicators to meet contractual and project requirements. Strong knowledge of project controls, including cost, schedule, and risk analysis. Proficiency in project management software (PMS) such as Microsoft Project, Primavera, or equivalent tools. Skilled in business communications, with the ability to effectively present performance updates and progress … Preferred Qualifications Certification such as PMP (Project Management Professional), PMI-SP (Scheduling Professional), or similar. Experience implementing or working in Agile or hybrid project management environments. Advanced expertise in risk management, including risk identification, impact analysis, and mitigation planning. Experience in stakeholder management, including building relationships with subcontractors, vendors, and customer representatives. Strong background in resource planning More ❯
monthly and quarterly status reports with schedule data and analysis. Ensure all project schedules comply with internal standards and customer reporting requirements. Provide schedule-related input to cost estimating, risk management, and resource planning teams. Track actuals versus planned activities and update forecasts accordingly. Basic Qualifications TS/SCI w/Poly Clearance is required Bachelor's degree in … disciplinary programs. Demonstrated ability to develop and manage budgets, schedules, and key performance indicators to meet contractual and project requirements. Strong knowledge of project controls, including cost, schedule, and risk analysis. Proficiency in project management software (PMS) such as Microsoft Project, Primavera, or equivalent tools. Skilled in business communications, with the ability to effectively present performance updates and progress … Preferred Qualifications Certification such as PMP (Project Management Professional), PMI-SP (Scheduling Professional), or similar. Experience implementing or working in Agile or hybrid project management environments. Advanced expertise in risk management, including risk identification, impact analysis, and mitigation planning. Experience in stakeholder management, including building relationships with subcontractors, vendors, and customer representatives. Strong background in resource planning More ❯
motivated, career and customer-oriented Senior Cybersecurity Analyst Ito join our team at our Annapolis Junction, MD Location. Responsibilities include but are not limited to: Conduct comprehensive threat and riskanalysis to identify and mitigate vulnerabilities, protecting critical systems and data. Develop and deploy advanced security technologies and custom systems with specialized security features. Cultivate and maintain strong … relationships with customers and service providers, delivering tailored security assessments and training programs. Lead incident response activities and provide detailed risk ratings for vulnerabilities, ensuring adherence to company policies and best practices. Provide expert supervision and mentorship to subordinate project and Team ManTech staff, contributing to team growth and excellence. Minimum Qualifications: Bachelor's degree in Cybersecurity, Computer Science More ❯
Coordinate with ISSMs and PMOs to understand mission and business functions, security architecture, deployment locations, and planned and projected architectural and functional changes of assigned systems. Conduct cybersecurity assessments, risk analyses (operational and technical) and authorization tasks across all RMF steps using approved RE5 tools and processes. Verify authorization boundaries and categorize systems (FIPS199). Identify data classifications and … conduct system-level risk assessments. Track system changes, assess impacts, and report updates to the AO. Evaluate authorization and change requests, web filtering, firewall exceptions, ports/protocols, cybersecurity risks, STIG/SRG compliance, and on-site security. Lead assessment visits, conduct briefings, and ensure proper documentation and reporting. Attend required government training and meetings to stay updated on … process changes. Maintain access and proficiency in required government databases and cybersecurity tools. Assess threats, vulnerabilities and cybersecurity risk for systems and compile findings into timely authorization packages to determine countermeasures and residual risk. Support assigned systems throughout their lifecycle in alignment with FISMA requirements. Submit weekly activity reports summarizing tasks, tracking IDs, and key updates. Basic Qualifications: Bachelor More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
IAMUS
documentation for completeness and accuracy in accordance with federal and DoD policy. Thoroughly understand and be able to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerability management systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp … exchanges for data gathering, and collaborate with diverse audiences. Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, riskanalysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government More ❯
backed financing. The ideal candidate will have a strong quantitative background, excellent programming skills, and a deep understanding of structured products. What will you do as a Quantitative Strategist? RiskAnalysis: Understand the mechanics of structured products and apply this knowledge to model development and risk analysis. Quantitative Techniques: Apply advanced mathematical and statistical techniques to solve … risks. Data Management: Work with AWS and databases to manage and analyse large datasets. Communication: Communicate complex quantitative concepts and solutions effectively to stakeholders, including traders, portfolio managers, and risk managers. Collaboration: Collaborate with other teams, including technology, risk management, and trading, to integrate quantitative models into broader business processes. What qualifications or skills should you possess in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Goodman Masson
audits, and helping to strengthen third-party security compliance. Key Responsibilities: Monitor security systems and investigate incidents Operate firewalls, EDR, SIEM tools, and encryption software Support vulnerability testing and riskanalysis Assist with third-party vendor assessments and internal audits Contribute to the ongoing improvement of security processes What We’re Looking For: Experience in IT security or More ❯
system design, deployment, and ongoing operations. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation evidence, and … depth understanding of operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering or infrastructure … safety standards. Strong communication and stakeholder engagement skills, with the ability to liaise confidently across engineering, programme delivery, assurance, and regulatory audiences. Ability to produce high-quality documentation, including risk assessments, technical guidance, assurance artefacts, and audit-ready deliverables. Familiarity with UK cybersecurity regulations and sector guidance, including the NIS Regulations, CNI expectations, and industry-specific frameworks. Capable of More ❯
of engineering requirements and associated documentation. Completion of trade studies Manage planning and work package management. Reviewing, documentation - Subsystems, customer, work packages. SYS ML Generation Requirements and Use Case analysis Concept assessment and design trade studies System architecture design and functional modelling Performance assessment and systems behavior analysis Verification, Validation, proving and Certification Systems Integration Model based engineering … propose innovative solutions Excellent communication and interpersonal skills, with the ability to collaborate effectively in a multidisciplinary team environment Experience with project management practices and tools, including schedule management, riskanalysis, and resource allocation Knowledge of relevant industry standards and regulations, such as MIL-STD, DO-178C, and DO-254, is desirable Eligibility for security clearance (dependent on More ❯
CCP) Assessor to join our growing Cybersecurity & Compliance team. In this role, the ideal candidate will support CMMC readiness engagements and serve as a front-line assessor conducting gap analysis, pre-assessment evaluations, and consulting engagements for Department of Defense (DoD) contractors seeking CMMC Level 2 compliance. You'll help drive our evolving assessment business line as we prepare … and CMMC 2.0 guidance. Collaborate with client IT and compliance teams to evaluate existing security practices, documentation, and system security plans (SSPs). Lead or support gap analysis activities, provide prioritized remediation plans, and advise on policy improvements. Maintain accurate records of findings, supporting evidence, and client interactions. Contribute to internal development of System High's CMMC assessment methodology … NIST SP 800-171, and related DFARS requirements Strong communication skills with the ability to translate technical findings into actionable insights for non-technical stakeholders Proficient with documentation review, riskanalysis, and stakeholder engagement Must be a U.S. Citizen Preferred Qualifications Active DoD clearance (Secret or higher) Familiarity with eMASS, OSC documentation, POA&Ms, and assessment tooling Additional More ❯
and is only located in the location(s) posted. No relocation is offered. The job duties of the Systems Engineer are as follows: Perform requirements management and technical requirement analysis across all BrS standard and non-standard service offerings to include supporting BrS requirements management teams while also coordinating with other BrS architecture engineering, service operations, and service transition … and enable customers to clearly define their system/network/technical requirements prior to submitting RITMs or at the beginning of the submitted RITMs process and their requirements analysis, review, and validation. Serve as a back-up and alternate for BrS Technical Analysis Team (TAT) Lead and when required, for the BrS Requirements Manager or BrS Systems … teams (et cetera); Government leadership and program managers/senior engineering technical advisers; and other government/contractor customers across the enterprise as required or when appropriate. Provides systems analysis, documents requirements, works with design, development, testing, deployment, and lifecycle support teams responsible for hardware systems and applications. Develops end-to-end analysis for the enterprise, documents processes More ❯
Clearance Requirements: This position requires a current and active TS/SCI with FS poly at the time of application. What you will be doing: Provide security planning, assessment, riskanalysis, and risk management Perform system or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements Recommend system-level solutions More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Polaris Consulting Group, Inc
documentation for completeness and accuracy in accordance with federal and DoD policy. Thoroughly understand and be able to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerability management systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp … exchanges for data gathering, and collaborate with diverse audiences. Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, riskanalysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government More ❯