scalable, resilient platforms that support long-term growth. • Capacity Planning & Service Quality: Own service performance metrics and embed proactive capacity planning across infrastructure and services. • Proactive Issue Resolution: Lead root-causeanalysis, implement preventive controls, and champion continuous service improvement. • Service Management Governance: Oversee ITIL processes and support internal audits with robust systems and policies. • Incident & Change More ❯
scalable, resilient platforms that support long-term growth. • Capacity Planning & Service Quality: Own service performance metrics and embed proactive capacity planning across infrastructure and services. • Proactive Issue Resolution: Lead root-causeanalysis, implement preventive controls, and champion continuous service improvement. • Service Management Governance: Oversee ITIL processes and support internal audits with robust systems and policies. • Incident & Change More ❯
deployment, monitoring, and scaling. • Continuously evaluate and improve the cloud infrastructure to align with evolving technology trends and business requirements. • Respond to and resolve cloud-related incidents, providing detailed rootcauseanalysis and long-term solutions. • Work with other teams to ensure robust disaster recovery and business continuity planning. • Stay current with emerging cloud technologies and propose More ❯
base articles. Monitor application health using tools and custom dashboards. Support integration and communication between cloud platforms (Azure, Entra ID, Microsoft 365). Contribute to service improvement initiatives, including rootcauseanalysis and automation opportunities. Participate in on-call rotations or after-hours incidents during peak retail periods. Work within established security frameworks and governance. Hybrid working More ❯
and test network engineering/administration activities. • Create and maintain Standard Operating Procedures (SOPs) and technical documentation. • Provide follow-up reports (technical findings, feedback, and resolution steps taken) for RootCauseAnalysis and process improvement initiatives. Qualifications Must have an Active Top Secret clearance. Minimum of a Bachelor's degree in Science, Technology, Engineering and Math (preferred More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
tracing-to support 24/7 mission awareness. Automate platform operations, including system provisioning, patching, and recovery, to reduce manual effort and increase uptime. Monitor system performance and lead rootcauseanalysis and incident response for infrastructure-related issues. Collaborate with development and cybersecurity teams to ensure deployments are secure, compliant, and aligned with COSC and DoD More ❯
with innovative approaches, and proactively identify opportunities for process and system improvements. Keep abreast of emerging technologies and industry trends. Oversee change management and incident response activities , including performing root-causeanalysis investigations and bug fixes as required . Lead and mentor team members by providing coaching, training, performance evaluations, and fostering a culture of accountability, responsibility More ❯
standards, security policies, and regulatory req u irements. Integrate third-party systems and APIs to support business workflows and data exchanges. Troubleshoot complex technical issues, providing timely resolution and rootcause analysis. Keep up to date with emerging trends in enterprise platforms and development tools. What You Will Bring With You: Active Secret or Top-Secret clearance Bachelor More ❯
Job Summary: As a Security Analyst, you will provide day-to-day security monitoring, incident response, and threat analysis leveraging Splunk Enterprise Security (ES) and SOAR platforms. You will also play an active role in the ongoing buildout, configuration, and engineering of our Splunk ES environment, including onboarding new data sources, creating detection content, and developing automated response workflows. … fast-paced government setting. Key Responsibilities: • Monitor and analyze security events using Splunk Enterprise Security (ES) dashboards, alerts, and correlation searches. • Investigate and respond to security incidents, including triage, rootcauseanalysis, containment, and remediation support. • Develop and fine-tune correlation rules, alerts, and dashboards in Splunk ES to improve threat detection capabilities. • Design, build, and maintain … onboarding new data sources, tuning correlation rules, and developing new detection use cases. • Collaborate with other teams to support incident response, vulnerability management, and threat hunting activities. • Conduct threat analysis, log analysis, and data enrichment using Splunk and other security tools. • Participate in regular security reviews and audits, providing evidence and reporting as needed. • Contribute to documentation and More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
BAE Systems (New)
hybrid and flexible working arrangements available. Please consult your recruiter for details. Grade: GG10 - GG11 Referral Bonus: £5,000 Job Description Serve as the point of escalation for intrusion analysis, forensics, and incident response queries. Provide rootcauseanalysis for complex, non-standard findings and anomalies without existing playbooks. Mentor team members and share knowledge proactively. … red team and pentest findings to improve detection rules. Provide forensic support and threat emulation to improve alert triage and accuracy. Identify gaps in SOC processes, data collection, and analysis, demonstrating the need for improvements through scenarios and red teaming. Perform complex threat hunting, automation, and analytic enrichment tasks. Set vision and milestones for emulation and detection capabilities, influencing More ❯
client in Springfield, VA in satisfying FISMA and OMB reporting requirements. The Data Analyst will lead data gathering efforts across a diverse stakeholder group, compile the data, conduct data analysis across all data collected, develop dashboards and data visualizations to show compliance trends, identify data anomalies, and conduct rootcause analysis. The successful candidate will have previous … in data analytics and cybersecurity with extensive knowledge of FISMA metrics. The candidate must have previous experience compiling data, building reports, developing dashboards and other data visualizations, performing data analysis and communicating outcomes of data analysis to stakeholders at varying levels across the organization. Responsibilities Perform data analysis, build reports, and develop dashboards. Develop compliance dashboards using More ❯
client in Springfield, VA in satisfying FISMA and OMB reporting requirements. The Data Analyst will lead data gathering efforts across a diverse stakeholder group, compile the data, conduct data analysis across all data collected, develop dashboards and data visualizations to show compliance trends, identify data anomalies, and conduct rootcause analysis. The successful candidate will possess a … in data analytics and cybersecurity with extensive knowledge of FISMA metrics. The candidate must have previous experience compiling data, building reports, developing dashboards and other data visualizations, performing data analysis and communicating outcomes of data analysis to stakeholders at varying levels across the organization. Responsibilities Analyze structured and unstructured data to identify trends, anomalies, and identify security insights. … visualizations that track FISMA metrics and cybersecurity performance indicators. Design and automate scripts for data collection, transformation, and visualization to streamline reporting and enable data-driven decisions. Perform data analysis, build reports, develop dashboards. Lead data gathering efforts across a large and diverse stakeholder group in response to data calls. Build and develop presentations and develop and conduct training More ❯
testing. Work closely with development teams to integrate testing into the software development lifecycle (SDLC). Identify, document, and track defects using issue-tracking tools such as JIRA. Conduct rootcauseanalysis and provide insights to improve product quality. Collaborate with cross-functional teams to ensure adherence to quality standards and best practices. Mentor and guide junior More ❯
Knowledge Management: Maintain up-to-date technical documentation, including API/interface catalogues, data flow diagrams, environment runbooks, and integration design patterns Incident and Service Request Administration: Assist in rootcauseanalysis for integration-related issues, serving as the primary point of contact for documenting, triaging, and coordinating the resolution of incidents and service requests. Change Coordination … a conduit between the development team and project teams to ensure consistent, transparent, and professional communication Education and Experience: Bachelor's degree in computer science, information-technology, engineering, system analysis or a related study, or equivalent experience A minimum of three years in a technology-related capacity with direct exposure to software development or IT project environments. At least More ❯
and analyze security events. Investigate and escalate security incidents, including malware infections, phishing attempts, and unauthorized access. Respond to and mitigate cybersecurity incidents following established incident response protocols. Perform rootcauseanalysis of security breaches and recommend remediation strategies. Coordinate with internal and external stakeholders to contain and recover from incidents. Assist in conducting risk assessments and … security audits of systems, applications, and networks. Document incident reports, threat analysis findings, and remediation steps. Prepare and deliver security metrics, reports, and dashboards for leadership and stakeholders. Maintain detailed records of security operations to support audits and compliance. Work closely with cybersecurity engineers, system administrators, and developers to implement security best practices. Collaborate with external organizations, such as More ❯
Reston, Virginia, United States Hybrid / WFH Options
CGI
methodologies, assumption, validation techniques and findings to align with regulatory expectations and internal governance standards Support the Funds Transfer Pricing and Enterprise Financial Analytics teams with any ad-hoc analysis projects or reporting Experience working within Capital Markets, Treasury or balance sheet management preferred Proficient in MS Excel technical skills, i.e. Python, R, SAS and using BI tools for … financial analysis desired Required qualifications to be successful in this role: 8-9 years of relevant experience Proficiency in Microsoft Excel; familiarity with Python, R, SAS, and BI tools (e.g., Power BI, Tableau) for financial analysis Strong experience in financial modeling, documentation, and regulatory compliance Experience in Capital Markets, Treasury, or balance sheet management Excellent planning and organizational … skills using tools like Microsoft Project Strong facilitation, communication, and relationship-building skills Ability to manage and coordinate project teams and resolve technical issues Skilled in process mapping, rootcauseanalysis, and structured problem-solving Familiarity with project management methodologies and risk management practices Education: Bachelors degree in Business, Computer Science, Information Systems, or a related field More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
and GCP , ensuring resilience, cost-efficiency, and data security. Collaborate closely with infrastructure, architecture, and cybersecurity teams to meet internal risk, compliance, and governance requirements. Support live systems, perform rootcauseanalysis, and implement solutions for incidents and performance bottlenecks. Qualifications and experience The ideal candidate for this role will have the below experience and qualifications: Bachelor More ❯
ensuring reliability and performance in production environments. Document test and deployment activities, including test plans, procedures, and results. Track and communicate findings and ensure timely closure of issues. Lead rootcauseanalysis and fixes/work arounds to systemic problems that impact production operations, document and communicate findings. Experience and Skills Must have 2+ years experience with More ❯
and GCP, ensuring resilience, cost-efficiency, and data security. Collaborate closely with infrastructure, architecture, and cybersecurity teams to meet internal risk, compliance, and governance requirements. Support live systems, perform rootcauseanalysis, and implement solutions for incidents and performance bottlenecks. Required Skills/Experience The ideal candidate will have the following: Bachelor's or Master's degree More ❯
and test network engineering/administration activities. Create and maintain Standard Operating Procedures (SOPs) and technical documentation. Provide follow-up reports (technical findings, feedback, and resolution steps taken) for RootCauseAnalysis and process improvement initiatives. Required Qualifications Top Secret Clearance Minimum of a Bachelor's degree in Science, Technology, Engineering and Math (preferred) with More ❯
all related network and endpoint security components. Collaborate with the Information Security Specialist to validate ZTA effectiveness through testing, exercises, and real-time monitoring. Lead post-incident forensics and rootcauseanalysis to ensure rapid containment, mitigation, and capture lessons learned to reduce future system compromise. Guide configuration baselines and system hardening strategies aligned with RMF controls … and mission risk profiles. Conduct rigorous system testing, security drills, and continuous monitoring to validate enforcement and effectiveness of controls and provide in-depth post-incident analysis in response to any breaches or anomalies. Identify risk management practices, create incident response procedures/planning, and champion a cybersecurity-aware culture through staff training, technical mentorship, and stakeholder engagement. Develop More ❯
security platforms to identify anomalies and suspicious activity. Conduct vulnerably assessments and assist in remediation planning with system owners and administrators. Support incident response activities, including investigations, containment and rootcause analysis. Assist in the development and implementation of security policies, procedures, and technical standards. Contribute to security awareness training initiatives and promote cybersecurity best practices across the … Knowledge of common attach vectors, threat modeling, and defense-in-depth strategies. Skill in monitoring, analyzing, and responding to security events using SIEM and logging tools. Skill in vulnerability analysis, patch management, and coordination of remediation efforts. Skill in documenting incidents, tracking metrics, and maintaining compliance evidence. Ability to interpret technical data and communicate security risks clearly to non More ❯
Manage relationships with security vendors, technology partners, and cross-functional teams. Assist in defining IT infrastructure budgets, evaluating new technologies, and optimizing resource allocation. Oversee major security incidents, perform rootcauseanalysis, and implement remediation strategies. Monitor, maintain, and troubleshoot network systems, servers, and cloud-based infrastructure. Provide technical support for IT infrastructure, including hardware, software, and More ❯
SRE principles to ensure reliability, performance, and resilience of the SACM platform. Embed SACM into 24x7 operations and observability platforms to support real-time decision-making. Support incident prevention, rootcauseanalysis, and continuous improvement through data-driven insights. Define and enforce service level objectives (SLOs) and key performance indicators (KPIs) for SACM health and value. Governance More ❯
SRE principles to ensure reliability, performance, and resilience of the SACM platform. Embed SACM into 24x7 operations and observability platforms to support real-time decision-making. Support incident prevention, rootcauseanalysis, and continuous improvement through data-driven insights. Define and enforce service level objectives (SLOs) and key performance indicators (KPIs) for SACM health and value. Governance More ❯