Commercial Officer Reporting to: Head of Category Dept/Pillar: Commercial Hours : 37 (full-time) Grade/Salary : From £38,598 (dependent on experience etc) Contract Type: Permanent Vetting Le vel: NPPV 3 &SC Role overview As a Commercial Officer More ❯
UX Designer Based at client locations, working remotely, or based in our Godalming or Milton Keynes offices. Salary Negotiable, DoE, plus company benefits. About Us Triad Group Plc is an award-winning digital, data, and solutions consultancy with over 35 More ❯
Software Engineer Application Deadline: 26 August 2025 Department: Software Engineering Employment Type: Permanent Location: London (Hybrid) Compensation: £45,000 - £85,000/year Description Please note: For this role, it is essential that you hold an active, or recently active More ❯
Job Number: 96 Job Category: GovTech Job Title: INFORMATION SECURITY ANALYST Job Type: Full-time Clearance Level: Top secret Work Arrangement: On-site Job Location: CA Point Mugu Salary: 120K- 153K Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and … propose and implement risk mitigation strategies Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Assist in the continuous integration, continuous delivery/deployment (CI/CD), continuous feedback, and continuous operations cycle May ensure appropriate security controls are in place that will safeguard digital files and … vital electronic infrastructure Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline 3 and 10 years of practical CEAT computer security experience in secure network and system design, analysis, procedure/test generation, test More ❯
per year Job Overview: At Mauck Research Group, LLC, we are seeking a highly skilled and motivated Android Cyber Tool Developer with a TS/SCI securityclearance to join our dynamic team. As an Android Cyber Tool Developer, you will play a crucial role in researching and developing cutting-edge security tools for the Android … dedicated to shaping the future of cyber operations. Responsibilities: - Conduct research to identify new vulnerabilities and attack vectors in Android operating systems. - Develop and implement robust and scalable security tools to understand risks and explore overall system security. - Collaborate with cross-functional teams to ensure seamless integration of developed tools into existing systems. - Stay abreast of the latest … a related field. (Master's degree preferred) Minimum of 3 years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and More ❯
Zachary Piper Solutions is seeking a Network Security Administrator to support a U.S. Government customer in San Diego, California. This role focuses on the administration and compliance of Endpoint Security Solutions (ESS) across voice, video, and data communications networks. The ideal candidate will have strong experience with Trellix ePolicy Orchestrator, DISA STIGs, and DoD cybersecurity compliance. … experience - 5-7 years of related network/system administration experience Experience with: - VMWare - Windows Server 2016 or higher - Microsoft SQL Server - Linux systems - Applying DISA STIGs and security patches - SOP and policy development for ESS - IAT Level II certification (one of the following): - CCNA Security - CySA+ - GICSP - GSEC - Security+ CE - CND - SSCP - Computing environment certification More ❯
Supports code deployments, including performing troubleshooting, spin up services/pods, etc. Performs CI/CD pipeline patching, upgrades, and vulnerability scans. Implements Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs). Additional responsibilities include, but are not limited to: • Writes automated test scripts to assess functionality within the system User Interface (UI) • Writes and executes More ❯
Information Systems Security Engineer (ISSE) Clearance: Top Secret/SCI with CI Poly Location: Herndon, VA Currently seeking an Information Systems Security Engineers (ISSE) to support an Intel Community (IC) customer in the Herndon, Virginia area. ISSE responsibilities for conducting information system security engineering activities for new or existing system(s) may include: Defines … information security requirements and their integration into information systems and its technology component through purposeful security design. Develops and implements security designs ensure that the hardware, operating systems and software applications adequately address cyber security requirements and Security Controls Traceability Matrix (SCTM). Identify points of vulnerability, non-compliance with … established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Implement, validate Security Technical Implementation Guide (STIG) requirements and/or perform SRG assessments for all development and implementation projects. Develop, customize, and configure Splunk applications and dashboards. Develop Security Test Procedure (STP), conducts self-assessments to verify compliance with required configuration guidance and support More ❯
Southern Md Facility, Maryland, United States Hybrid / WFH Options
Softek International Inc
Description Security Engineer - Senior - (HSEN) - Zscaler Engineer (Access Management and Network Security) POSITION NUMBER (TA2-22) Summary : Softek is seeking a Security Engineer (Senior) with Zscaler experience to support the DHS Enterprise Engineering Division within the Office of the Chief Information Officer (OCIO). The ideal candidate will have a strong background in cybersecurity … and hands-on experience with Zscaler platforms. This role involves designing, implementing, and managing security measures to protect DHS systems, networks, and data. This program portfolio includes management and oversight of the technical infrastructure and security tools, sensors, servers, and data storage devices to support the DHS Network Operations Security Center (NOSC) Cyber (SOC … and other DHS stakeholders and Components. Duties/Responsibilities : Develop and implement robust security protocols and measures to protect computer systems, networks, and data from unauthorized access, breaches, and other security threats. Zscaler Platform Management: Configure, manage, and optimize Zscaler Internet Access (ZIA), Zscaler Private Access (ZPA), and Zscaler Digital Experience (ZDX) solutions to ensure secure More ❯
Security Classification Assessor Test Engineer (SCATE) Level 1 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well … as someone who can perform security focused services to improve the security posture of the ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective in … maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools and associated documentation Security procedures for systems and software within area of expertise to ensure consistent security policy implementation Education relevant to computer engineer More ❯
Security Classification Assessor Test Engineer (SCATE) Level 4 - Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 4. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as … well as someone who can perform security focused services to improve the security posture of the systems. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective … maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated documentation • Security procedures for systems and software within area of expertise to ensure consistent security policy implementation • Education relevant to computer engineer More ❯
Security Classification Assessor Test Engineer (SCATE) Level 1 - Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as … well as someone who can perform security focused services to improve the security posture of the ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be effective … maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated documentation • Security procedures for systems and software within area of expertise to ensure consistent security policy implementation • Education relevant to computer engineer More ❯
Security Classification Assessor Test Engineer (SCATE) Level 2 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as … well as someone who can perform security focused services to improve the security posture of the NRO ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be … maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools and associated documentation Security procedures for systems and software within area of expertise to ensure consistent security policy implementation Education relevant to computer engineer More ❯
Security Classification Assessor Test Engineer (SCATE) Level 3 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as … well as someone who can perform security focused services to improve the security posture of the NRO ISs. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to be … maintenance Integration testing Information system engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools and associated documentation Security procedures for systems and software within area of expertise to ensure consistent security policy implementation Education relevant to computer engineer More ❯
Security Classification Assessor Test Engineer (SCATE) Level 3 -Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates Government Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability … as well as someone who can perform security focused services to improve the security posture of the Information Systems. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to … maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated documentation • Security procedures for systems and software within area of expertise to ensure consistent security policy implementation • Education relevant to computer engineer More ❯
Security Classification Assessor Test Engineer (SCATE) Level 2 - Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates Government Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability … as well as someone who can perform security focused services to improve the security posture of the Information Systems. Interested candidates need to thrive in an innovative, fast-paced environment; are highly motivated and not afraid to take on uncharted territory; possess strong communication, leadership, and organizational skills; and be able to prioritize their time to … maintenance • Integration testing • Information system engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools and associated documentation • Security procedures for systems and software within area of expertise to ensure consistent security policy implementation • Education relevant to computer engineer More ❯
Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI securityclearance and polygraph are required for the position. Required: Must be a US Citizen. Must have … must be within the last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for … a bachelor's degree. Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure information system operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA management. Must have at least More ❯
position is responsible for analyzing, designing, and optimizing clinical information systems and related IT infrastructure for the Department of Defense, with a focus on ensuring operational readiness, system security, and compliance with DoD standards. What you'll do Analyze complex system requirements and develop technical solutions for clinical information systems such as TMIP and JOMIS. Design, implement, and … and troubleshooting to ensure optimal performance, reliability, and security. Prepare and maintain comprehensive technical documentation, including system specifications, user manuals, and standard operating procedures. Monitor and assess system security, privacy, and compliance with DoD regulations and industry best practices. Provide expert-level support for system upgrades, migrations, and modernization initiatives. Train and mentor junior analysts and end-users More ❯
Data centers, server rooms, Rack based Servers, Network Switches, KVM's, Routers, Backup and Recovery devices, Firewalls, and security appliances. Due to federal contract requirements, United States citizenship and an active TS/SCI securityclearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w … Must have substantial experience with data centers and/or server rooms, to include: Rack based Servers, Network Switches, KVM's, Routers, Backup and Recovery devices, Firewalls, and security appliances. Must have experience with typical data center related software such as Virtualization platforms, Microsoft/Linux server management, Network Switch and Firewall client applications, antivirus, and backup and More ❯
including researchers, clinicians, and IT professionals-to gather requirements and translate them into technical specifications. Oversee system integration, testing, and validation to ensure solutions meet organizational and federal security requirements. Provide advanced troubleshooting and technical support; serve as an escalation point for complex system issues. Ensure compliance with cybersecurity policies (e.g., DoD 8570.01-M), privacy regulations (e.g., HIPAA … and industry best practices. Develop and maintain comprehensive system documentation, including configurations, workflows, and security protocols Stay current with emerging technologies and federal cybersecurity mandates relevant to military and health research environment Conduct feasibility studies, risk assessments, and cost-benefit analyses for proposed IT solutions. Qualifications High School diploma or GED Active Top Secret Government Clearance Minimum of More ❯
Tuition reimbursement 401k Retirement Plan Military Reserve pay offset Paid maternity leave Salary Range : $94,425 - $151,080 Position Overview: M.C. Dean is seeking to hire a Cyber Security Specialist 3 to support the CIM Business Unit. The candidate will be required to travel to CONUS and OCONUS Government and Commercial facilities to support the development and implementation … Cybersecurity of Facility-Related Control Systems. • Assist in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process. • Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems. • Conduct vulnerability scanning and document system vulnerabilities. • Work in a team environment alongside other cybersecurity … areas: network infrastructure (Cisco), Microsoft Windows. • Experience working on government and/commercial projects implementing cybersecurity requirements in a variety of industrial control systems (e.g., building management, electronic security, fire alarm/mass notification, electrical distribution, power management, etc.). Qualifications Additional Preferred Qualifications: • 5+ years of experience working with industry and government agencies on the design of More ❯
Analytics, Data Integration, Collection, Agile, Java, Cloud Analytics, GHOSTMACHINE, DataXplorer, DX, Query Time Analytics Due to federal contract requirements, United States citizenship and an active TS/SCI securityclearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph (Last polygraph must be within More ❯
NNSA cybersecurity policies and procedures for designated information systems Conducting the Assessment and Authorization (A&A) activities for designated systems -Documenting the implementation of protection measures within the security plan for the systems -Ensuring the appropriate access is provisioned for users of designated systems. -Work to establish and maintain Configuration Management of documentation Identifying, assessing, and documenting threats … and risks to designated systems. Capturing and maintaining information system security artifacts. -Work to establish and maintain Configuration Management of documentation. -Conducting cybersecurity tests and assessments and providing results of these activities to the ISSM. -Evaluating the security impact and recommending implementation strategies for security significant changes to the assigned info Identifying cyber security … training needs in terms of job responsibilities or roles. -Conducting information system risk assessments. -Responding to and reporting of incidents related to their assigned information systems. -Development of security processes and procedures to support the ISSM's Cyber Security Program. -Creating and maintaining disaster recovery and incident response plans and participating in associated training Formally and More ❯
AWS, DevOps, CI/CD, Python, Workspaces integrations, architecture, networking, PO&AMs Due to federal contract requirements, United States citizenship and an active TS/SCI securityclearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active polygraph. Bachelor's degree in computer science or More ❯
This role ensures compliance with federal cybersecurity regulations and frameworks, implements threat mitigation strategies, and promotes a proactive security posture across enterprise IT operations. Duties and Responsibilities: Ensure adherence to cybersecurity frameworks including NIST 800-53, FedRAMP, FISMA, and zero-trust architecture principles. Oversee vulnerability management, incident response, and threat intelligence integration. Conduct security assessments, audits … and compliance reviews. Collaborate with stakeholders to mitigate risks and document corrective action plans. Support security reporting and briefings for agency leadership and external stakeholders. Monitor and report security metrics to ensure continuous improvement. Other duties as assigned. Additional Skills & Qualifications Demonstrated experience with large scale IT service contracts, including oversight of cross-functional teams, service … Skills and Abilities: Experience supporting federal audits (e.g., FISMA, ATO processes). Familiarity with tools such as Tenable, Splunk, and endpoint detection platforms. Designing, implementing, assessing or reviewing security controls in systems that utilize cloud technology with either Amazon Web Services, Oracle Cloud, Google Cloud, IBM Cloud, or Microsoft Azure cloud architecture Experience implementing Zero Trust architectures in More ❯