the potential to greatly benefit society. However, developing advanced AI also comes with risks if not properly safeguarded. That's why we are seeking an exceptional Detection and Response engineer that will be on the frontlines to build solutions to monitor for threats, rapidly investigate incidents, and coordinate response efforts with other teams. In this role, you will have … the opportunity to shape our security capabilities from the ground up alongside our world-class research and security teams. Responsibilities: Lead cybersecurity Incident Response efforts covering diverse domains from external attacks to insider threats involving all layers of Anthropic's technology stack. Develop and deploy novel tooling that may leverage Large Language Models to enhance detection, investigation, and … and optimize detections, playbooks, and workflows to quickly identify and respond to potential incidents. Review Incident Response metrics and procedures and drive continuous improvement. Work cross-functionally with other security and engineering teams. Note: This position will require participation in an on-call rotation. You may be a good fit if you: 3+ years of software engineering experience, with More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
Cyber SecurityEngineerSecurity Clearance Required - DV ('Developed Vetting') Location: Huntingdon, UK - 80% on-site requirements UNLEASH YOUR POTENTIAL At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built … and our community. Our Mission, Vision, and Values guide the way we do business. Are your ready for your next challenge? We are in search for a number Cyber Security Engineers with a varied technical background - Required to work at our customer sites in Huntingdon and/or London with occasional travel to other UK sites. In this role … you will be working in a team of security engineers reporting into the cyber security engineering lead to ensure that the customer sites maintain a strong cyber security posture. You will have responsibility for ensuring that security enforcing functions and managed and maintained to a high standard whilst securely implementing new capabilities. You will ensure that More ❯
Huntingdon, England, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
Cyber SecurityEngineerSecurity Clearance Required - DV ('Developed Vetting') Location: Huntingdon, UK - 80% on-site requirements UNLEASH YOUR POTENTIAL At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built … and our community. Our Mission, Vision, and Values guide the way we do business. Are your ready for your next challenge? We are in search for a number Cyber Security Engineers with a varied technical background - Required to work at our customer sites in Huntingdon and/or London with occasional travel to other UK sites. In this role … you will be working in a team of security engineers reporting into the cyber security engineering lead to ensure that the customer sites maintain a strong cyber security posture. You will have responsibility for ensuring that security enforcing functions and managed and maintained to a high standard whilst securely implementing new capabilities. You will ensure that More ❯
Technology, we're asking that you attend the office a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our Cyber Security team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have an active … approach to vulnerability management. Develop integrations for internal and external tools to capture data relevant to the vulnerability remediation process (e.g. by interacting with APIs) Ensure compliance with relevant security standards, frameworks, and regulations Stay up to date with the latest trends and developments in vulnerability management, security standards, and regulations Strong engineering and automation background with a … Python, SQL.) Strong automation skills with CI/CD experience Experience with developing integrations by interacting with APIs Ability and willingness to learn new technologies and adapt to evolving security landscapes Capability to understand the bigger picture while effectively managing details Strong written and verbal communication skills to effectively collaborate with cross-functional teams and stakeholders Good to have More ❯
come in. The Opportunity IAG Loyalty is fast becoming a Platform as a Service business. As a result, we are looking for a highly capable individual to join our security team. The candidate will have a strong technical background and experience in implementing best practice security controls within cloud and DevOps. They will be comfortable working in a … cloud-native environment where high rates of technology change are the norm. We are looking for someone who can lead the delivery of a number of our security engineering objectives, be responsible for the effective operation of the tools that help keep our organisation secure and manage a small team of security engineer. This role is based out … to work from one of our other office or partner locations, based on your role and 'to do' list. What you'll be doing You will lead the Platform Security practice within our security team, driving key initiatives to enhance the security of our cloud platform and software development lifecycle. This involves coordinating and contributing to continuous More ❯
Responsibilities (Text Only) Key Responsibilities: Technical Leadership & Execution (be the AI Security expert and technical pathfinder): - Lead with hands-on expertise to deliver high-impact technical engagements-including demos, workshops, proof-of-concepts (PoCs), and pilots-that showcase the value of Microsoft's AI Security solutions through deep technical proficiency and real-world application. - Act as a subject … matter expert (SME) for Microsoft's cutting-edge Security solutions, enabling secure AI adoption and deployment-from custom-built AI applications, agents, and models to the scalable use of ready-to-deploy AI solutions. - Drive technical decision-making and unblock complex sales scenarios in collaboration with STU/ATU teams, while guiding customers through the business and technical decision … process for Microsoft Defender for Cloud and broader security scenarios. - Translate customer use cases into repeatable IP, scalable best practices, and actionable product feedback to influence engineering and go-to-market strategies. - Obtain and apply deep competitive insights (e.g. PANW, Wiz, CrowdStrike, AWS, GCP) to shape win strategies, takeout plans, and technical differentiation. - Demonstrate deep expertise in Azure, AWS More ❯
State Street Identity and Access management (IAM) engineering team is looking for outstanding individuals with excellent intellectual and analytical capabilities, entrepreneurial problem-solving skills, strong communications, and influencing capabilities. This role will have a broad range of responsibilities within IAM More ❯
SecurityEngineer/Data Security Analyst IV ITI is seeking an experienced Cybersecurity engineers to work out of Lackland AFB. IS3 provides cybersecurity support to 16th Air Force. Job Description: Must be highly proficient in use of Risk Management (RMF) methodology, its associated assessments and report requirements, understanding of the plans and policies, and conduct timely and … in-depth research for policies and processes applicable to security engineering. Solid knowledge and experience with the NIST 800 Risk Management Framework (RMF) NIST 800 series 800-37 Rev 2, 800-53 Rev. 5. Demonstrated expertise in RMF processes and tools such as Xacta and eMASS, ensuring systems and applications to meet both AF IC and related IC policies … and regulations. Ability to apply IT security control requirements to address the level of security required to protect the confidentiality, integrity and availability of system data and resources. Develop solutions and recommendations (with test plans) and provide POA&M and documentation support including, but not limited to, assessment methodologies, and proficiency in Governance, Risk, and Compliance (GRC) platforms More ❯
Information Systems SecurityEngineer L1 KBX - TS/SCI Poly required Annapolis Junction, MD Apply Now Information Systems SecurityEngineer L1 opportunity: Seven (7) years experience as an ISSE on programs and contracts of similar scope, type, and complexity required. Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline … years of ISSE experience may be substituted for a bachelor's degree. TS/SCI clearance with FS Poly required Required skills: • Help plan and coordinate the IT security programs and policies • Provide support for a program, organization, system, or enclave's information assurance program • Provide security guidance and support to system developers, administrators, and owners • Provide guidance … and support for directed changes related to security • Assess the security impact of changes to the system • Help maintain the Security documentation, such as SSPs • Conduct security assessments on systems in support of system authorization • Support AO/DAO, SCA, and ISSM on system Assessment and Authorization (A&A) duties to obtain and maintain ATOs • Conduct More ❯
Cyber Security Project Engineer ACTIVE TS/SCI CLEARANCE with FS poly REQUIRED TO BE CONSIDERED FOR THIS POSITION The Cyber Security InfoSec Engineer provides IT security engineering, integration services and solutions. This includes malicious code detection, intrusion detection, and information security tool development and integration. Qualifications: Education and/or Experience : Requires a … knowledgeable and experienced subject matter experts to perform a variety of professional services, logistics and supply chain management, crisis prevention and response, and information technology solutions to solve dynamic security challenges. Founded in 2008 and based in Alexandria, Virginia, TENICA is a Service Disabled Veteran Owned, Woman Owned, Small Business (SDVOB and WOSB) and is a participant in the More ❯
Network SecurityEngineer Montgomery, AL - 100% ONSITE Maxwell AFB/Gunter Annex Secret clearance is required to start Must be Security+ certified Must get Palo Alto certification within 90 days of hire Different shifts available: 7am - 3pm 3pm - 11pm 11pm - 7am Requirements: • 5+ years' experience with Enterprise DOD boundary protection and CSSP operations. • Install, monitor, configure, troubleshoot, upgrade … patch, harden, maintain, and operate intrusion detection/prevention systems, firewalls, load balancers, and web proxies to protect AFNet resources from both internal and external threats according to DoD security standards. • Perform complex analytics on boundary protection systems to protect system assets from compromise, data loss, and other requirements. • Perform DCO and DODIN operations. • Must have an active Secret … clearance or higher Certifications Required: • Must be Security+ certified • Must obtain one of the following certifications within 90 days of hire: Palo Alto Network Security Professional or Palo Alto Networks Certified Network Security Administrator (PCNSA) (Certification retired but still valid if not expired More ❯
Information SecurityEngineer Lorton, VA Our customer is a growing Government Contracting organization. The company is currently a sub to a large cloud provider and hiring an Information Security Engineer. The ideal candidate has experience in cyber security, implementing security measures, and handling incident responses. The candidate must also have an active TS/SCI … security clearance • Security Analysis and Reporting: Analyze and report on both organizational and system security posture trends, access controls, and the effectiveness of security controls to the ISSM/ISSO, including compliance with security policies. • Security Implementation and Mitigation: Implement security measures to address vulnerabilities, recommend changes, and ensure the confidentiality, integrity, and … availability of systems while documenting all activities. • Documentation and Procedures: Assist the ISSM/ISSO in developing and documenting security requirements, controls, risk management procedures, and the System Security Plan, ensuring compliance with applicable DoD policies. • Incident Management and Recovery: Support the ISSM/ISSO in managing security incidents, including conducting assessments, developing risk management plans, and More ❯
Title: Cyber SecurityEngineer (Mid-Level) Location: WMA - Washington Metropolitan Area McIntire Solutions, LLC is inviting a Cyber SecurityEngineer (Mid-Level) to join our team in WMA - Washington Metropolitan Area. Mid-level Cyber Security Engineers support the refinement of information security requirements and ensure that the requirements are integrated into information technology component … products and information systems through purposeful security architecting, design, development, and configuration. Responsibilities • Supports development teams working to design and develop information systems or upgrade legacy systems. • Supports product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. • Develops system concepts, contribute to the capability phase of the systems development lifecycle … and translate technology and environmental conditions (e.g., law and regulation) into system security designs and processes. • Supports development and documentation of Security Architectures, Roadmaps, and investments. Required Qualifications • Active TS/SCI with CI Polygraph • Bachelor's degree in Engineering, Computer Science, Information Technology, Management Information Systems, or related STEM degree program. • Mid-level working experience in government More ❯
Job Number: 123 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITYENGINEER I - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 145K Background Support the government in the enforcement of the design and implementation of trusted relationships among external systems and … architectures Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components Identify overall security requirements for the proper handling of government … data Interact with the customer and other project team members Support security planning, assessment, risk analysis, and risk management Requirements Bachelor's degree in computer science, information assurance, information security system engineering, or a related discipline from an accredited college or university 7 years of experience as an ISSE on programs and contracts of similar scope, type, and More ❯
CEdge has an opportunity for a Cyber SecurityEngineer (Senior Level), located in St Louis,MO If you are ready to work alongside World Renowned Technology experts, and carry the skills below, this is the opportunity that will inevitably take your career to unbelievable levels! This position requires a TS/SCI Security Clearance Cyber SecurityEngineer (Senior) Overall Assignment Description: The N2W Cyber SecurityEngineer will serve as a member of the N2W Active IT and project team, providing systems engineering, security engineering, and project management expertise. The N2W Cyber SecurityEngineer will support the overall goals/objectives of the NGA Technical Security Program, specifically, cyber … security requirements required to support the National Security Information (NSI) compliance. The N2W Cyber SecurityEngineer will support the development and documentation of the N2W Active IT Cyber Security architecture, roadmaps and investments. The Cyber SecurityEngineer will act as a technical point of contact for many of the N2W activities, work with More ❯
GCyber is seeking a versatile and experienced Senior SecurityEngineer to augment existing customer teams and support secure system design, integration, and operational capability development. This role provides architectural leadership and hands-on support for the planning and implementation of secure IT solutions within complex enterprise environments. As the Senior SecurityEngineer, you will Lead the … systems and alignment with customer requirements. Develop and evaluate proofs of concept for new technologies, assessing integration feasibility, performance, and compliance with operational needs. Collaborate with system, network, and security teams across multiple stakeholders to ensure successful configuration, deployment, and governance compliance (e.g., data segregation and retention). Maintain up-to-date technical documentation, including architecture overviews, interface specifications … and storage/retention guidelines. Guide or contribute to security posture improvements, driving adoption of best practices and alignment with evolving industry frameworks. Provide technical leadership or mentorship to security-focused personnel and teams. Assist in the development and review of security policies, and support executive-level briefings and written communications as needed. Minimum Qualifications and Experience More ❯
knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments " " Education and Experience • 14 years of IA System Architect and Engineer (IASAE) experience, to include recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure … PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and DoD … Information Security regulations, publications, and policy Must meet specified certification requirements defined and documented by DOD 8570 - IASAE Level III a must have More ❯
Not Just a Job - It's a Mission Secured by Your Expertise: Join us as an Information Systems SecurityEngineer! Are you ready to protect the nation's most critical systems with cutting-edge security solutions? At Adaptic, we engineer the future of secure technology. Join a high-impact team where your expertise shapes resilient systems … your bold ideas are encouraged, and your dedication to mission success truly matters. What You'll Do: As an Information Systems SecurityEngineer (ISSE), you'll be at the forefront of securing enterprise and mission systems. You will: • Perform or review technical security assessments of complex computing environments • Participate as a security engineering lead and representative … enclave architectures • Apply IA policy, risk frameworks, and best practices to build secure solutions • Support the development and enforcement of trusted relationships among external systems • Contribute to risk assessments, security planning, and mitigation strategies • Support the development, review, and implementation of C&A/A&A documentation (RMF, DIACAP, NISCAP) • Recommend system-level solutions to security requirements • Interact More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
Role: Information System SecurityEngineer Location: Washington, D.C. - Hybrid with some travel Clearance: Secret minimum, ideally TS Salary: $150K-$185K + Equity My client, a leading defense tech company, is looking to hire an experienced ISSE to join their team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background in … information security fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal oversight. Providing outstanding customer service, policy expertise, and high-quality documentation. Partnering with engineers to interpret security requirements and … plan effective control implementations. Translating and synthesizing complex concepts and architectures into clear body-of-evidence artifacts, including System Security Plans (SSPs) and architecture diagrams. Representing the company and providing credible cybersecurity expertise in government assessments and audits. If you are interested in learning more about this opportunity, please apply below, and I will contact you to discuss the More ❯
Position: Cyber Security Project Engineer Location: Chantilly Clearance: TS/SCI w/FSP Salary- 230k-245k/yr The above salary range represents the range expected for the position; however, final salary offers are based on a number of factors such as the position's responsibilities; the candidate's experience, education, and skills; location; travel required; and … secure network connections) in conjunction with software. Required Skills: Demonstrated experience with the Customer's A&A process. Demonstrated experience leading systems/applications through the Customer's Cyber Security process. Demonstrated experience performing vulnerability scanning and testing. Demonstrated experience in the Risk Management Framework (RMF) methodology. Demonstrated experience creating and delivering documentation in support of A&A packages. … Demonstrated experience monitoring and maintaining cyber security documentation. Demonstrated experience with AWS or other cloud platforms. Desired Skills: Demonstrated experience with Systems Engineering Demonstrated experience with Cloud platforms. Willingness to learn Systems and Cloud tools to provide Systems Engineering support as needed. ABBTECH is an EOE/Minorities/Women/Disabled Individuals/Veterans More ❯
OVERVIEW: We are seeking a seasoned ICS/SCADA SecurityEngineer to join their team, providing expertise in cybersecurity considerations for industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems. This is an on-site position that requires oversight and support of Cyber/SSE activities for National Security Systems and critical infrastructure environments. … Your proficiency, whether in electrical engineering, computer science, cybersecurity, or a related field, will enable you to assess and enhance the security posture of ICS/SCADA environments while considering operational constraints and mission-critical needs. GENERAL DUTIES: ICS/SCADA system design, implementation, and security-understanding the architecture, protocols, and operational constraints of industrial automation systems. Familiarity … in sectors such as energy, water, manufacturing, and critical national defense infrastructure. Apply systems engineering principles to the planning, design, development, deployment, integration, and testing of ICS/SCADA security solutions. Assess cybersecurity risks in ICS/SCADA environments and provide security engineering recommendations for securing operational technology (OT). Evaluate and analyze security implications of industrial More ❯
Job Title: Lead Information Assurance Systems Engineer-Systems Security Job Code: 23664 Job Location: Camden, NJ Schedule: 9/80 reg, with every other Friday off Job Description: L3Harris Technologies - Integrated C5 Systems (IC5S) is a recognized global leader in the design, development and production of secure communication systems and products supporting mission-critical space, ground, air and … are committed to providing best-in-class solutions to our customers with the highest level of integrity, excellence and uncompromised quality in everything we do. The Information Assurance Systems Engineer is first and foremost a Systems Engineer who is also a subject matter expert in the development of systems and equipment that protect classified National Security information. … S/he will be responsible for applying security and cryptography expertise throughout the Systems Engineering process to develop and successfully certify National Security systems on time, within the allotted budget, and with low residual risk. The Information Assurance Systems Engineer is an ideal position for those with either Systems Engineering academic or industry experience in the More ❯
Job Number: 408 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITYENGINEER (408) - VIRGINIA - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Belvoir VA Salary: 138K-186K Background Create, review and edit authorization documentation for completeness and accuracy in accordance with required policy Thoroughly understand … and be able to implement RMF system accreditation processes Assess use case and operational risk of integrated open source, and GOTS/COTS software components Provide security planning, assessment, risk analysis, and risk management support Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements Support the enforcement … of protocols and services, computer architectures, and network topologies is required xperience with DISA STIGs and SRGs, vulnerability management systems, mitigation and compliance processes, and reviewing results from automated security scanning tools Ability to work independently and as part of a team is needed Flexibility is essential to adapt to schedule changes as needed Preferred CISSP-ISSEP is highly More ❯
Requirements: TS SCI DCGS-A experience • Oversee and implement security configurations, practices, and procedures for information systems (IS). • Liaise between system owners and security personnel. • Manage the complete lifecycle of security controls, ensuring effectiveness and compliance. • Maintain continuous oversight of system security documentation. • Conduct vulnerability scans as per risk assessment guidelines. • Develop and manage POAMs … in response to security vulnerabilities. • Coordinate system owner approvals for corrective or mitigation actions. • Monitor security controls to maintain ISs' ATO status. • Served primary focal point for System Security Programs Minimum Qualifications: • Bachelor's or advanced degree in Computer Science, Cybersecurity, or related cyber discipline. • Minimum of 7 years' experience as an ISSO at a cleared facility … to include the following: • Experience with developing Assessment packages for Determination. • Experience with Briefing Executive level officers. • Experience with security tools such as Tenable Nessus/Security Center, eMASS or similar applications. • IAT Level III Preferred Qualifications: • Certified Information System Security Professional, Certified Governance Risk and Compliance Clearance Requirements: • Active Top-Secret clearance with SCI eligibility More ❯
Alltech is looking for an ISSE (SecurityEngineer). Candidate will be required to understand and document a systems design and implementation that encompass multiple enclaves, to include those with differing data protection/classification requirements. The candidate should understand distributed architectures and cloud-based systems for big data applications. Essential Job Responsibilities Will create, review and edit … to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerability management systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data gathering, and collaborate with diverse audiences. Will follow established processes … where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in the enforcement of the design and implementation of trusted relationships among external More ❯