Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO 2) is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Winchester, Hampshire, United Kingdom Hybrid / WFH Options
Arqiva
and employee assistance programmes, gymflex, travel and dental insurance Work. Life. Smarter. Our commitment to a flexible and hybrid working culture Role Purpose Design and implement changes to information security governance & risk management, to ensure that the organisation's security posture is robust, compliant, and adaptable to emerging threats while aligning with strategic business goals. Accountabilities Ensure … by identifying and recommending changes to Infosec policies, processes, control frameworks Ensure that we are consistently compliant with customer, regulatory, and shareholder obligations. Implement and continuously improve a risk management process across the organisation. Maintain and assess the effectiveness of the security controls catalogue; recommend improvements. Own the Information SecurityManagement System (ISMS) to ensure compliance … with internal and external requirements. Provide assurance that security controls are operating effectively and aligned with defined frameworks. Maintain company risk portfolio and actively review and risk finding Conduct internal assessments against regulatory and customer obligations, compliance assessments, and gap analyses. Develop and implement governance frameworks aligned with business and regulatory requirements. Skills Cyber Risk Oversight - Strategic understanding of More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 - The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many … organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to … include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and More ❯
This position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts support functions are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cyber Systems Engineer Project Management Technical Support provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to: Support the front Office elements (Director, Deputy, COS, Business … cybersecurity and information assurance Assist in the development of execution reviews, acquisition roadmaps and transition plans Assist with the development, documentation and communication of office initiatives geared toward enterprise security Provide technical recaps of customer meetings with cyber security contractors Assesses contractor performance using evaluation criteria and technical performance measures Assist in the development of technical requirements Produces More ❯
to who we are and where we're headed. We're proud to share our story and Make Amazing Happen at CDW. Job Summary As the Head of Information Security for the UK and International business you will report into the global CISO and also dotted line into the Director of Technology for UK&I and will be accountable … for all aspects of Information Security in the UK&I business. You will work as part of the global security leadership team to represent the UK&I business and as part of the UK&I Technology leadership team to implement global security best practices, protect our operations from threats and ensure compliance with customer and regulatory requirements. … What you will do Own and drive all aspects of Information Security across the UK&I business Build partnerships with UK&I leadership to ensure that local priorities and needs are understood while instilling a strong cybersecurity culture across the organisation Act as a senior member of the global Information Security team to represent UK&I priorities and More ❯
to who we are and where we're headed. We're proud to share our story and Make Amazing Happen at CDW. Job Summary As the Head of Information Security for the UK and International business you will report into the global CISO and also dotted line into the Director of Technology for UK&I and will be accountable … for all aspects of Information Security in the UK&I business. You will work as part of the global security leadership team to represent the UK&I business and as part of the UK&I Technology leadership team to implement global security best practices, protect our operations from threats and ensure compliance with customer and regulatory requirements. … What you will do Own and drive all aspects of Information Security across the UK&I business Build partnerships with UK&I leadership to ensure that local priorities and needs are understood while instilling a strong cybersecurity culture across the organisation Act as a senior member of the global Information Security team to represent UK&I priorities and More ❯
Information System Security Officer (ISSO) 2- This is a future position that may come open in the future. We are currently building our pipeline. Responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and … expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the … ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense More ❯
Aima Data Management is looking for a Special Security Program (SAP) to work in Fort Belvoir, Virginia. To join our team of outstanding professionals, apply today! Responsibilities Plans, develops, and analyzes security measures to protect critical information from counter-threats and possible attacks. Protects sensitive information by ensuring required software is functioning and being used correctly. Monitors … ensure compliance with government regulations. Performs work under general supervision. Handles moderately complex issues and problems and refers more complex issues to higher-level staff. Detailed knowledge of SAP securitymanagement and procedures. Knowledge of SAP Markings. Knowledge of SAP Reporting Requirements. Qualifications Associate degree. Three (3) years of experience (within a SAP). Completion of SAP Mid … Level SecurityManagement Course SA201.01 (or equivalent course). Must have TS/SCI clearance. Job ID 9 Work Type On-Site Company Description Work Where it Matters Akima Data Management (ADM), an Akima company, is not just another federal IT contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal More ❯
in safeguarding digital assets by designing, implementing, and maintaining robust cybersecurity infrastructure. You will work collaboratively with cross-functional teams to identify vulnerabilities, develop solutions, and ensure compliance with security protocols and industry standards. Staying informed about emerging trends and threats in the cybersecurity landscape, you will proactively enhance defenses through innovative tools and methodologies. Additionally, you will conduct … risk assessments, implement security controls, and support incident response efforts to minimize risks and maintain the integrity of our systems and data. We know that you can't have great technology services without amazing people. At MetroStar, we are obsessed withour people and have led a two-decade legacy of building the best and brightest teams. Because we know … think you can see yourself delivering our mission and pursuing our goals with us, then check out the job description below! What you'll do: Design, implement, and manage security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to ensure the organization's networks and systems remain secure. Conduct regular security assessments to More ❯
Endpoint Security Engineer III Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: RISAI has an exciting opportunity for a Senior Endpoint Security Engineer to join our Transport & Cybersecurity Services (TCS) team in either Springfield, VA … or St. Louis, MO. Our Endpoint Security team is rapidly growing! This is one of several New positions that we have added to the TCS program. This is an exceptional opportunity for a TS/SCI cleared professional to join an incredibly talented team, work with cutting edge technologies, and propel your career within the Cyber realm! TCS is … a long-term contract with the National Geospatial-Intelligence Agency (NGA) in support of the customer's GEOINT mission. The Endpoint Security Engineer will support our Intelligence Community customer's various endpoint security platforms. Positions on TCS require a TS/SCI clearance to be eligible for hire; with the ability to successfully pass a Government polygraph as More ❯
Security Architect Newport, South Wales (4 days onsite/Fridays remote) 6 month contract (strong potential for extension) Rate: Negotiable (DOE) ACTIVE SC Clearance is required About the Role A major defence organisation is seeking a Security Architect (Cyber) to play a key role in shaping, developing, and maintaining secure system architectures across mission-critical MOD programmes. You … ll ensure all solutions align with defence and national security standards, working closely with internal engineering teams, MOD stakeholders, and security authorities to uphold the highest standards of cyber assurance. Key Responsibilities Design and develop secure architectures for MOD platforms, systems, and networks. Align solutions with frameworks such as NIST SP 800-53, ISO 27001, JSP 440, DEF … STAN 05-138, and NCSC guidance. Produce and maintain documentation: Security Architecture Documents, Risk Assessments, and SecurityManagement Plans. Lead and support design reviews and assurance gates. Liaise with MOD, NCSC, and Information Assurance teams to support accreditation and assurance. Collaborate with engineering teams to embed security from concept through to delivery. Keep up to date More ❯
Security Architect Newport, South Wales (4 days onsite/Fridays remote) 6 month contract (strong potential for extension) Rate: Negotiable (DOE) ACTIVE SC Clearance is required About the Role A major defence organisation is seeking a Security Architect (Cyber) to play a key role in shaping, developing, and maintaining secure system architectures across mission-critical MOD programmes. You … ll ensure all solutions align with defence and national security standards, working closely with internal engineering teams, MOD stakeholders, and security authorities to uphold the highest standards of cyber assurance. Key Responsibilities Design and develop secure architectures for MOD platforms, systems, and networks. Align solutions with frameworks such as NIST SP 800-53, ISO 27001, JSP 440, DEF … STAN 05-138, and NCSC guidance. Produce and maintain documentation: Security Architecture Documents, Risk Assessments, and SecurityManagement Plans. Lead and support design reviews and assurance gates. Liaise with MOD, NCSC, and Information Assurance teams to support accreditation and assurance. Collaborate with engineering teams to embed security from concept through to delivery. Keep up to date More ❯
/Laptop/Network Printers Management. Basic AV support for conference room& internal events using MTR (Microsoft Teams Room) Image Deployment VDI technologies Citrix Xendesktop Laptop AV/endpoint securityManagement User Data Management (OneDrive, Office 365) Video conference support for meeting room and events. Vendor coordination for hardware/spare replacement Incident Management, service Request … management, asset Management Support Queue Management to avoid and SLA misses Ability to work independently and in a team environment. Ability to communicate well with internal and external contacts. Provide strong customer service for internal IT teams as well as Business Partners. Work closely with the Server and Networking teams. Performing end to end IMAC activity including … Windows 11, Active Directory, laptops, Printers, Networked copiers, Basic LAN/WAN connectivity, Network cable patching, Hands & feet support to Rack and stack activities AV conferencing. Behaviours Good user management & communication skills Good Understanding of ITIL concept The normal office base will be the Company support Office in London, Tottenham Court Road. You may be required to undertake frequent More ❯
Information System Security Officer (ISSO) 1 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 1 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Location: UK&I Job Title: Security Service Architect, UK&I Reports to: Head of Technical Partner Management Position Overview: We are seeking a skilled Security Service Architect to join our dynamic team at Trend Micro, a leading provider of security software solutions and services. In this role, the successful candidate will work with our strategic partners … to build, develop , and enhance their service and solution portfolio, using the Trend Micro security platform as the foundation to do so. Partner services focus on Managed Security Services as well as IT Operations services for the Trend Micro securitymanagement platform. You will serve as the primary technical liaison, guiding partners in leveraging our technology … to meet their business goals. Key Responsibilities Security Service architecture and development: Design and collaborate on comprehensive service blueprints with partners, strategically leveraging the Trend Micro platform capabilities. Ensure all service designs incorporate critical requirements from security operations, IT operations, and IT Service Management (ITSM) best practices. Define and integrate key performance metrics and propose appropriate Service More ❯
Information System Security Officer (ISSO) 3 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense agencies, such as HQ Air Force, Office of the Secretary of Defense and Military Compartments efforts. The More ❯
Information Systems Security Officer (ISSO) 3 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 3 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position should have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendations to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Thomas & Herbert Consulting LLC Project Manager (PM)Job Description Position Requirement: MUST BE A US CITIZEN MUST PASS A SECURITY ANALYSIS AND BACKGROUND INVESTIGATION WITH DHS MUST HAVE 10 YEARS OF EXPERIENCE WITH PERFORMING THIS ROLE AT THE DEPARTMENT OF HOMELAND SECURITY OR EQUIVALENT FEDERAL GOVERNMENT AGENCY REQUIRED Locations: Washington, DC or other client/contractor facilities in … Federal Financial projects, developing and maintaining detailed program plans, and managing day-to-day project activities. Minimum ten years' experience of in-depth knowledge of financial, procurement, and asset management data and systems in DHS ICE. Minimum ten years' experience in collaborating with other contractors supporting the DHS JPMO and ICE customer Components as well as the SI contractor … ten years' experience Federal accounting concepts and standards, Federal procurement concepts (including the Federal Acquisition Regulations (FAR , Chief Financial Officer (CFO) Act, Government Performance and Results Act (GPRA), Government Management Reform Act (GMRA), Federal Information SecurityManagement Act (FISMA), Treasury Financial Manual (TFM), and relevant Office of Management and Budget (OMB) circulars and bulletins on financial More ❯