design, develop, test, and employ an effects-based simulation toolkit. This is a rare opportunity to create tools to generate viable data for use in analysis to inform national security decisions. You will provide technical advice as well as design and implement Continuous Integration and Continuous Delivery (CI/CD) patterns to enable analytical toolkit modernization to meet customers … a high-performance environment using Agile Software Development processes to support system design, architecture, application development, integration, deployment, and maintenance. Create, develop, and implement solutions to address infrastructure and security requirements. Identify the needs for building automation, designing, and implementing CI/CD solutions. Consult on DevSecOps requirements from diverse applications/lines of customers. Create plug-and-play … code quality checks, and deployment best practices are followed. Monitor and manage logging systems to track performance and troubleshoot issues. Automate repetitive tasks to improve team efficiency. Conduct regular security audits and assist in addressing findings. Maintain documentation of infrastructure, processes, and procedures and ensure knowledge share with the team. Build or maintain CI/CD building blocks and More ❯
Top Skills' Details Active: TS/SCI - with ability to obtain a polygraph Oracle experience, Oracle Exadata experience preferred. Oracle Identity Management (OIM) experience preferred Cloud migration experience Previous ICAM experience a plus. Job Description YSI is seeking a Senior DBA Engineer to join our growing team in support of a high-profile federal customer based in the Washington … will be managing and optimizing performance across both on-prem and cloud-based platforms. This is an exciting opportunity to work on mission-critical systems that directly support national security objectives. • Respond to Tier-3 and 4 service tickets and special projects with senior level engineering • Must have a Top-Secret Clearance with ability to obtain SCI-Poly • Bachelor … infrastructure, application, and DBA teams for successful cloud adoption and modernization efforts. Exadata Skills: • Exadata Architecture: Strong understanding of Exadata components, architecture, and how Exadata optimizes database performance. • Storage Management: Experience with Exadata Storage Server, Smart Scans, and Hybrid Columnar Compression. • Performance Tuning: Expertise in database performance tuning specifically on Exadata. • Backup & Recovery: Experience with Exadata backup and recovery More ❯
Arlington, Virginia, United States Hybrid / WFH Options
CGI
Position Description: CGI Federal has an exciting opportunity for a Linux Systems Administrator within our Intel sector advancing the national security mission through cutting edge technology. You must have a passion for keeping pace with rapidly evolving technology advancements and leveraging your knowledge on a highly collaborative team to deliver state-of-the-art capabilities. The Linux Systems Administrator … manages and maintains an organization's Linux-based servers and infrastructure, ensuring their stability, security, and optimal performance. Key responsibilities include installing and configuring systems, managing user accounts, monitoring system health, implementing security protocols, performing backups and recovery, and automating tasks with scripting languages like Bash or Python. They also troubleshoot issues, apply patches and upgrades, maintain system … model is acceptable. Your future duties and responsibilities: • System Installation and Configuration: Install, configure, and maintain Linux operating systems and applications on physical and virtual servers. • User and Access Management: Create and manage user accounts, groups, and permissions, ensuring access control and security protocols are followed. • System Monitoring: Continuously monitor server performance, resource consumption, and system logs to More ❯
Company Overview: At CenCore Group, we take security solutions from the industry standard to the CenCore standard. CenCore Group specializes in designing, building, securing, and maintaining AI ecosystems at the intersection of big technology and national security. CenCore Group strives to be the trusted and primary source for insight, analysis, and implementation of physical and digital security solutions … of artificial intelligence and machine learning in the NatSec space. We are seeking a qualified Construction Surveillance Technician (CST) for a short-term contract position. With a Top-Secret security clearance or higher to join our dedicated team. Job Summary: The Compliance Program Manager will be responsible for the oversight, development, and implementation of compliance strategies within secure data … data center operations. • Develop and maintain compliance programs aligned with DoD, DNI, and other federal guidelines (NISPOM, ICD 705, CMMC, etc.). • Partner with FSO, ISSM/ISSO, and security teams to manage incident response, access control, and visitor control protocols. • Conduct periodic internal audits, assessments, and risk analyses of classified facility operations. • Collaborate with engineering, IT, and facility More ❯
expertise across the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Senior Information Assurance Analyst will support the Overseas Buildings Operations (OBO) Information System Security Officer (ISSO). The Senior Analyst will act as a subject matter expert (SME) for Federal Assessments & Authorizations (A&A); provides sound advice and recommendations to lower risk and … improve the overall defensive posture. Responsibilities Essential Job Functions: Assist in planning and preparation for security Assessment and Authorization (A&A) as part of the Department's Information Assurance policy and Federal Information SecurityManagement Act (FISMA) implementation efforts Conduct risk assessments, vulnerability assessments, and system audits to identify potential security threats to OBO information systems. … Provide recommendations to mitigate identified risks and ensure compliance with applicable regulations and standards. Provide support for and where necessary to create security documentation for the required phases of the DOS A&A process in support of obtaining Authority to Operate (ATO) approvals of OBO systems Perform Security Impact Analysis (SIA) review of change requests and provide reporting More ❯
Peerless is looking for an Information Systems Security Officer candidate to oversee the information SecurityManagement function within the Air Force Civil Engineering Center (AFCEC), including the development, documentation, implementation, operation, and maintenance of an information Security program, and manages ongoing activities to preserve the availability, integrity, and confidentiality of organization information resources in compliance with … applicable security policies and standards. Safeguards the organization's computers, networks and data against threats, such as Security breaches, computer viruses, or attacks by cyber-criminals, avoiding loss of confidential information, lost revenue, and fines from regulatory agencies for failing to protect data. Manages staff, providing line management, leadership, motivation and strategic direction. communicates regularly with other … managers and brings the organization's information Security risks under explicit management control. Requirements: Familiarity with Meters such as Nexus, Schneider, EMON, Elster A3, and Shark is preferable Familiarity with the AF meter security specifications and DOD guidance with the ability to identify compliant devices as well as the ability to identify configuration options based upon the More ❯
Summary Chenega Corporation is seeking a highly skilled and motivated Information Systems Security Manager (ISSM) to join our team in support of the Naval Sea Systems Command (NAVSEA). As an ISSM, you will play a critical role in ensuring the security and integrity of our information systems, supporting large-scale government operations with cutting-edge technology. This … and implement a comprehensive cybersecurity strategy that aligns with NAVSEA's mission and evolving threat landscape. Lead the identification, assessment, and mitigation of cybersecurity risks, balancing operational needs with security requirements. Establish and maintain security policies, procedures, and standards that meet or exceed DoD and NAVSEA best practices. Ensure adherence to all relevant security regulations, including NIST … RMF, DoD STIGs, and NAVSEA-specific mandates. Promote a strong security culture within the organization, fostering awareness and proactive engagement through training programs. Lead and mentor a team of cybersecurity professionals, fostering a high-performing and collaborative environment. Develop and implement an effective incident response plan, ensuring swift detection, containment, and remediation of security incidents. Establish a robust More ❯
Arlo Solutions is seeking an experienced Insider Threat Information Technology (IT) Portfolio Support Specialist to provide direct support to the Office of the Under Secretary of Defense for Intelligence & Security (OUSD(I&S . This role will play a critical part in advancing enterprise-wide insider threat (InT) IT initiatives, ensuring compliance with Department of Defense (DoD), Intelligence Community … IC), and federal IT security standards, and providing portfolio management support across multiple mission areas. Location: Arlington, VA Clearance: Active TS/SCI Key Responsibilities Enterprise Architecture Development: Collaborate with DoD Components to design and evolve enterprise architecture frameworks that integrate security systems across the DoD Insider Threat enterprise. Contribute to the development and sustainment of hundreds … of DoD InT architecture artifacts. Ensure architecture content is captured, maintained, and stored within OUSD(I&S) knowledge repositories. Knowledge Management & Compliance: Provide knowledge management support for DoD InT business processes and IT system data. Ensure architecture alignment with DoD and IC standards within the Defense Security Enterprise (DSE) mission area. Drive compliance with DoD Chief Information More ❯
This is a contingent opportunity The ISSO is responsible for the administration and management of the Information Security program for Headquarters United States Space Force (HQ USSF) Staff Security Office. Duties: Provide Information Systems Security Officer duties for USSF, to include coordination of software and hardware change/problem resolution, account access, data transfers, scanning, and … copying data to/from external media; Attend required technical and security training (e.g. Operating system, networking, securitymanagement) relative to assigned duties; Maintain compliance for designated HQSF locations throughout HQSF Area of Responsibility (AOR) IAW AF, DoD and IC guidance; Conduct annual Cyber Assurance self-assessments and program reviews for all assigned SCI and/or … years experience in cybersecurity and Network Infrastructure Working knowledge if Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include Communication Security (COMSEC) integration Working-level knowledge of applicable security policy manuals, DCIDs, JAFANs, and other policy documents. Certification: Security+ is required Clearance: Active TS/SCI clearance Benefits : K2 Group's More ❯
for smart meters is transforming Britains energy system and helping the countrys fight against climate change: we want you to be part of our journey. The role: The Information Security Assurance Manager is a hands-on, multi-disciplinary role combining project assurance, governance, risk management, and compliance. You will work across business units, projects, and suppliers to ensure … security is embedded in everything we dofrom design to delivery. You will also support the development and maintenance of our Information SecurityManagement System (ISMS), lead internal audits, and provide expert guidance on risk mitigation and regulatory compliance. Key Responsibilities: Security Assurance & Project Engagement Provide end-to-end security assurance across the Licence Renewal programme … Attend programme meetings to represent Information Security and provide expert guidance. Review technical documentation (e.g., designs, network diagrams, data flows) to ensure alignment with security policies and architecture. Conduct Information Security Impact Assessments and Data Protection Impact Assessments. Support penetration testing and vulnerability assessments, tracking remediation to closure or handover to BAU. Translate technical risks into business More ❯
Zachary Piper Solutions is seeking a Senior Network Engineer responsible for providing networking support to various aspects of nuclear security, including stockpile management, nonproliferation, and nuclear security under the DOE. This position is fully onsite in Washington, DC Must have active Top Secret clearance or Q clearance Responsibilities: • Install, configure, maintain, and optimize LAN and WAN infrastructure … including routers, switches, VPN appliances, load balancers, and security devices. • Ensure timely application of security patches to all network infrastructure devices, including routers, switches, voice and video systems, and security appliances. • Monitor and analyze network performance using network management tools, troubleshooting network issues, and optimizing performance based on industry best practices. • Maintain an up-to-date … optimizations. • Demonstrate expertise in routing, switching, and firewall configuration, supporting complex and secure LAN/WAN networks. • Understand and support Linux/Unix and Windows operating systems, including system securitymanagement, to ensure smooth integration with network services. • Submit detailed and accurate reports on network performance, incidents, upgrades, and infrastructure status as required. • Act as the primary point More ❯
Barbaricum is a rapidly growing government contractor providing leading-edge support to federal customers, with a particular focus on Defense and National Security mission sets. We leverage more than 17 years of support to stakeholders across the federal government, with established and growing capabilities across Intelligence, Analytics, Engineering, Mission Support, and Communications disciplines. Founded in 2008, our mission is … focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is seeking an Information System Security Manager (ISSM) to guide the delivery of secure systems within the Navy's Risk Management Framework (RMF). This role provides cybersecurity oversight and lifecycle documentation support to … and submit RMF and DIACAP risk assessment packages Ensure systems and solutions meet DoD cybersecurity policy and accreditation requirements Track system compliance status and coordinate with stakeholders to mitigate security gaps Maintain configuration management of security baselines and assess impacts of change Guide teams through cybersecurity audits and implement corrective action plans as needed Maintain continuing education More ❯
professional growth. Find your future with us. Boeing's Missile Defense Program is seeking motivated and talented Associate (Level 2), Mid Level (Level 3 ) or Senior (Level 4) Product Security Engineers in Colorado Springs, Colorado! These positions will support the performance of product security and cybersecurity engineering for the National Team Command, Control, Battle Management and Communications … As patching can be an impacting activity, a detailed oriented individual is a must for this position. Developing and verifying installation instructions for Cyber Tools and Vendor Patches Applying Security Technical Implementation Guides (STIGs) Managing and addressing any Cyber Tasking Orders (CTOs) related to the Cyber Tools Integrating, configuring and automating the installation of the Elastic Stack with the … ACAS, ArcSight, BigFix, Delinea, Endgame, ESS, Axway Repeater, and Responder for Windows MFA in National Team (NT) labs, the C2BMC Testbed (CTB), and Operations. Collaborating with local Information System Security Officers (ISSOs) to ensure compliance with relevant cybersecurity standards and regulations Assess organization-wide security and privacy risk and update assessment results on an ongoing basis Perform system More ❯
offer for this position is contingent upon contract award. In this role, working under only general directions, you'll contribute to enhancing the Information Assurance (IA) posture through: IA Management Federal Information SecurityManagement Act (FISMA) coordination and reporting Risk Management Framework (RMF) application IA compliance measurements and metrics Assessment and Authorization (A&A) Vulnerability Management … risk posture as part of Authority to Operate (ATO) RMF process Supporting/managing/tracking customer sponsored assets' plan of action and milestones (POAMs) by working with various security stakeholders (ISSO/ISSE/ISSM/SCA) post authorization Screening new asset requests to ensure sponsorship and information system owner identification Facilitation support to the System Review Team … existing customer sponsored assets have the correct project regulation, data type/C-I-A impact assignments, and overlay assignments as well (with customer signoff) Understanding of assigning asset security controls and levy asset specific liens on controls for which the program did not meet during accreditor reviews Ensure customer sponsored assets maintain their security postures in accordance More ❯
have made the commitment to grow and sustain our company for the next 100 years! Come grow with us! Torch Technologies is seeking a reliable and responsive Alarm Response Security Officer to provide after-hours security coverage for two government facilities in Colorado Springs, CO. This role ensures compliance with government and company security policies by responding … promptly to alarms and administering routine physical and administrative security measures during nonbusiness hours. As an Alarm Response Security Officer your duties will include the following, but are not limited to: Provide alarm response coverage 365 days/year during nonbusiness hours on rotating schedule (5:00 PM-7:00 AM weekdays, and 24/7 on weekends … ensure they are secure Observe departing personnel to guard against unauthorized removal of property Monitor and respond to intrusion detection systems (IDS) and follow site-specific protocols for SCIF security Administer aspects of physical and administrative security programs, including access control, document protection, and handling clearance requirements Maintain detailed security reports and records; report irregularities and securityMore ❯
Clearance - TS/SCI with CI Poly Security Clearance Requirement: Active TS/SCI with Favorable Polygraph Required U.S. Citizenship Required Overview: We are seeking a highly motivated and experienced Physical Technical Security Officer to oversee all physical and technical security operations at Zeta's Fairfax facilities. This role ensures full compliance with Intelligence Community (IC) and … Department of Defense (DoD) directives and will provide support to the Security Team on specialized projects. Key Responsibilities: Ensure Zeta facilities meet ICD 705, TEMPEST, and related security construction requirements Interpret and implement technical/admin security requirements throughout facility construction and modifications Serve as Construction Security Manager (CSM) and review required documentation for ICD … compliance (e.g., CSP, FFC, TEMPEST checklists) Monitor construction progress, equipment installation, accreditation documentation, and review schedules Conduct architectural drawing reviews to ensure as-built facility accuracy and security compliance Organize and coordinate PTCO and AO reviews, testing, and formal inspections Support periodic self-inspections and customer compliance audits Maintain accurate records of facility accreditations, co-use/joint-use More ❯
responsible for maintaining several systems, and networks that provide the infrastructure platforms for cybersecurity capabilities and data. This team is accountable for system administration, identity and authentication, information system security accreditation, data storage and backup, physical infrastructure maintenance, and automation development. ACTIVITIES & RESPONSIBILITIES Maintaining and securing Windows-based infrastructure for cybersecurity operations Supporting identity and access management (IAM … across a secure enterprise Configuring and maintaining virtualized environments using VMware Managing server lifecycle from provisioning through decommissioning Participating in system hardening and vulnerability mitigation efforts Supporting infrastructure during security audits and reviews Applying security patches and upgrades to reduce attack surface Collaborating with cyber teams to implement secure configurations and system baselines Monitoring system performance and conducting … incidents Working closely with government clients to ensure systems meet mission and compliance goals SKILLS Infrastructure & System Administration Windows Server administration (installation, configuration, patching, performance tuning) Active Directory (AD) management, including GPOs, OU structuring, DNS, and user access control VMware vSphere 7 virtualization setup, management, and troubleshooting Experience with SAN/NAS storage solutions, preferably Dell hardware Backup More ❯
Hereford, Herefordshire, England, United Kingdom Hybrid / WFH Options
DCS Recruitment
Information Security Analyst Up to £50,000 + benefits Hereford | Hybrid Permanent | Full-time We are looking for an experienced Information Security Analyst to join our client who will play a key role in driving compliance, governance, and continual improvement across key security frameworks including ISO 27001, PCI DSS, and Cyber Essentials Plus. Key Responsibilities: * Lead on … the operation and continual improvement of the Information SecurityManagement System (ISMS) * Coordinate internal and external audit readiness for ISO 27001, PCI DSS, and Cyber Essentials Plus * Draft and update information security policies, procedures, and technical standards * Work with procurement and commercial teams to support supplier assurance and risk assessment * Contribute to tender responses and bid processes … ensuring security and compliance requirements are met * Promote good security practices and raise awareness across departments * Act as an escalation point and day-to-day contact for other team members * Stay up to date with changes in legislation and standards relating to information and cyber security Key Skills & Experience: Essential: * Background in IT, Cyber Security, Information More ❯
Perform necessary system administration functions to support teams and applications Implement and maintain an integrated software development environment, servers, and workstations Responsible for overall day-to-day operations, system security and availability Perform upgrades and maintenance in the toolset The selected candidate should thrive in a fast-paced work environment with high expectations, significantly diverse assignments, and collaborative/… start Ability and willingness to travel up to 10% to support business needs. Applicants must have U.S. Citizenship, and a current active in-scope U.S. Government DoD issued Secret security clearance at the time of application; which is required to start. Preferred Qualifications: Demonstrated experience with RHEL 9 Demonstrated experience deploying the complete DevSecOps lifecycle including integration of build … pipelines, automated deployments, and compliance scanning using test driven development. Experience with vulnerability remediation and securitymanagement (system hardening, log management, configuration management (i.e., Nessus, McAfee, WSUS, Splunk, ACAS, SCAP, HBSS, etc. Experience with Virtualization (i.e., VMware, Horizon, vSphere, vCenter, vSAN) Experience with Risk Management Framework (RMF) Requirements and Security Technical Implementation Guide (STIG More ❯
Perform necessary system administration functions to support teams and applications Implement and maintain an integrated software development environment, servers, and workstations Responsible for overall day-to-day operations, system security and availability Perform upgrades and maintenance in the toolset The selected candidate should thrive in a fast-paced work environment with high expectations, significantly diverse assignments, and collaborative/… start Ability and willingness to travel up to 10% to support business needs. Applicants must have U.S. Citizenship, and a current active in-scope U.S. Government DoD issued Secret security clearance at the time of application; which is required to start. Preferred Qualifications: Demonstrated experience with RHEL 9 Demonstrated experience deploying the complete DevSecOps lifecycle including integration of build … pipelines, automated deployments, and compliance scanning using test driven development. Experience with vulnerability remediation and securitymanagement (system hardening, log management, configuration management (i.e., Nessus, McAfee, WSUS, Splunk, ACAS, SCAP, HBSS, etc. Experience with Virtualization (i.e., VMware, Horizon, vSphere, vCenter, vSAN) Experience with Risk Management Framework (RMF) Requirements and Security Technical Implementation Guide (STIG More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM2-001-SD Job Summary: The Information System Security Manager II will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO-C4I. The support … will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service Risk Management, Integrated Logistics Support, Technical Oversight of commercial/non-governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and metrics. Responsibilities: Oversee and manage … information security program implementation within the organization or other area of responsibility. Manage strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources. Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Requirements: Must More ❯
Who is Saliense? Saliense is a growing Management and Technology Consulting Solutions provider based out of Mclean, VA. We work to solve our client's toughest challenges within the Defense, Civilian, Financial, and Healthcare industries. Our diverse employees support vital missions for government and commercial customers. For more information, visit . Why Saliense? In addition to providing a fun … privacy operations, increase efficiency, and enhance data reporting accuracy. You'll work closely with the agency Office of the Chief Information Officer (OCIO), the Office of the Chief Information Security Officer (OCISO), and other key stakeholders to analyze, design, and implement automated solutions that reduce manual tasks and improve overall processes. Responsibilities As a Cybersecurity AI/Automation SME … tools. Support the collection of stakeholder feedback, conduct backlog grooming, and continuously improve automation solutions to ensure they remain effective and aligned with organizational objectives. Support the deployment and management of containerized applications using Docker and Kubernetes while adhering to information security principles and Role-Based Access Control (RBAC) policies. Implement continuous monitoring and auditing tools to ensure More ❯
reports. Reviews and evaluates system performance against cybersecurity related specification requirements, monitors and assesses field performance, and assesses risk of meeting user and specification requirements. Prepares and evaluates cybersecurity security strategies for requested programs. Extensive experience in operational Cyber Security accreditation and certification of embedded systems accredited at Secret level and below. Extensive understanding of AR … and the DoD Risk Management Framework (RMF) to include actually current experience (less than 2 years old) in obtaining system accreditation using the DoD RMF and the Enterprise Mission Assurance Support Service (eMASS) software. Extensive experience preparing recommended IA approval and supporting information documentation and understand systems engineering processes and possesses extensive experience in Network Security Architect experience. … Extensive understanding of the DoD standards guiding the development of cybersecurity policy, requirements, integration, engineering, and certification and accreditation. Perform security, analyses and risk/vulnerability assessments. Execute day to day certification and accreditation activities for a project team. Level III: Possesses and applies a comprehensive knowledge across key tasks and high impact assignments and plans and leads major More ❯
GPS). This role is part of our Cybersecurity - Strategy, Risk, Compliance & Resiliency ("SRC&R") team within our Service Delivery Center. This team assists our clients with aligning a securitymanagement strategy with their business goals by assessing, designing, training, implementing and operating cybersecurity processes and solutions. This function is supported by our strategic alliances with third-party … framework and industry frameworks Operate SRC&R solutions based upon engagement defined policies and procedures Cybersecurity measurements and monitoring development and operations Cybersecurity strategy and roadmap development NIST Risk Management Framework and Assessment and Authorization enhancement, operations and governance Cybersecurity focused Supply Chain Risk Management and/or Third-Party Risk management operations, assessment and enablement Cybersecurity … site engagement team through written correspondence and verbal presentations. Stay informed of current Cybersecurity industry trends relevant to the services being deliveredSkills and attributes for Success Working knowledge of security frameworks and standards such as ISO 27001/2, PCI DSS, NIST 800-53, NIST CSF and the cybersecurity laws and regulations such as FISMA Ability to produce high More ❯
Overview Company Overview: Allied Universal , North America's leading security and facility services company, offers rewarding careers that provide you a sense of purpose. While working in a dynamic, welcoming, and collaborative workplace, you will be part of a team that contributes to a culture that positively impacts the communities and customers we serve. We offer a comprehensive benefits … retirement plan, employee assistance programs, company discounts, and other perks, depending on the position and eligibility. Job Description: Job Description Allied Universal is hiring an Federal Protective Services Armed Security Officer. TheFederal Protective Services Armed Security Officeprovides armed protective services in accordance with Allied Universal standards for a high profile customer. Duties include armed patrols, access control, CCTV … and alarm monitoring, incident reporting, and customer service. The Armed Security Officer will help ensure the safety of customer personnel, visitors, and property by deterring threats, enforcing procedures, and responding to emergencies with professionalism and strict adherence to security protocols. This is a part time opening Must have 3 recent years of armed military, law enforcement or armed More ❯