skilled Systems Engineer to design, develop, implement, and maintain innovative hardware and software solutions for our clients. You will leverage your understanding of business needs, technology trends, and project management best practices to deliver high-quality solutions that meet budget, schedule, and performance requirements. Responsibilities: Analyze and translate complex system requirements into technical specifications. Design, develop, and implement hardware … efficiency. Document system design, development, and deployment processes. Stay up-to-date with the latest technology trends and advancements. May support additional IT initiatives, such as security assessments and vulnerability management. Preferred Skills: Strong problem-solving and analytical skills. Excellent communication and collaboration skills. Ability to work independently and as part of a team. Passion for technology and continuous … learning. Experience with project management methodologies (Agile, Waterfall). Experience with various programming languages and technologies. Experience with hardware and software design principles. Strong written and verbal communication skills. Ability to prioritize tasks and manage time effectively. Basic Qualifications: Active TS/SCI with poly clearance is required. Bachelor's degree in Computer Science, Information Systems, Engineering, or related More ❯
customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview About The Role Provide services to establish enterprise operations, event monitoring and management, performance monitoring, and analysis services. Provide centralized operations, monitoring, reporting, management, and analysis of enterprise applications, systems, and core services as well as infrastructure assets to include file … years of experience may be considered in lieu of degree. Prior experience leading people, projects, or teams Understanding of classified IT system architectures and multi-site connections Experience with management of IT systems including storage, servers, networking devices Experience leading and managing IT requirements and executing project management schedules through completion Demonstrated ability to work seamlessly across organization … as well as program coordination and adoptionDesired Skills Experience with leading an Agile team and/or understanding of Agile principles Understanding of IT Operations tools and capabilities. (Network Management Systems, ITSM Suites, Service Monitoring Tools) Highly motivated and able to prioritize and integrate multiple projects Strong understanding of information security trends and current industry focus areas, Technical experience More ❯
customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview About The Role Provide services to establish enterprise operations, event monitoring and management, performance monitoring, and analysis services. Provide centralized operations, monitoring, reporting, management, and analysis of enterprise applications, systems, and core services as well as infrastructure assets to include file … years of experience may be considered in lieu of degree. Prior experience leading people, projects, or teams Understanding of classified IT system architectures and multi-site connections Experience with management of IT systems including storage, servers, networking devices Experience leading and managing IT requirements and executing project management schedules through completion Demonstrated ability to work seamlessly across organization … as well as program coordination and adoptionDesired Skills Experience with leading an Agile team and/or understanding of Agile principles Understanding of IT Operations tools and capabilities. (Network Management Systems, ITSM Suites, Service Monitoring Tools) Highly motivated and able to prioritize and integrate multiple projects Strong understanding of information security trends and current industry focus areas, Technical experience More ❯
Cyber System Security Engineering activities supporting all phases of systems development in the areas of Cybersecurity/Systems Security Engineering, and Assessment and Authorization (A&A) as per Risk Management Framework (RMF) for later determined program. Specific job responsibilities include but are not limited to the following: Support system security requirements, architecture, design, development, evaluation, certification, and accreditation. Work … with Product Teams in support of secure operating systems, applications, networks, hardware, databases, etc. Conduct scheduled maintenance i.e., patch management. Perform vulnerability scans and mitigate findings. Implement Security Technical Implementation Guides (STIGs) Work on multiple simultaneous tasks. Apply risk management concepts to mitigate vulnerabilities in security architectures. Preparation of ATO artifacts to include baselines, SOP, SSP, RAR, and … i.e., password resets, responding to helpdesk tickets, etc. Basic Qualifications: Current DoD Secret Security Clearance Current DoD 8570 IAT Level II Certification (i.e., Security+, etc.) Working knowledge of Risk Management Framework in a Defense and Counterintelligence Security Agency (DCSA) accredited environment. Ability to work towards obtaining and maintaining ATOs Experience with implementing STIGs and tracking non-compliance on Plan More ❯
Horsforth, Leeds, West Yorkshire, England, United Kingdom
TPP (The Phoenix Partnership)
The role involves: • Managing, maintaining and upgrading enterprise server and storage hardware• Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android)• Vulnerabilitymanagement using scanning tools such as Nessus • Remediation/automation of software rollout using Ninite/PDQ • Configuring and monitoring of Anti-virus software & Mobile Device Management• Firewall/Switch management - Configuration, patching and upgrading• Administering Microsoft Active Directory, Exchange Server & Office 365 • Achieving recognised Cyber Security accreditation• Management of video conferencing • Management of enterprise level phone system• Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting• Continuously improving and keeping up More ❯
vendors and government engineering staff for installation, upgrade, configuration, administration, automation and optimization of the Storage and Backup infrastructure • Develop and maintains storage, backup, and capacity event, performance, and management monitoring plan and provides documentation and training for Technical Assistance Center troubleshooting and event/incident response • Ensure system security in compliance with DOD/USMC/HCS policy … including patching and auditing. • Automate the environment including routine management checks, reporting, event notifications and actions, software updates and service packs. • Plan for capacity including monitoring anticipating expansion or contraction requirements and submitting recommended solutions via customer processes • Support 24x7x365 operations including on-call duties and occasional night and weekend patching or implementation requirements. Qualifications Basic Qualifications: • Bachelors degree … cloud datacenter: o Cohesity hybrid-cloud backup solutions o QStar Archiving solutions o Dell Unity Storage o NetApp SAN and NAS o Cisco MDS and Brocade Fibre Channel Switch management and zoning o VMWare NSX-T vSAN & virtualization o vRealize Operations Monitoring • Experience designing, engineering, operating backup and storage solutions in an enterprise datacenter environment including troubleshooting and DOD More ❯
Stevenage, Hertfordshire, England, United Kingdom Hybrid / WFH Options
MBDA
Stevenage An exciting opportunity for a passionate Service Operations Manager to join a unique, multi-national Information Management function. Ideal candidates should be committed to the future of IT Operations, outstanding customer service and have the dedication in supporting our community in a dynamic, fast-paced environment. Job Title : Service Operations Manager Salary : Circa £70000 depending on experience Location … the role include leading the continuous delivery of workplace & infrastructure technical operations ensuring effective, reliable and performant operations meeting our evolving business needs. You will oversee and drive forward vulnerabilitymanagement across our workplace and infrastructure ensuring proactive risk mitigation, compliance with security standards and continuous improvement to safeguard MBDA operations. Become part of a unique, well respected … under pressure, with the ability to quickly resolve escalated issues & problems. Very Good experience of workplace & infrastructure technology & services including compliance, improvement & innovation. Proven leadership and hands on team management skills across diverse disciplines, international teams and including those in supplier partnerships Strong knowledge of data centre/computer room management including capacity, service, incident & asset managementMore ❯
knowledge in: Security standards and frameworks (MoD and HMG experiences helpful) Cloud-based cyber security principles and architecture points Boundary controls, network segmentation and access control Identity and Access Management (including RBAC and A/PBAC, permissions management), ZTA Cryptographic techniques and implementations IT asset management and tracking VulnerabilityManagement and Patching SIEM principles, products More ❯
on Windows Administrator technology and market capabilities/trends. Manage objects stored in Active Directory as delegated by Active Directory administrators. Perform Active Directory user account, and member server management tasks in assigned OUs. Provide daily administration of the Windows based Virtual Machines and AECC services. Harden the Windows based services per commercial best practices and the required government … skills. Strong troubleshooting skills across the entire technology stack - network, storage, server, and applications. Desired Skills: Working knowledge of DoD Security Technical Implementation Guides (STIG) and the Information Assurance VulnerabilityManagement (IAVM) process. Required Certifications: Security+ or equivalent DoD 8570.01-M IA Tech Level II certification Must have (or obtain within 6 months of hire) Windows administrator related More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and Patching • SIEM principles, products and More ❯
knowledge in: • Security standards and frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and Patching • SIEM principles, products and More ❯
of Implementation About the Role As an Implementation Engineer - Apprentice , you are instrumental in delivering Nucleus products in the post sales cycle. This technical role is responsible for deploying vulnerabilitymanagement solutions to our rapidly growing customer base. The Nucleus Implementation team is staffed with security architects with software development experience who can manage customer stakeholders to drive … to enhance our post-sales motion Understand how integrations work end to end to be able to clearly articulate complex problems and solutions to less technical stakeholders Design vuln management solution architecture for different asset classes and environment sizes Manage containerization and modern cloud infrastructure What We're Looking For Required: Resident in Northern Ireland Right to work in … with PHP and Python is a plus. Experience of cybersecurity concepts (attack vectors, kill chain) Experience of compliance understanding (NIST, ISO, custom policies) Customer/stakeholder engagement (technical project management, consulting) Why Join Us? Nucleus is a fast-growing startup where we recognize and reward performance and encourage sustainable working hours. Nucleus believes "work is people", and when our More ❯
incidents. Perfect for someone who enjoys being in sole contributor and operating strategically and tactically. We're looking for candidates with experience in: Managing global security incidents at scale Vulnerabilitymanagement and remediation programs Frameworks like NIST and MITRE ATT&CK Cloud security (Azure preferred) Reporting and communicating with both technical teams and senior stakeholders Comfortable working closely More ❯
The role involves: Managing, maintaining and upgrading enterprise server and storage hardware Providing internal support for office hardware including, PCs, laptops, mobile devices (Windows OS, iOS, MacOS and Android) Vulnerabilitymanagement using scanning tools such as Nessus Remediation/automation of software rollout using Ninite/PDQ Configuring and monitoring of Anti-virus software & Mobile Device Management Firewall/Switch management - Configuration, patching and upgrading Administering Microsoft Active Directory, Exchange Server & Office 365 Achieving recognised Cyber Security accreditation Management of video conferencing Management of enterprise level phone system Monitoring and managing the availability and scalability of resources, including CPU usage, disk usage and storage systems including network troubleshooting Continuously improving and keeping up More ❯
threats and product updates Share your knowledge through internal and external workshops Help customers adopt best practices and secure-by-design principles Work with SCCM, Intune, and other endpoint management tools Integrate Defender with SIEM and other security platforms Who you are You're a curious, proactive security professional who loves to learn and share knowledge. You're technically … also a great communicator-able to explain complex topics to both IT teams and business stakeholders. You bring: Experience with Microsoft Defender (for Endpoint, Office 365, Identity, Cloud Apps, VulnerabilityManagement) Knowledge of Microsoft Sentinel and SIEM tools Familiarity with SCCM, Intune, and endpoint security baselining A mindset for automation, optimization, and continuous improvement Strong communication and collaboration More ❯
solutions Support ongoing improvements to internal security defenses Oversee security policies and procedures Assist with data protection initiatives Participate in security projects Develop disaster recovery plans Establish and improve vulnerabilitymanagement processes Requirements Experience in a Cyber Analyst or Cyber Engineer role Knowledge of SIEM and EDR tools Experience with network audits and penetration testing Infrastructure support experience More ❯
ensuring the highest standards of performance, scalability and security are maintained. A research infrastructure technical expert with deep understanding of high-performance compute (HPC) and research data storage and management, the postholder will be responsible for specifying, deploying and maintaining related services. These services are research-driven and the postholder will establish close collaborative relationships with PIs to understand … Information Services/IT Services to ensure the security and resilience of RCaaS research computing infrastructure services underpinned by the development of a suitable quality assurance approach including sufficient management processes and audit controls. 5. Establish and maintain metrics and produce concise reporting that demonstrates performance and utilisation of RCaaS research computing infrastructure services, working with relevant University finance … PIs, research managers and College and University IT professionals to identify complex research computing infrastructure requirements and ensure needs are reflected in plans and implemented services. 11. Provide line management for RCaaS research computing infrastructure staff including responsibility for performance and development, managing workload and recruiting staff where necessary. 12. Perform such other duties, appropriate to the grade, as More ❯
Gloucester, Gloucestershire, England, United Kingdom Hybrid / WFH Options
IMT Resourcing Solutions
reviews What they’re looking for: Strong understanding of Microsoft technologies – Azure, Defender, Intune, Entra ID Experience working in large-scale or regulated environments Familiarity with SIEM, endpoint protection, vulnerabilitymanagement A practical, collaborative approach to security What's on offer? Paying up to £49,500 per annum Enhanced pension up to 20% Hybrid working 1 day per More ❯
and compliance status About You 3-5 years of experience in cyber security roles, with hands-on involvement in implementing frameworks like NIST, eCAF, or ISO27001 Experience in SIEM, VulnerabilityManagement, Threat Intelligence, and IAM tools Background in supporting enterprise-level security initiatives aligned with regulatory or certification standards If you're interested in hearing more about the More ❯
engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Establishes and implements system security designs; additionally, you will assess and mitigate system security threats and risks throughout the program life cycle. Validates system security requirements definition and … workplace without requiring prompting from supervisors. Support MDT with other duties as assigned. Travel: 10% In addition to technical skills, you will be a self-starter with strong time management skills. Your organizational skills and ability to anticipate future challenges will serve you well. Basic Qualifications: Must be a US Citizen with an active DoD Secret Clearance with an … years ofexperience with any of the following: operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management). Minimum 3 years in researching, interpreting, and developing mitigations for threats and vulnerabilities. Minimum 3 years in showing the ability to communicate effectively and clearly present technical approaches More ❯
with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform offers bug bounty, vulnerability disclosure, pentesting, AI red teaming, and code security. We are trusted by industry leaders like Amazon, Anthropic General Motors, GitHub, Goldman Sachs, Uber, and the U.S. Department of Defense. … capabilities into the hands of customers. Rapid prototyping of new capabilities leveraging AI to accelerate the customer discovery and validation process. Develop and apply expertise in security analytics and vulnerabilitymanagement to create product experiences that customers and security researchers love in collaboration with engineers, designers, and CSMs. Advocate for the value of HackerOne's AI capabilities internally … AI and ML, and competitive developments to identify opportunities for disruptive innovation and position HackerOne as a market leader. Minimum Qualifications 8 or more years of experience in Product Management in high-growth tech/SaaS companies. Proven track record of successfully developing products in high-growth businesses involving in-depth cross-functional collaboration and leadership across R&D More ❯
on Windows Administrator technology and market capabilities/trends. -Manage objects stored in Active Directory as delegated by Active Directory administrators. -Perform Active Directory user account, and member server management tasks in assigned OUs. -Provide daily administration of the Windows based Virtual Machines and AECC services. -Harden the Windows based services per commercial best practices and the required government … skills. -Strong troubleshooting skills across the entire technology stack - network, storage, server, and applications. Desired Skills: -Working knowledge of DoD Security Technical Implementation Guides (STIG) and the Information Assurance VulnerabilityManagement (IAVM) process. Pay Range $80,000 to More ❯
Mc Lean, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
and support; consistently deliver quality client services Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes Assist engagement teams in evaluating client vulnerabilitymanagement programs across people, process and technology Improve business processes and cybersecurity response methodologies Assist in the project management of cybersecurity projects, including development of project charters … project plans and status updates Qualifications Bachelor's Degree in Computer Science or in a related technical field Experience administering and installing one of the following tools: Identity & Access Management technologies, Active Directory (ADFS), Azure, SAML, SSO, Zscaler, RSA SecurID Experience scripting/developing one of the following: Powershell, Bash, Python, C#, Visual Basic Knowledge of the current security … environment and industry trends to identify engagement and client service issues; communicate this information to the engagement team and client management through written correspondence and verbal presentations Knowledge of federal clients, including some of the following: branches of the military, defense agencies, intelligence community, civil agencies, federal health agencies or federal international agencies Prior consulting experience Ability to obtain More ❯