Springfield, Virginia, United States Hybrid / WFH Options
Lockheed Martin
be able to fully utilize modern HPC systems. We are seeking a senior level Systems Engineer/Administrator Staff with Linux and Software Configuration Management experience to support our program at the Springfield, VA location. The successful candidate will have experience supporting Linux based users on a Multi-Level … Security network. Including configuration management, build automation and release engineering. This is a Systems Administrator role that manages Linux server infrastructure in support of the program. The role includes solving end-user computer system problems and improving performance on Linux Red Hat platforms/operating systems. Candidate needs experience … with tools listed below and will be supporting the software configuration management (SCM) processes. The Systems Engineer Staff/Systems Administrator assists with resolving technical issues with applications, network connectivity and ensures security compliance of deployed systems. Basic Qualifications: • Candidate must have Security + certification • Active TS/SCI More ❯
and hardware models. Backup & Redundancy: Maintain strategies to ensure data security and system reliability. Metrics & Reporting: Prepare detailed reports and metrics for management. Lifecycle Management: Oversee hardware and software lifecycles. Project Planning: Participate in project planning and manage incidents as they arise. Skills & Knowledge Server Management: Expertise in … Python, or Power Automate. Operating Systems: Advanced skills in Linux and Windows administration. Storage Systems: Expertise in Storage Area Networks (SAN) and storage array management (e.g., Hitachi, NetApp). Cloud Platforms: Experience with Azure, Intune, and Entra. Networking: Strong understanding of core network services (e.g., Active Directory, DNS, DHCP … . Security: Proven knowledge of server and network security best practices. Disaster Recovery: Familiarity with disaster recovery and business continuity planning. Database Management: Experience with Oracle and SQL databases. Virtualization & Containers: Proficiency in VMware and Hyper-V environments. IdentityManagement: Advanced knowledge of Active Directory, Azure AD More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
CACI
administering Active Directory environments. In-depth knowledge of AD DS, DNS, DHCP, and Group Policy. Strong understanding of AD security best practices. Experience in identity federation, MFA, and SSO technologies, such as SAML, OAuth, ADFS, OCSP, multifactor authentication, and PKI/Smart cards. Expertise with Microsoft AD, Azure AD … in a DOD, high-security environment. Microsoft Certified: Windows Server MCSE or equivalent certification. Strong understanding of Microsoft 365 (M365) and Azure platforms, including identitymanagement, authentication mechanisms, and security controls. Familiarity with NIST and DoD security standards. Knowledge of PowerShell scripting for AD management. Experience with hybrid More ❯
Implement and enforce IT Standard Operating Procedures (SOPs) Provide IT support, onboarding, and troubleshooting for employees Manage vendor relationships and contracts Oversee IT asset management, including software and hardware tracking Security & Compliance Develop and implement security policies; monitor threats and respond to incidents Maintain cybersecurity best practices, including endpoint … workflows Ensure compliance with legal, regulatory, and industry standards Manage user identities and implement Single Sign-On (SSO) integrations Infrastructure & Support Oversee mobile device management and OS updates Lead business continuity and disaster recovery planning Maintain IT documentation and support change management processes Support video production workflows, including … secure file management and archiving Web Hosting & Cloud Services Manage AWS services (EC2, S3, RDS, IAM) Optimize website uptime, performance, and hosting setup Monitor and manage DNS, SSL certificates, and website security Growth & Innovation Stay current with emerging tech and recommend improvements Lead or contribute to IT projects Conduct More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
DataCareers
GPO) Active Directory : Multiple forests and domains MS SQL : Basic troubleshooting Office 365 : Setup and configuration to best practices Cloud Platforms : Microsoft Azure (IaaS, Identitymanagement), AWS Virtualization : VMware, Hyper-V SAN and Clustering : Dell, HP SANs, Windows NLB System Center : SCOM, SCCM, DPM, SCVMM Backup Technologies : Veeam … DPM, Commvault Infrastructure as Code : Terraform, Bicep Firewall Management : Fortigate, Draytech, Sophos Scripting : Automation using PowerShell Compliance and Security Frameworks : Familiarity with various standards What We Offer: An engaging role with varied customers. Opportunities to work on innovative technology and development projects. Comprehensive benefits package including training and certifications. More ❯
are secured by configuring appropriate policies, scanning for vulnerabilities, and managing runtime security. Cloud Security: Design, implement, and manage security across Azure, focusing on identitymanagement, data protection, and network security. Vulnerability Management: Identify and prioritize vulnerabilities across infrastructure and applications, and collaborate with teams to remediate … Azure Defender, Azure Monitor, and Azure Policy. Experience with security and compliance scanning tools such as vulnerability scanners, intrusion detection systems, & security information & event management (SIEM) solutions. Knowledge of container management with Azure Container Registry. Experience in SAST, DAST & other techniques to improve code security Desirable: Proficiency in More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Graphnet Health
As this is a lead role, communication skills are critical, including the ability to translate complex paradigms into easy-to-understand pieces and stakeholder management for technical change. Working within the architecture team and alongside engineering teams, your workload would include (but is not limited to): Design and document … work under pressure. Have a desire to keep up with the latest tools and techniques. A deep understanding of Azure components. Key areas: API Management Azure SQL and MI Functions Networking Data Factory Databricks IdentityManagement (Entra) Proven experience with pipeline creation/management, specifically in More ❯
audit, testing controls, and supporting the design and implementation of new controls to mitigate emerging risks. This role will require strong networking and relationship management skills to collaborate with the various ECS teams including Application & Infrastructure Security, Workforce & IdentityManagement, External & Vendor Defense, Threat Detection and Response … Team You will report to the Technology Risk leader and manage a small team of technology risk associates. The Technology Risk team oversees the management of controls and the mitigation of risk related to the technology environment, systems, and processes across the enterprise. Technology Risk is part of the … years’ experience in information technology risk, cyber security, controls or audit roles Experience in fraud risk frameworks a plus Prior experience in team management and leadership is preferred Bachelor’s Degree in Computer Science, Technology, or a related field of study preferred Professional technology and associated risk certifications (CISSP More ❯
audit, testing controls, and supporting the design and implementation of new controls to mitigate emerging risks. This role will require strong networking and relationship management skills to collaborate with the various ECS teams including Application & Infrastructure Security, Workforce & IdentityManagement, External & Vendor Defense, Threat Detection and Response … Team You will report to the Technology Risk leader and manage a small team of technology risk associates. The Technology Risk team oversees the management of controls and the mitigation of risk related to the technology environment, systems, and processes across the enterprise. Technology Risk is part of the … years’ experience in information technology risk, cyber security, controls or audit roles Experience in fraud risk frameworks a plus Prior experience in team management and leadership is preferred Bachelor’s Degree in Computer Science, Technology, or a related field of study preferred Professional technology and associated risk certifications (CISSP More ❯
boston, massachusetts, united states Hybrid / WFH Options
Fidelity Investments
audit, testing controls, and supporting the design and implementation of new controls to mitigate emerging risks. This role will require strong networking and relationship management skills to collaborate with the various ECS teams including Application & Infrastructure Security, Workforce & IdentityManagement, External & Vendor Defense, Threat Detection and Response … Team You will report to the Technology Risk leader and manage a small team of technology risk associates. The Technology Risk team oversees the management of controls and the mitigation of risk related to the technology environment, systems, and processes across the enterprise. Technology Risk is part of the … years’ experience in information technology risk, cyber security, controls or audit roles Experience in fraud risk frameworks a plus Prior experience in team management and leadership is preferred Bachelor’s Degree in Computer Science, Technology, or a related field of study preferred Professional technology and associated risk certifications (CISSP More ❯
London, England, United Kingdom Hybrid / WFH Options
Merlin Entertainments
Job Description Technical Lead | Customer Identity Solutions Location: Hybrid - London UK Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. We're seeking a talented Technical Lead to lead the strategy, delivery, and ongoing optimisation of Merlin's Customer … Identity and Access Management (CIAM) capabilities. About the role This is a high-impact position within the Digital & Data division, responsible for enabling secure, seamless, and scalable digital identity journeys across our global guest-facing platforms. You'll oversee internal engineers and supplier delivery teams, ensuring high … team of talented and experienced engineers and specialists. Managing the team, providing training and performance management. Lead the design, implementation, and maintenance of the IdentityManagement platform, ensuring high performance, availability, and scalability. Maintain and continuously improve service level agreements (SLAs) and operational KPI's Lead the lifecycle More ❯
security and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize Security Information and Event Management (SIEM) solutions (preferably Microsoft Sentinel SIEM ) to monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating … network traffic analysis. Cloud Security: Deep experience securing cloud environments, especially Azure . Familiarity with cloud-native security tools, including Azure Security Center, and identitymanagement solutions like Azure Active Directory. Cisco Meraki: Hands-on experience configuring and managing Cisco Meraki firewalls, switches, and other networking/security … appliances. Palo Alto Networks/Panorama: Expertise with Palo Alto Networks firewalls, including configuration, management, and troubleshooting of security policies and threat management. Infrastructure as Code (IaC): Strong experience with Terraform for infrastructure automation, especially in security-related use cases (e.g., securing cloud infrastructure, managing security controls). SIEM More ❯
london, south east england, united kingdom Hybrid / WFH Options
Halian
security and threat management. Leverage Infrastructure as Code (IaC) principles using Terraform to automate security policies and infrastructure deployment. Utilize Security Information and Event Management (SIEM) solutions (preferably Microsoft Sentinel SIEM ) to monitor, detect, and respond to security incidents. Create and maintain runbooks for security incident response, including automating … network traffic analysis. Cloud Security: Deep experience securing cloud environments, especially Azure . Familiarity with cloud-native security tools, including Azure Security Center, and identitymanagement solutions like Azure Active Directory. Cisco Meraki: Hands-on experience configuring and managing Cisco Meraki firewalls, switches, and other networking/security … appliances. Palo Alto Networks/Panorama: Expertise with Palo Alto Networks firewalls, including configuration, management, and troubleshooting of security policies and threat management. Infrastructure as Code (IaC): Strong experience with Terraform for infrastructure automation, especially in security-related use cases (e.g., securing cloud infrastructure, managing security controls). SIEM More ❯
Experience, you will be fully responsible for managing the foundational SaaS functionality that powers the Sea intelligent marketplace for fixing freight. This includes user management, authentication, legal entity mapping, notifications, navigation, login flows, and the application wrapper—critical components that ensure a seamless, secure, and efficient user experience across … drive the roadmap for Core Experience , ensuring our platform’s foundational components are robust, scalable, and intuitive. Identify opportunities and pain points within user management, authentication, notifications, navigation, login flows, and other core functionalities , delivering solutions that improve platform usability. Deeply understand how users interact with the platform , synthesizing … various sources to optimize workflows and remove friction . Ensure that security, compliance, and user privacy best practices are embedded into authentication and user management workflows. Collaborate closely with engineering, design, and other product teams to develop and iterate on platform-wide improvements. Work with internal teams (customer support More ❯
london, south east england, united kingdom Hybrid / WFH Options
Sea
Experience, you will be fully responsible for managing the foundational SaaS functionality that powers the Sea intelligent marketplace for fixing freight. This includes user management, authentication, legal entity mapping, notifications, navigation, login flows, and the application wrapper—critical components that ensure a seamless, secure, and efficient user experience across … drive the roadmap for Core Experience , ensuring our platform’s foundational components are robust, scalable, and intuitive. Identify opportunities and pain points within user management, authentication, notifications, navigation, login flows, and other core functionalities , delivering solutions that improve platform usability. Deeply understand how users interact with the platform , synthesizing … various sources to optimize workflows and remove friction . Ensure that security, compliance, and user privacy best practices are embedded into authentication and user management workflows. Collaborate closely with engineering, design, and other product teams to develop and iterate on platform-wide improvements. Work with internal teams (customer support More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
solutions that leverage Microsoft 365 technologies. This role requires proficiency in both front-end and back-end development, as well as experience with automation, identitymanagement, and integration of AI into solutions. Responsibilities Develop and maintain solutions using PowerShell to automate tasks and report across large data sets … equal opportunity employer and we welcome applications from all suitable candidates. We consider all applicants for employment regardless of age, disability, sexual orientation, gender identity, family or parental status, race, colour, nationality, ethnic or national origin, religion or belief. Research suggests that applicants from underrepresented groups are less likely More ❯
troubleshooting abilities in systems, networking, and cloud environments Proven hands-on experience with tools like PAM, EDR, CASB, SIEM, DLP, email filtering , and vulnerability management Proficient in cloud services , especially in environments using virtual machines, identitymanagement, web apps , and networking components (e.g., virtual networks, security groups More ❯
account diverse regional regulations and network conditions. Conduct regular security audits and vulnerability assessments, with a focus on remote access and endpoint security. Device Management & MDM (Worldwide Deployment): Manage device procurement, distribution, and lifecycle for a geographically diverse team. Implement and manage a Mobile Device Management (MDM) solution … Cloud & SaaS Administration: Administer Google Workspace, SSO solutions, SaaS applications and cloud infrastructure (e.g., AWS, GCP, Azure), ensuring secure access and configuration. Access Control & IdentityManagement: Manage user accounts, permissions, and access control across all systems with the application of principles such as least privilege and separation of … and response. Automation & Scripting: Develop and maintain scripts and automation tools to streamline IT operations and enhance security. Automate security tasks, such as patch management, vulnerability scanning or secure configuration enforcement. Vendor Management: Manage relationships with IT and security vendors and service providers. Evaluate vendor security practices and More ❯
Herndon, Virginia, United States Hybrid / WFH Options
VTG
and STIG compliance. Implement and maintain security measures such as firewalls, intrusion detection/prevention systems, and access controls. Conduct vulnerability assessments and patch management to mitigate security risks. Maintain physical and logical security protocols to protect classified information. Incident Response and Monitoring: Monitor network traffic and logs for … security incidents and respond to alerts promptly. Document and report security incidents per organizational protocols and government requirements. Access Management: Configure and manage user accounts, permissions, and group policies in Active Directory. Implement multi-factor authentication (MFA) and other identitymanagement systems. Documentation and Reporting: Maintain detailed … and protocols (TCP/IP, VPNs, firewalls, etc.). Proficiency with Windows and Linux operating systems, virtualization technologies, and storage solutions. Familiarity with Risk Management Framework (RMF), Security Technical Implementation Guides (STIGs), and other relevant compliance standards. Ability to lift and install equipment weighing up to 50 lbs. Perform More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
contingent upon the program award expected in Summer 2025 Basic Qualifications: • 5+ years of a combination of Linux, scripting/software development, and configuration management experience • Proficiency in Python, Perl, Korn, Bourne/Bash, Ansible and other shell scripting • Experience with revision control software (CVS, SVN, Git, GitLab, GitLab … CI) • Management, development of DevOps deployment automation processes • Ability to analyze/debug/maintain the integrity of an existing DevOps base • Excellent communication and people skills • Understanding of software development process including requirements, use cases, design, coding, documentation and testing • Security+ Certification • Ability to obtain and maintain a … file systems • Experience with Ethernet networking • Experience with RDMA communications (InfiniBand and OmniPath) • Experience with InfiniBand or Omni-Path high speed fabrics, including subnet management, IPoIB and/or IPoOPA mechanisms, fabric topology and health monitoring and integration with MPI • Understanding and experience working with identitymanagementMore ❯
be leading the migration of systems including including Office 365, HR, finance, and other core platforms in the business. You must have a project management and commercial mind set to complete these integrations. Key skills: Strong knowledge of Microsoft 365 administration Background in tenant to tenant migrations Solid understanding … of cloud infrastructure and networking principles Expertise in Active Directory, identitymanagement, and user access control Experience integrating HR, finance, and other business-critical systems Project Management skills Familiarity with automation tools and scripting (PowerShell, Python, Terraform) is a bonus Projects: Analyse IT environments from acquired companies More ❯
Security Analysis and Improvement: Continuously analyse our security systems for potential improvements, ensuring that our defences remain at the forefront of cybersecurity practices. Vulnerability Management: Proactively identify, assess, and remediate security vulnerabilities to maintain the integrity and confidentiality of our customer data. Security Automation: Automate security processes and procedures … development teams to ensure that web and mobile front-ends, as well as microservice architectures, are designed with robust security measures in mind. Risk Management and Compliance: Assist teams in ensuring that products and services are secure by design, align with the organisation's risk appetite, and comply with … of the following: Threat modelling and risk assessments Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ) Experience with designing and administering identitymanagement (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Primer
teams across Primer to satisfy the unique requirements of our national security customers and deploy our products in secure environments Partner with our Product Management and Engineering teams to identify and prioritize feature development based on customer feedback Train, deploy, and tune machine learning models on customer data sets … and backend development skills Experience with natural language processing (NLP) Direct experience with the secure, privileged regions of AWS or Microsoft Azure Familiarity with identitymanagement solutions for authentication and authorization Any offer of employment is conditioned on an applicant or employee being able to meet any applicable … Action employer. We do not discriminate based upon race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. Please see the More ❯
tooling (e.g., Terraform, Jenkins, Kubernetes). Hands-on with observability and monitoring tools (e.g., DataDog, Azure Monitor, AppDynamics). Expert in cyber security practices, identitymanagement, encryption, and secure API development. Familiarity with compliance frameworks such as GDPR and PCI-DSS. Excellent stakeholder management and communication skills More ❯