london (southwark), south east england, united kingdom Hybrid / WFH Options
MI6
Information and Data Management Officer Department: InformationAssurance and Specialists Location(s): London Salary: Starting from £41,737 Job description Flexible Working: Full time, part time, and compressed hours are possible. Due to the sensitive nature of the work, the majority of the role is office based … a supportive and encouraging environment that puts the emphasis on teamwork. The Role Our organisation is driven by knowledge and insights, and as an Information and Data Management Officer, you’ll maximise the impact of our intelligence and actively contribute to our mission. Working with a range of unique … interesting, and unusual information, you will use your specialist skills to drive business outcomes and inform key decision-making. Working in a team environment, you’ll enjoy collaborating with others, and engage on a daily basis with partners and customers to meet business requirements. We will actively encourage and More ❯
london (camden), south east england, united kingdom Hybrid / WFH Options
MI6
Information and Data Management Officer Department: InformationAssurance and Specialists Location(s): London Salary: Starting from £41,737 Job description Flexible Working: Full time, part time, and compressed hours are possible. Due to the sensitive nature of the work, the majority of the role is office based … a supportive and encouraging environment that puts the emphasis on teamwork. The Role Our organisation is driven by knowledge and insights, and as an Information and Data Management Officer, you’ll maximise the impact of our intelligence and actively contribute to our mission. Working with a range of unique … interesting, and unusual information, you will use your specialist skills to drive business outcomes and inform key decision-making. Working in a team environment, you’ll enjoy collaborating with others, and engage on a daily basis with partners and customers to meet business requirements. We will actively encourage and More ❯
london (city of westminster), south east england, united kingdom Hybrid / WFH Options
MI6
Information and Data Management Officer Department: InformationAssurance and Specialists Location(s): London Salary: Starting from £41,737 Job description Flexible Working: Full time, part time, and compressed hours are possible. Due to the sensitive nature of the work, the majority of the role is office based … a supportive and encouraging environment that puts the emphasis on teamwork. The Role Our organisation is driven by knowledge and insights, and as an Information and Data Management Officer, you’ll maximise the impact of our intelligence and actively contribute to our mission. Working with a range of unique … interesting, and unusual information, you will use your specialist skills to drive business outcomes and inform key decision-making. Working in a team environment, you’ll enjoy collaborating with others, and engage on a daily basis with partners and customers to meet business requirements. We will actively encourage and More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
years of professional experience; or a Masters degree in a related field with no experience. - Security engineering skills with a working knowledge of InformationAssurance (IA) technology, NIST standards, DoDI 8500.1, and Risk Management Framework (RMF) Security Controls. - Leadership experience and effective interpersonal skills are required with a … knowledge of Confidentiality, Integrity, and Availability (CIA) concepts - Experience with RMF controls, Cyber Tasking Orders (CTOs), Risk assessment, Plan of Actions and Milestones (POAMs), InformationAssurance Vulnerability Management (IAVM) and vulnerability assessment for mission systems. -Windows and Linux servers and workstations in accordance with GPOs, IAVMs, and STIGs … desired. Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other More ❯
El Segundo, California, United States Hybrid / WFH Options
G2 Ops, Inc
Industry Experience: 2+ years of relevant experience 2+ years of work experience in System Engineering Architecture/Design 2+ years of work experience in InformationAssurance (IA)/Cyber Security Security Clearance Requirement: Must be able to obtain and maintain Active DoD Top Secret Clearance What makes someone … to Security Engineering. The ideal candidate has 2+ years of work experience in System Engineering Architecture/Design , 2+ years of work experience in InformationAssurance (IA)/Cyber Security , understanding of the discipline and practice of Systems Engineering throughout the system lifecycle phases of concept, development, production More ❯
Hollywood, Florida, United States Hybrid / WFH Options
Southern Glazer's Wine & Spirits
is part of our strategy for success. If you're looking to fill your glass with opportunity, come join our FAMILY. Overview The Principal Information Security Risk Analyst is responsible for planning and monitoring risk remediation/mitigation planning based on internal and external assessments and audits. The person … in this position will need to have extensive knowledge of information security risk and third-party risk management, as well as IT systems architectural concepts and business processes. This position works closely with all IT areas including Infrastructure, Application Development, Database, Network, Security Operations, and various business functions. This … position reports directly to the Manager of Information Security Governance and Risk Management. Specialized Skills and Technologies Knowledge of cybersecurity policies, regulations, and security frameworks Familiarity with network technologies and protocols (switches, routers, firewalls, VPNs, remote connection technologies, and multiple domain environments) Understanding and comprehension of a wide range More ❯
Radford, Virginia, United States Hybrid / WFH Options
Apex Systems
Cybersecurity Software Assurance & Audit SME LCAT: InformationAssurance Engineer - Senior Required Certifications: CISSP and/or ISSEP Position Overview: This position is for a Cybersecurity Software Assurance and Audit Subject Matter Expert. This is a remote position, with limited/periodic travel to Radford, VA. This … position will support both cybersecurity Software Assurance (SwA) processes and Audit support for our customers. Position Duties: • Lead the cybersecurity portion of Software Assurance reviews on behalf of the client and hosted customers. • Coordinate with team members to ensure that hosted application audit logs are properly configured and … ISSM to validate or create necessary POA&M documentation. • Act as a liaison between customers and the client's teams to facilitate efficient Software Assurance reviews. • Compile Code Review Packages for final AO/AODR approval. • Provide cybersecurity expertise and guidance for the design, implementation, and operation of DevSecOps More ❯
well with both internal teams and clients. Primary Responsibilities: Develop secure privileged access management solutions and architectures for clients. Evaluate designs and infrastructure against informationassurance/security standards and procedures. Support Authorizing Official (AO) actions by developing and delivering PAM (Privileged Access Management) solutions that include supporting … family of controls to include auditing annually, at a minimum Develop integrated solutions, processes, and procedures for evaluating, monitoring, remediating, and/or documenting information system security vulnerabilities IAW DoD Instruction (DoDI) 8510.01 (RMF for DoD IT) Support integration and implementation of Asset Management, Identity, Access Control Systems/… and/or solutions Basic Qualifications: Bachelor's degree and 12-15 years of related experience. Relevant experience may be substituted for education. Certified Information Systems Security Professional (CISSP) 8+ years hands-on experience designing or implementing PAM solutions, including all related documentation and artifacts Analytical ability, problem-solving More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
capable Security Consultant to join the company within the Risk Management team within the Security Practice. Our consultants are engaged across Security Engineering and Assurance tasks, working on parallel projects and workstreams, and take the lead on day-to-day client interface. You will also be comfortable enhancing customer … understanding of the ISO 27000 series, NIST Cyber Security & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy InformationAssurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP 440, JSP 902, and DEFCON 659A. Experience in business growth and … bid development is desirable. What We’re Looking for: Essential Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cyber security certification. Desirable Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable. Chartered or Principal status via the More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ANALYGENCE, Inc
Job Description ANALYGENCE is seeking an experienced Information Security Analyst (SME) to supportour federal customer who plays a key role in enhancing the security, resiliency, and reliability of the nation's cyber and communications infrastructure. This role directly supports the customer Mission Engineering (ME) Information Security Branch (ISB … responsible for providing Cybersecurity and InformationAssurance support. Services include providing programmatic, technical, engineering, and integration support for the continued design, development, enhancement, integration, deployment, operations, and sustainment of security supported initiatives. The Information Security Analyst (SME) is responsible for leading the RMF assessment, authorization, and monitoring More ❯
San Diego, California, United States Hybrid / WFH Options
G2 Ops, Inc
Bonus points if you have experience with the NAVWAR 5.0 Cheng Office or similar NAVWAR components and knowledge of military communication systems, networks, and informationassurance standards. And even more if you have experience with Agile software development processes and tools and familiarity with Navy program management and More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (eg, ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Antrim, County Antrim, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (eg, ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Darlington, County Durham, North East, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Leidos
and diagnosis of security-related system issues Perform and maintain vulnerability scans using Assured Compliance Assessment Solution (ACAS) and create reports Track and report InformationAssurance Vulnerability Management (IAVM) compliance using Assured Compliance Assessment Solution (ACAS) Maintain Authorization to Operate (ATO) records in XACTA system Manage and report … IA and CND systems Apply system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection More ❯
Arlington, Virginia, United States Hybrid / WFH Options
ANALYGENCE, Inc
Job Description ANALYGENCE is seeking an experienced Information Technology Program Manager (SME) to supportour federal customer who plays a key role in enhancing the security, resiliency, and reliability of the nation's cyber and communications infrastructure. This role directly supports the customer Mission Engineering (ME) Information Security Branch … ISB) responsible for providing Cybersecurity and InformationAssurance support. Services include providing programmatic, technical, engineering, and integration support for the continued design, development, enhancement, integration, deployment, operations, and sustainment of security supported initiatives. The Information Technology Program Manager (SME) is responsible for organizing all services pertaining to More ❯
San Diego, California, United States Hybrid / WFH Options
G2 Ops, Inc
Bonus points if you have experience with the NAVWAR 5.0 Cheng Office or similar NAVWAR components and knowledge of military communication systems, networks, and informationassurance standards. And even more if you have experience with Agile software development processes and tools and familiarity with Navy program management and More ❯
San Diego, California, United States Hybrid / WFH Options
G2 Ops, Inc
Bonus points if you have experience with the NAVWAR 5.0 Cheng Office or similar NAVWAR components and knowledge of military communication systems, networks, and informationassurance standards. And even more if you have experience with Agile software development processes and tools and familiarity with Navy program management and More ❯
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Linthicum Heights, Maryland, United States Hybrid / WFH Options
Artech Information Systems
smooth operation of all computer infrastructure in a multi-user computer system environment, including coordination of efforts with systems, software, and electrical design engineers, Information Systems Security Officers, PC desktop technicians, end users, network engineers, program/project managers, and IT management. • Analyze internal and external customer requirements and … purchase hardware, software, and system components. • Interact, meet, discuss, and troubleshoot issues with vendors and evaluate vendor products, services, and suggestions. • Adhere to strict Information Systems security guidelines in all cases. • Deploy new STIGs & work with IT/IA to develop POA&Ms for vulnerabilities that cannot be mitigated … or STIG settings that cannot be applied. • Understand vulnerability and risk mitigation in accordance with RMF & DoD JSIG standards. • Maintain security audit and logging information on all classified networked and standalone computers as directed by Information Systems Security Officers (ISSOs) and Information Systems Security Managers (ISSMs). More ❯
Springfield, Virginia, United States Hybrid / WFH Options
CSCI
Center (RPRC) appointed Facility Security Officer (FSO) for three facilities. The SSO must know the applicable Government regulations, directives, instructions, manuals, and laws for Information Security, Personnel Security, Physical Security, InformationAssurance, OPSEC, compartmented environments, and Security Education and Training requirements to include public speaking/briefing … Assists the Principal Investigators of other DoD contracts partner/agencies, ensuring proper alignment with security objectives, Facilitates the timely exchange of security-related information and coordinates security coverage for member-related events, monitoring for potential disruptions or security concerns, Ensure the accurate maintenance of Plans of Action and … time, Maintain accurate records of all schedules, cancellations, and changes to appointments, Assist with purchase orders and invoices to ensure adherence to Controlled Unclassified Information (CUI) compliance requirements, Manages program enrollment requests for new team members, overseeing security operations and ensuring compliance with established client protocols, Builds strong working More ❯