Columbia, Maryland, United States Hybrid / WFH Options
HII Mission Technologies
understand and be able to implement DoD RMF system accreditation processes. Assess use case and operational risk of integrated open source, and GOTS/COTS software components. Will use vulnerabilitymanagement systems, automated security scanning tools, and system accreditation record systems. Must be able to grasp new concepts, facilitate information exchanges for data gathering, and collaborate with diverse … audiences. Will follow established processes where applicable, and establish and execute defensible processes where none are prescribed. Provide security planning, assessment, risk analysis, and risk management support. Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements. Support the Government in the enforcement of the design and implementation of trusted … and services, computer architectures, and network topologies is required. DoD 8570 compliance with IAT Level II (SSCP, Security+, CCNA-Security, or GSEC certification) Experience with DISA STIGs and SRGs, vulnerabilitymanagement systems, mitigation and compliance processes, and reviewing results from automated security scanning tools. The ability to work independently and as part of a team is needed. Must More ❯
London, Hyde Park, United Kingdom Hybrid / WFH Options
The Bridge IT Recruitment
to a sustainable, net zero world. We’re looking for a Head of I&T Service Operations. Based at our Paddington site, you’ll be responsible for the definition, management, implementation and delivery of I&T Operations and Service Management across the URENCO Group incorporating: • Delivering iterative Service Strategy and Innovation focussed on how a best in class … IT Operations function works in modern enterprises • Lead on IT Service Continuity planning and testing with multiple outsourced service providers • Manage relationships with partners and service providers including contract management and continual service improvement • Leadership grounded in ITIL/ISO global standards for all I&T operational services • Stakeholder management specifically in reference to Service Outages, Testing Services … and Project Transition to Service • Service Protection in direct delivery of appropriate vulnerabilitymanagement, risk management and patching services • Lead the management and operation of cloud and SaaS based subscription services • Financial planning for all Operational Services including renewals and upgrades of infrastructure and applications as required • Accountability for Monthly Global Service Reviews for all suppliers More ❯
Cloud Security Engineer | AWS, Endpoint Security & Automation | Security SaaS Prism Digital have partnered with a super interesting and niche VC-backed client specialising in attack surface management and automated red teaming. Their platform provides organisations with real-time visibility into their attack surface and potential exploitable vulnerabilities. They have received numerous awards for being an up-and-coming security … the future . This engineer will initially wear a lot of hats to begin with and required to have experience with: (In order of importance) Any Endpoint Security/VulnerabilityManagement tools AWS Security review experience Terraform, CI/CD (any) & automation (Python/Go/Bash) Key Requirements: Experience with any endpoint security/vulnerabilitymanagementMore ❯
West London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
are effectively deployed, maintained and optimised, while driving efficiencies and ensuring secure, compliant infrastructure. This role requires a background and strong expertise in enterprise toolsets, automation technologies and patch management processes. Engagement via Umbrella Company Only; all taxes & NI deducted at source. General responsibilities Lead operations of enterprise tooling platforms including SCCM, Scorch, BMC, Ansible and MuleSoft. Define and … consistent monitoring, reporting and compliance dashboards are in up to date and in-place for patching and tooling. Work with security and governance teams to align patching schedules with vulnerabilitymanagement requirements. Provide operational reporting for Stakeholders, including compliance metrics. Manage vendor relationships and licensing agreements for tooling and middleware platforms. Required Skills & Experience Proven experience managing enterprise … operations tooling, middleware and patch management. Strong expertise with SCCM, Scorch, BMC, Ansible and MuleSoft platforms. Demonstrated experience in patch management, vulnerability remediation and compliance reporting. Hands-on knowledge of automation frameworks and orchestration platforms. ITIL Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
requirements. Contribute to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large-scale IT transformation … programmes. Skilled in Identity & Access Management (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged access management, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication skills, with the ability to engage both technical and non-technical stakeholders. Preferred Qualifications More ❯
Sheffield, England, United Kingdom Hybrid / WFH Options
Vallum Associates
Solution Architect- PAM Location: Hybrid-Sheffield, UK (3Days/Week Onsite) Duration: 6months+ 550GBP/Day Inside IR35 Project Overview CLIENT is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. One of the … pillars of that programe is Privileged Access Management (PAM). CLIENT is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead Security Solution Architect that can complement an existing team of Solution Architects to progress with … the required quality and standard. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
handsworth, yorkshire and the humber, united kingdom Hybrid / WFH Options
Vallum Associates
Solution Architect- PAM Location: Hybrid-Sheffield, UK (3Days/Week Onsite) Duration: 6months+ 550GBP/Day Inside IR35 Project Overview CLIENT is working on a strategic Identity and Access Management programme and is re-shaping the way Authentication, Federation, Privileged Access Management, Access Governance, Secrets Management and API Security is done across the bank. One of the … pillars of that programe is Privileged Access Management (PAM). CLIENT is working on uplifting controls and capabilities in privileged access for the Group and introducing the strategic password vaulting solution that will enable to meet strategic requirements. We are seeking an experienced Lead Security Solution Architect that can complement an existing team of Solution Architects to progress with … the required quality and standard. Principal Preferred Requirements Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerabilitymanagement, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at More ❯
Arlington, Virginia, United States Hybrid / WFH Options
CGI
a collaborative, fast-paced, outcome-driven mission. This position is located in USA VA Arlington, however, a hybrid working model is acceptable. Your future duties and responsibilities: • Industrial security management: This individual is responsible for maintaining the organization's industrial security program and Facility Clearance (FCL) in compliance with regulations like the National Industrial Security Program Operating Manual (NISPOM … now implemented under 32 CFR Part 117. • Cybersecurity engineering and compliance: They are responsible for implementing cybersecurity measures and ensuring compliance with frameworks such as the Risk Management Framework (RMF), Cybersecurity Maturity Model Certification (CMMC), and other security directives. • Security program oversight: The engineer will develop, implement, and manage security plans and procedures for both physical and digital assets … programs. • Government liaison: They act as the primary point of contact with government agencies like the Defense Counterintelligence and Security Agency (DCSA) and manage external security audits. • Security clearance management: This involves initiating security clearance applications for employees, tracking their status, and conducting initial and exit briefings. • System accreditation and monitoring: They prepare system security authorization documents (like System More ❯
through business development, recruitment, and thought leadership Coaching and mentoring consultants to develop the next generation of cyber leaders Ideal Background Proven experience in cyber strategy, transformation, and risk management within complex organisations Strong knowledge of regulatory and security frameworks (e.g. NIST CSF, ISO27001, GDPR, NIS2, NCSC CAF) Experience across areas such as GRC, security architecture, threat management, or vulnerabilitymanagement Outstanding communication and stakeholder engagement skills, with the ability to influence at C-suite and board level Track record of leading large-scale client engagements and delivery teams in consulting environments Relevant certifications (CISSP, CISM, CISA, MSc Cyber Security) advantageous What You'll Receive Salary: £73,100 - £90,950 + benefits 25 days annual More ❯
Arlington, Virginia, United States Hybrid / WFH Options
UICGS and Bowhead Family of Companies
accreditation activities and maintaining ongoing security posture. Responsibilities • Implement and maintain security controls per NIST 800-53 and DoD standards for cloud-based systems • Conduct comprehensive security assessments and vulnerability analyses on cloud infrastructure • Manage security documentation and compliance reporting for continuous monitoring programs • Coordinate with Authorizing Officials for system accreditation and Risk Management Framework (RMF) processes • Monitor … across cloud environments • Maintain security awareness training programs and ensure personnel compliance with DoD security requirements • Support continuous monitoring and security control assessments for cloud-based information systems • Conduct vulnerability scans and recognize cloud-based vulnerabilities in security systems • Utilize DoD network analysis tools to identify cloud-based vulnerabilities (e.g., ACAS, HBSS, etc.) • Apply system, network, and OS hardening … techniques for cloud environments • Conduct cloud-based application vulnerability assessments and penetration testing • Identify systemic security issues based on analysis of vulnerability and configuration data • Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation) • Utilize Tenable Assured Compliance Assessment Solution (ACAS) for vulnerabilitymanagement • Manage Trellix Endpoint Security System (ESS), previously More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Koniag Government Services
Cybersecurity Analyst provides expert guidance and hands-on support in implementing, maintaining, and improving cybersecurity posture across the Department of War (DoW) information systems in accordance with the Risk Management Framework (RMF). This position is responsible for ensuring systems achieve and maintain Authorization to Operate (ATO) status through meticulous application of DoW cybersecurity policies, controls, and best practices. … pipelines to embed compliance and security checks. Collaborate with cybersecurity engineers, assessors, system owners, and other stakeholders to align automation solutions with mission needs. Integrate automated testing tools (e.g., vulnerability scanners, configuration management tools) into RMF packages. Provide subject matter expertise on leveraging OSCAL (Open Security Controls Assessment Language) and other machine-readable compliance frameworks. Deliver training, documentation … Xacta) and their automation/integration. Knowledge of OSCAL and machine-readable RMF artifacts. Experience with DevSecOps pipelines, CI/CD, and Infrastructure as Code (IaC). Background in vulnerabilitymanagement, STIG compliance, or automated security testing. Our Equal Employment Opportunity Policy The company is an equal opportunity employer. The company shall not discriminate against any employee or More ❯
Newport News, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
Vulnerability Engineer Location: Langley AFB - Hampton, VA or Hanscom AFB - Lexington, MA Work Type: Onsite Remote Work: No Job Description Are you looking for an opportunity to share your experience in cloud security to safeguard our nation? As a General Cloud Security Engineer, you will lead the technical implementation of security solutions using Infrastructure as Code (IaC) and security … scanning and remediation workflows using Python, Bash, and PowerShell. Design and implement network segmentation using AWS Transit Gateway, Security Groups, and NACLs. Deploy and manage PKI infrastructure and secrets management solutions, including AWS KMS and Secrets Manager. Implement container security solutions for ECS and EKS environments using tools, including Aqua and Twistlock. Develop automated compliance validation tools using AWS … IAT Level II Certification within 30 days of hire date Additional Qualifications Experience with AWS Security hub Experience with AWS native security services configuration and automation Experience with automated vulnerabilitymanagement systems and developing custom security tools and automation frameworks Experience securing CI/CD pipelines and implementing DevSecOps practices Experience with container security and Kubernetes security configurations More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Thinking Search
role within the Information Technology and Security function, responsible for coordinating and managing external and internal security audits, client assessments and maintaining the firm’s ISO 27001 Information Security Management System (ISMS). The position offers significant exposure across international offices and requires collaboration with senior stakeholders, clients, and external certification bodies. Responsibilities Serve as the primary liaison for … be required Candidate Requirements ISO 27001 Lead Auditor certification and/or extensive experience with ISO 27001 standards 5+ years’ experience in IT or Security audits, assessments or compliance management Strong understanding of Cyber Essentials Plus, risk management, and security controls Sound technical understanding of systems, networks, and security architecture best practices Excellent written and verbal communication skills … to engage senior stakeholders High attention to detail, analytical capability and strong organisational skills Ability to work cross-functionally and influence internal and external stakeholders Familiarity with control design, vulnerabilitymanagement, and third-party risk management This is a fantastic opportunity to join a globally recognised firm at the forefront of professional services technology and cybersecurity. The More ❯
role within the Information Technology and Security function, responsible for coordinating and managing external and internal security audits, client assessments and maintaining the firm’s ISO 27001 Information Security Management System (ISMS). The position offers significant exposure across international offices and requires collaboration with senior stakeholders, clients, and external certification bodies. Responsibilities Serve as the primary liaison for … be required Candidate Requirements ISO 27001 Lead Auditor certification and/or extensive experience with ISO 27001 standards 5+ years’ experience in IT or Security audits, assessments or compliance management Strong understanding of Cyber Essentials Plus, risk management, and security controls Sound technical understanding of systems, networks, and security architecture best practices Excellent written and verbal communication skills … to engage senior stakeholders High attention to detail, analytical capability and strong organisational skills Ability to work cross-functionally and influence internal and external stakeholders Familiarity with control design, vulnerabilitymanagement, and third-party risk management This is a fantastic opportunity to join a globally recognised firm at the forefront of professional services technology and cybersecurity. The More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Thinking Search
role within the Information Technology and Security function, responsible for coordinating and managing external and internal security audits, client assessments and maintaining the firm’s ISO 27001 Information Security Management System (ISMS). The position offers significant exposure across international offices and requires collaboration with senior stakeholders, clients, and external certification bodies. Responsibilities Serve as the primary liaison for … be required Candidate Requirements ISO 27001 Lead Auditor certification and/or extensive experience with ISO 27001 standards 5+ years’ experience in IT or Security audits, assessments or compliance management Strong understanding of Cyber Essentials Plus, risk management, and security controls Sound technical understanding of systems, networks, and security architecture best practices Excellent written and verbal communication skills … to engage senior stakeholders High attention to detail, analytical capability and strong organisational skills Ability to work cross-functionally and influence internal and external stakeholders Familiarity with control design, vulnerabilitymanagement, and third-party risk management This is a fantastic opportunity to join a globally recognised firm at the forefront of professional services technology and cybersecurity. The More ❯
london, south east england, united kingdom Hybrid / WFH Options
Thinking Search
role within the Information Technology and Security function, responsible for coordinating and managing external and internal security audits, client assessments and maintaining the firm’s ISO 27001 Information Security Management System (ISMS). The position offers significant exposure across international offices and requires collaboration with senior stakeholders, clients, and external certification bodies. Responsibilities Serve as the primary liaison for … be required Candidate Requirements ISO 27001 Lead Auditor certification and/or extensive experience with ISO 27001 standards 5+ years’ experience in IT or Security audits, assessments or compliance management Strong understanding of Cyber Essentials Plus, risk management, and security controls Sound technical understanding of systems, networks, and security architecture best practices Excellent written and verbal communication skills … to engage senior stakeholders High attention to detail, analytical capability and strong organisational skills Ability to work cross-functionally and influence internal and external stakeholders Familiarity with control design, vulnerabilitymanagement, and third-party risk management This is a fantastic opportunity to join a globally recognised firm at the forefront of professional services technology and cybersecurity. The More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Thinking Search
role within the Information Technology and Security function, responsible for coordinating and managing external and internal security audits, client assessments and maintaining the firm’s ISO 27001 Information Security Management System (ISMS). The position offers significant exposure across international offices and requires collaboration with senior stakeholders, clients, and external certification bodies. Responsibilities Serve as the primary liaison for … be required Candidate Requirements ISO 27001 Lead Auditor certification and/or extensive experience with ISO 27001 standards 5+ years’ experience in IT or Security audits, assessments or compliance management Strong understanding of Cyber Essentials Plus, risk management, and security controls Sound technical understanding of systems, networks, and security architecture best practices Excellent written and verbal communication skills … to engage senior stakeholders High attention to detail, analytical capability and strong organisational skills Ability to work cross-functionally and influence internal and external stakeholders Familiarity with control design, vulnerabilitymanagement, and third-party risk management This is a fantastic opportunity to join a globally recognised firm at the forefront of professional services technology and cybersecurity. The More ❯
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DFS Furniture Ltd
by running the path of known attacker tactics, techniques, and procedures (TTPs) within our environments. Continuously improve security processes, playbooks, and tooling based on real-world lessons 3. Assurance & VulnerabilityManagement Lead the technical support for our penetration testing programme, including sound scoping, engaging with pentesters, and owning the subsequent vulnerability remediation. Develop and implement a technical … framework for the deeper assessment and management of Third-Party Security Risk, including assisting with the technical elements of supplier service reviews and audit execution. Apply established Cybersecurity Frameworks and Best Practices to mature our security posture and guide governance activities. Collaborate with engineering teams to enhance security coverage and visibility, providing expert technical security support across the company. More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise … incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 within a medium/large sized public sector organisation Solid stakeholder management and mentoring skills Information Security,Cyber Security, Assurance and vulnerabilitymanagement would be ideal Comprehensive knowledge of Information Security Management Systems with the ability to scope … design, and implement such systems Strong ICT infrastructure, application, and cloud technical skills would be advantageous Evidenced knowledge and understanding of ISO270001, ITIL, and Prince 2 management practices Ability to lead the workforce, increasing their skills and knowledge in relation to information security What you'll get in return This exciting position is paying between £50,000 and More ❯
Cambridge, Massachusetts, United States Hybrid / WFH Options
S&P Global
and updating security plans: Planning and managing security projects and initiatives Emergency response: Demonstrating excellent surveillance and emergency response skills Identifying and mitigating security vulnerabilities: Perform static and dynamic vulnerability assessments and incorporate tools in the SDLC using commercial and open source tools. Implementing de-escalation techniques: Prioritizing training in de-escalation techniques to effectively deal with conflicts Maintain … a GenAI security posture: Help establish and enable a GenAI security posture at an enterprise scale and have complete oversight of the AI Accelerator Security program Risk assessment and management: Spotting risky behaviors and configurations in critical infrastructure components to stop network intrusions and preempt cyberattacks Auditing policies and controls continuously: Driving the cybersecurity process forward by regularly auditing … the policies and controls in place Building a vulnerabilitymanagement program: Ensuring that people in the organization continuously check for known vulnerabilities and take appropriate steps to remediate them Design and implement security controls and processes across Kensho and provide monitoring to ensure compliance. Analyze and recommend security practices and tools for engineering teams to incorporate into the More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
are seeking an experienced Cybersecurity Engineer to support the PMW 160 cybersecurity team in developing and implementing secure network solutions. The ideal candidate will bring strong expertise in Risk Management Framework (RMF), security scanning, vulnerabilitymanagement, and cybersecurity compliance to enhance the security posture of naval tactical network systems. Key Responsibilities Perform Information Assurance (IA) scans to … identify vulnerabilities and verify RMF compliance Monitor Information Assurance Vulnerability Alerts (IAVAs), Security Technical Implementation Guides (STIGs), and other cyber vulnerabilities for integration into system design Provide endpoint detection and response solutions to enhance system security Support testing and evaluation of Information Assurance solutions Develop comprehensive test plans, conduct detailed security testing, and produce thorough test reports Create and … OR High school diploma with 11 years of experience Degree in a technical or managerial-related discipline TS/SCI clearance required U.S. Citizenship required Experience with the Risk Management Framework (RMF), including creating and updating documentation, using eMASS to meet RMF requirements, and developing mitigation strategies for system vulnerabilities Experience conducting security scans (e.g., STIG, IAVA) using Information More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
with a Secret Clearance (Multiple Levels) to support the PMW 160 cybersecurity team in developing and implementing secure network solutions. The ideal candidate will bring strong expertise in Risk Management Framework (RMF), security scanning, vulnerabilitymanagement, and cybersecurity compliance to enhance the security posture of naval tactical network systems. Key Responsibilities Perform Information Assurance (IA) scans to … identify vulnerabilities and verify RMF compliance Monitor Information Assurance Vulnerability Alerts (IAVAs), Security Technical Implementation Guides (STIGs), and other cyber vulnerabilities for integration into system design Provide endpoint detection and response solutions to enhance system security Support testing and evaluation of Information Assurance solutions Develop comprehensive test plans, conduct detailed security testing, and produce thorough test reports Create and … years of experience in a Cybersecurity, Engineering, T&E or A&A (formerly C&A) or related field Secret clearance required U.S. Citizenship required Experience with the Risk Management Framework (RMF), including creating and updating documentation, using eMASS to meet RMF requirements, and developing mitigation strategies for system vulnerabilities Experience conducting security scans (e.g., STIG, IAVA) using Information Assurance More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
TS/SCI Clearance (Multiple Levels), to support the PMW 160 cybersecurity team in developing and implementing secure network solutions. The ideal candidate will bring strong expertise in Risk Management Framework (RMF), security scanning, vulnerabilitymanagement, and cybersecurity compliance to enhance the security posture of naval tactical network systems. Key Responsibilities Perform Information Assurance (IA) scans to … identify vulnerabilities and verify RMF compliance Monitor Information Assurance Vulnerability Alerts (IAVAs), Security Technical Implementation Guides (STIGs), and other cyber vulnerabilities for integration into system design Provide endpoint detection and response solutions to enhance system security Support testing and evaluation of Information Assurance solutions Develop comprehensive test plans, conduct detailed security testing, and produce thorough test reports Create and … of experience in a Cybersecurity, Engineering, T&E or A&A (formerly C&A) or related field TS/SCI clearance required U.S. Citizenship required Experience with the Risk Management Framework (RMF), including creating and updating documentation, using eMASS to meet RMF requirements, and developing mitigation strategies for system vulnerabilities Experience conducting security scans (e.g., STIG, IAVA) using Information More ❯
Keyworth, Nottinghamshire, United Kingdom Hybrid / WFH Options
UK Research and Innovation (UKRI)
organisation to identify, assess, and mitigate risks, ensuring security policies and processes align with organisational objectives and regulatory requirements. Advise stakeholders and implement effective security solutions, providing oversight for vulnerability assessments, remediation activities, and technical control evaluations. Promote a culture of security by participating in awareness programs, supporting internal and external audits, and assisting in the development of policy … A professional certification (eg, CISM, CISSP, CompTIA Security+, CCSP or AWS certification). Degree in a related subject or relevant comparable education. Solid experience with risk assessment methodologies and vulnerabilitymanagement processes, including relevant tooling. (S&I) Excellent analytical, problem-solving, and decision-making skills, with strong attention to detail. (I) Proficient in communicating complex security concepts to … and security technologies and controls. (S&I) Proven ability to lead and drive security initiatives, respond to security incidents, and conduct investigations. (S&I) Comprehensive understanding of information security management concepts. (S&I) Benefits: We recognise and value our employees as individuals and aim to provide a favourable pay and rewards package. We are committed to supporting employees' development More ❯
Washington, Washington DC, United States Hybrid / WFH Options
TekSynap
until resolution of problems. DFCNet shall be monitored for system anomalies, errors, and failures and all system alerts shall be investigated, and a response must be provided to OIT management within the specified timeframe. Certificate Management for internally generated PKI and 3rd party issued certificates. Research and contribute to a shared knowledge base to help troubleshoot issues and … in a relevant field + 1 year of experience or a Bachelor's degree and 3+ years or 5 years experience. 1+ years of experience in providing patching and vulnerabilitymanagement and other security services Experienced in Systems Administration of a complex network (Nutanix SAN, HP NAS) Experienced in utilizing ServiceNow ITSM tool to track and resolve incidents … service requests, and changes Experienced in providing Active Directory Support, account management, GPO management. Experience with M365 services, Teams, Exchange, etc. Familiar with Azure Active Directory The position will be onsite at the DFC office in Washington, DC. Must be a US Citizen Must successfully obtain a Public Trust Overview We are seeking a Sr. Systems Admin, IT Engineer More ❯