in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
in December of 2025. Clearance: An ACTIVE Secret clearance (IT LevelII Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. US Citizenship is required to obtain a clearance. Requirements: In-depth understanding of computersecurity … policies Strong ability to communicate clearly and succinctly in written and oral presentations Responsibilities: Perform system hardening on multiple Operating System (OS) platforms Monitor and assess system and network security posture in accordance with DoD cybersecurity policies and tools Apply MITRE ATT&CK and/or MITRE D3FEND frameworks to assess and improve threat detection and response strategies Conduct … advanced threat intelligence analysis, identify emerging potential threats, and provide threat intelligence recommendations Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and other security tools Analyze vulnerability findings and develop remediation plans Remediate vulnerability findings by implementing vendor patches and configuration changes on both Linux and Windows operating systems Design, implement, and enforce security controls across More ❯
as a Windows\VMware System Administrator for a classified government contract. Perform as a Linux\Redhat System Administrator for a classified government contract. Maintain smooth operation of multi-user computer systems, including coordination with network, software, and system engineers, PC desktop technicians, project managers, end users, customer, and IT management. Analyze internal and external customer requirements and determine equipment … monitoring, problem resolution, and configuration management. Provide backup and recovery services; manage file systems and disk space; manage virus protection on a routine basis. Create and maintain user and computer accounts and modify file permissions and security access lists. Test new releases of products to ensure compatibility and minimize user impact. Develop and document technical processes and procedures … with multidiscipline team in the sustainment/evaluation/integration/system deficiency resolution with aircrew/engineering/management/customer/vendors. Adhere to strict Information Systems security guidelines. Maintain security audit and logging information on all classified networked and standalone computers by engineering guidelines. Prepare security documentation for input to Computer Security. Report More ❯
Atomic Weapons Establishment, Aldermaston, Reading, Berkshire, England
AWE PLC
into different placements within the HPC group. During these placements, you will learn a range of skills, including: Linux operating system administration (installation, configuration and management) Linux shell scripting Computer hardware (building/repairing) Networking File system management Computersecurity concepts System monitoring and fault diagnosis Customer interaction and problem investigation Training is primarily in-house but … one extraordinary mission: keeping the UK safe and secure. The UK’s independent nuclear deterrent has existed for 75 years to deter the most extreme threats to our national security and way of life, helping to guarantee our safety, and that of our NATO allies. Our work is critical. We’re delivering Astraea, the next warhead for the UK More ❯
or equivalent alongside good communication and time management skills and experience in an IT role. We are looking for familiarity with Microsoft Windows in a domain environment, knowledge of computersecurity practices, anti-virus and patching software, basics of TCP/IP based communication technologies and a good working knowledge of Windows, Mac OS, Android and iOS Operating More ❯
of experience in technologies including Golang and Python programming languages, gRPC and REST web service frameworks, container (e.g., Kubernetes) and serverless (e.g., AWS Lambda) runtime environments, cloud databases and computersecurity will provide a multiplier effect to our organization. What You'll Do Define control and data plane architecture blueprints and develop implementations that help us realize a More ❯
of experience in technologies including Golang and Python programming languages, gRPC and REST web service frameworks, container (e.g., Kubernetes) and serverless (e.g., AWS Lambda) runtime environments, cloud databases and computersecurity will provide a multiplier effect to our organization. What You'll Do Define control and data plane architecture blueprints and develop implementations that help us realize a More ❯