Security Engineer, Incident Response, SIRT Job ID: Amazon Support Services Pty Ltd Amazon is looking for a qualified Security Engineer to join our innovative, high energy Security Incident Response Team (SIRT) in Sydney. SIRT Security Engineers respond to security events, conduct analysis of threats and intrusion attempts, and provide security services to safeguard highly … sensitive data. They work hands-on with detection systems and vulnerability analysis tools to respond to potential threats to Amazon systems. Security Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis. With your technical expertise, you will be solving security challenges at scale, working to … protect the applications powering the most sophisticated e-commerce platform ever built. We value broad and deep technical knowledge, specifically in the fields of forensics, malware analysis, network security, application security, cryptography, and security intelligence. Key job responsibilities - Responding to security incidents, and coordinating a cohesive response involving multiple teams across Amazon. - Providing security engineering More ❯
part of our dynamic team, working at the forefront of technology advancements and supporting critical missions in the Gov Con, DoD, and Intel space. With your active Top Secret security clearance, you'll have the chance to work on highly classified projects that directly impact national security. Responsibilities: Architect and design secure and scalable DevOps solutions: Leverage your expertise … to develop and implement robust DevOps strategies, ensuring the highest level of security, reliability, and performance for our mission-critical systems. Infrastructure automation and orchestration: Collaborate with cross-functional teams to build and maintain automated deployment pipelines, utilizing industry-leading tools and frameworks to streamline and optimize our development and operational processes. Continuous integration and delivery: Drive the adoption … of CI/CD practices and tools, enabling rapid and frequent software releases while ensuring the integrity of the overall system. Security and compliance: Implement best practices for securing systems and data, adhering to industry and government regulations, and proactively identifying and mitigating security vulnerabilities. Performance monitoring and optimization: Monitor system performance and proactively identify areas for improvement More ❯
SSRS Report Designer • Experience with programming languages and scripting methods including Python, PHP, Java, Bash, HTML, CSS, JavaScript, and jQuery • Experience creating secure applications systems utilizing IC or DoD security guidelines • Experience utilizing DEVOPs tools such as a version control system (Github preferred, Subversion OK) • Experience with software testing, documentation, and training • Experience with InDesign, Adobe Illustrator, Adobe Creative … your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to … hire security researchers who have historically worked outside of AI, such as in - non-exhaustively - computersecurity, information security, web technology policy, and hardware security. Diverse perspectives and research interests are welcomed. The Team seeks people with skillsets leaning in the direction of either or both of Research Scientist and Research Engineer, recognising that some technical … seniority and experience. Person Specification You may be a good fit if you have some of the following skills, experience and attitudes: Experience working on machine learning, AI, AI security, computersecurity, information security, or some other security discipline in industry, in academia, or independently. Experience working with a world-class research team comprised of More ❯
About the AI Security Institute The AI Security Institute is the largest team in a government dedicated to understanding AI capabilities and risks in the world. Our mission is to equip governments with an empirical understanding of the safety of advanced AI systems. We conduct research to understand the capabilities and impacts of advanced AI and develop and … test risk mitigations. We focus on risks with security implications, including the potential of AI to assist with the development of chemical and biological weapons, how it can be used to carry out cyber-attacks, enable crimes such as fraud, and the possibility of loss of control. The risks from AI are not sci-fi, they are urgent. By … current frontier AI systems and considering what measures could and should be used to secure such systems in the future. The Safeguard Analysis Team takes a broad view of security threats and interventions. It's keen to hire researchers with expertise developing and analysing attacks and protections for systems based on large language models, but is also keen to More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Lloyds Banking Group
days) in one of our office locations ABOUT THIS OPPORTUNITY Are you an infrastructure engineer looking for your next role? We've got some exciting opportunities in our Chief Security Office for experienced infrastructure engineers who are passionate about secure, scalable tech! Our teams in the labs below are growing, and we'd love to hear from you: Lab1 … Cloud Enterprise and Compute Security Lab 2: Security Operations (Data Loss Management) Every day will bring something new. In these roles, you'll get to: Design, build, and manage secure infrastructure across Azure and GCP Use Infrastructure as Code (Terraform) to implement and maintain security controls Automate security processes with scripting and APIs Use native tools … and analytics to improve cloud & data security posture Collaborate across teams to deliver secure, scalable, and compliant solutions Creating and tuning DLP/Cyber policies for endpoints, email, cloud apps, and network traffic Work with other data professionals and AI engineers to understand business needs and develop effective AI solutions WHAT WE'RE LOOKING FOR We're committed to More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Lloyds Banking Group
days) in one of our office locations ABOUT THIS OPPORTUNITY Are you an infrastructure engineer looking for your next role? We’ve got some exciting opportunities in our Chief Security Office for experienced infrastructure engineers who are passionate about secure, scalable tech! Our teams in the labs below are growing, and we’d love to hear from you: Lab1 … Cloud Enterprise and Compute Security Lab 2: Security Operations (Data Loss Management) Every day will bring something new. In these roles, you’ll get to: Design, build, and manage secure infrastructure across Azure and GCP Use Infrastructure as Code (Terraform) to implement and maintain security controls Automate security processes with scripting and APIs Use native tools … and analytics to improve cloud & data security posture Collaborate across teams to deliver secure, scalable, and compliant solutions Creating and tuning DLP/Cyber policies for endpoints, email, cloud apps, and network traffic Work with other data professionals and AI engineers to understand business needs and develop effective AI solutions WHAT WE’RE LOOKING FOR We’re committed to More ❯
work in both user and kernel space. You will play a crucial role in developing custom capabilities used on live systems. You will be a key player supporting national security interests. This position requires an active TS/SCI clearance. Requirements and Skills: When assessing candidates for the CNO Developer position, Cohere is looking for candidates with the following … your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization … services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computersecurity incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Twelve (12) years of related work experience in the field of security authorization. • A Bachelor's degree in ComputerMore ❯
In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware/software security implementations. • Knowledge of different communication protocols, encryption techniques/tools, and PKI and authorization … services. • Familiarity with security incident management, experience collaborating with Incident Response Teams, and able to provide viable recommendations for the resolution or computersecurity incidents and vulnerability compliance. • Experience creating and presenting documentation and management reports. Qualifications • Ten (10) years of related work experience in the field of security authorization. • A Bachelor's degree in ComputerMore ❯
Maintain the appropriate operational security posture for assigned systems, programs, and/or enclaves. • Provide guidance and technical expertise on all matters that impact or effect the security of the information system. • Assist in the development and execution of an enterprise level continuous monitoring program to minimize security risks and ensure compliance with that program on a … routine basis. • Developing, updating, and submitting the System Security Plan and other required documentation that make up the Security Authorization Package. • Conduct configuration management for security-relevant changes to software, hardware, and firmware. • Perform and deliver security impact analyses of changes to the system or its environment of operation. • Assess the effectiveness of system security controls on an ongoing basis to determine system security status. • Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments. • Provides configuration management for security-relevant information system software, hardware, and firmware. " Education and Experience: • 10 years of related work experience in the field of security authorization. • A Bachelor More ❯
Linthicum Heights, Maryland, United States Hybrid / WFH Options
Artech Information Systems
Perform as a Linux/Redhat systems administrator for a classified government contract. • Perform as a Windows Systems Administrator for a classified government contract. • Maintain smooth operation of all computer infrastructure in a multi-user computer system environment, including coordination of efforts with systems, software, and electrical design engineers, Information Systems Security Officers, PC desktop technicians, end … management. • Provide backup and recovery services, manage data storage devices, and implement/upgrade/update virus and malware protection on a routine basis. • Create and maintain user and computer accounts and modify file permissions and security access lists. • Test new releases of products to ensure compatibility and minimize user impact. • Develop and document technical processes and procedures … Make recommendations to purchase hardware, software, and system components. • Interact, meet, discuss, and troubleshoot issues with vendors and evaluate vendor products, services, and suggestions. • Adhere to strict Information Systems security guidelines in all cases. • Deploy new STIGs & work with IT/IA to develop POA&Ms for vulnerabilities that cannot be mitigated or STIG settings that cannot be applied. More ❯
Java Full Stack Developer Job Location: Chantilly, VA Active Top Secret or TS/SCI security clearance. Need to have Current Poly or consent to Poly at briefing. Job Description: Cohere is looking for a self-starting, team-oriented Mid-to-Senior Software Engineer to join our dynamic development team in supporting a Government customer. The team is building … similiar Experience in development and usage with RESTful web services Frontend: Experience with development using Angular 3+ front-end web application platform or similar web framework Qualifications: B.S. degree Computer Science, Systems Engineering, Information Systems, Computer Engineering, or a related discipline and 12 years of experience or Master's degree and 10 years of experience. 10 plus years … similar web framework. Experience with middle tier messaging systems, Kafka, Active MQ or similiar and development and usage with RESTful web services Active Top Secret or TS/SCI security clearance. Need to have Current Poly or consent to Poly at briefing. Preferred Qualifications: 4+ years' experience working on a program following SAFe Methodology. Compensation: Cohere knows that our More ❯
lifecycle. Work with the engineering team to execute timely and cost-effective solutions. Provide on-going support and maintenance to the customer as needed. Requirements: Active TS/SCI Security clearance Bachelor's degree in Computer Science or a related field is preferred Five years of experience is required Knowledge of all engineering tools and applications and programming … your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
provide technical assistance for a variety of problems Adapt to new information, changing conditions, and unexpected obstacles You're required to have this Prior exploitation analyst experience Knowledge of computersecurity principles, vulnerability analysis, and exploitation methods Deep knowledge of the concepts, principles, and methods for network connectivity (e.g., TCP/IP, DNS, TLS, etc.) This position requires … the successful candidate to obtain and maintain an active federal security clearance, TS/SCI clearance with a poly is required You could also have this: Open-source research background Experience using learning management systems to conduct technical training Experience with Jupyter Notebooks and Python scripting Customer enterprise tool expertise Salary Range: $85,000 - $205,000 The BlueHalo, an … an AV Company, Intelligence Systems BlueHalo, an AV Company, Intel division provides specialized operational support, services and technology to plan, design, develop and execute critical missions in the national security community. BlueHalo, an AV Company, generates actionable insights from analytics through a suite of operationalized AI/ML tools for data collection/ingestion and subsequent text, geospatial, time More ❯
of low-level CPU and system aspects is a plus. Clearance: No clearance is required. However, we seek individuals that have an appropriate background for obtaining a high-level security clearance. The Role This position is for an Embedded Systems Software Developer position. Applicants should have an understanding of kernels, micro-kernels, and/or RTOS internals, including using … OS APIs and security boundaries available in the hardware. As an Embedded Systems Software Developer, you develop capabilities in support of operations. Your primary focus will be developing tools and applications that work in both user and kernel space. You will play a crucial role in developing custom capabilities used on live systems especially focused on protecting system. You … will be a key player supporting national security interests. Requirements and Skills: When assessing candidates for the Embedded Systems Software Developer position, Cohere is looking for candidates with the following knowledge, skills, and abilities: Software - Candidates should be able to demonstrate extensive experience coding in C/C++ and Python, including understanding Object Oriented Programming, Networking (sockets), Multithreading, and More ❯
work in both user and kernel space. You will play a crucial role in developing custom capabilities used on live systems. You will be a key player supporting national security interests. This position requires a TS/SCI clearance. Cohere will sponsor qualified individuals on a case-by-case basis. Requirements and Skills When assessing candidates for the CNO … your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
to provide customized Dashboards for senior management and government clients. Demonstrated experience developing new and enhancing existing UIs for Web applications Demonstrated experience creating secure applications systems utilizing IC security guidelines and utilizing Customer Authentication and Authorization systems. Demonstrated experience supporting Web development with projects based on an Agile methodology. Demonstrated experience developing graphics, newsletters, brochures, banners, posters and … your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
your own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computersecurity and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
the robustness of communication technologies to attack. Furthermore, the project will examine the suitability of emerging network management approaches, which aim to minimise operational overheads, to realise important communication security and resilience requirements for new nuclear designs. The outcomes from this project are essential to the success of enabling new operating concepts and fleet management approaches. This project is … Doctoral Training) and sponsored by UKNNL . It is expected that this PhD project will contribute to a new International Atomic Energy Agency (IAEA) project that is investigating the computersecurity of SMRs . For informal enquiries, please contact Professor Paul Smith ( paul.smith@lancaster.ac.uk ) Candidates interested in applying should first send an email expressing interest to saturn@manchester.ac.uk More ❯
Apply to: IT Service Desk Analyst Apprentice (Fittleworth Medical Ltd) Apply From: 13/12/2024 Vacancy Description Setting up new PC’s, installing, configuring and supporting computer hardware, software, operating systems and applications. Setting up new users to the network and de-activating leavers. Logging support requests and managing the ticketing system. Coordinating tests and troubleshooting with … Assist in the upkeep and maintenance of IT inventory. To set up, maintain, and organise repairs for various computing, audio, visual and telephone equipment. To maintain high standards of computersecurity and safety in line with the Company’s IT Procedure. Taking ownership of and working proactively on support queries; developing the skills to complete resolution of incidents … Interview Begin From Possible Start Date 2025-01-13 00:00:00 Learning Provider FIREBRAND TRAINING LIMITED Skills Required Communication skills, Problem solving skills, Good computer literacy, Microsoft Word, Office & Excel, Microsoft Outlook, Troubleshooting skills, Logical & analytical thinker, Strong numerical skills, An effective collaborator, Interpersonal skills, Ambitious, Positive team player, Can do attitude, Customer focused, Self motivated, Ability to More ❯
Job Number: 72 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITY OFFICER - FLORIDA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: On-site Job Location: FL Tyndall AFB Salary: 100k - 150k Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Ensure appropriate security controls … are in place that will safeguard digital files and vital electronic infrastructure Respond to computersecurity breaches and viruses Implement information system security requirements, system security plans, assist with the development of ATO packages and ensure all auditing requirements are completed Ensure all system security procedures are followed including updates to system security software … to antivirus definition files, and ensuring audit files are maintained and reviewed Interface regularly to address any issues and ensure compliance with all pertinent regulations related to information system security Provide IAO/ISSM functions necessary to maintain mission effectiveness Requirements BS degree 5-9 years of experience Experience assisting in the development of ATO packages Experience as a More ❯
technologies. Our vision: to co-build a structure of experts where intrapreneurship, knowledge-sharing, and a human-centered approach are the fundamental pillars. We are looking for a Cyber Security Engineer (Endpoint) to support critical missions within NATO. You will be part of a multidisciplinary international team, contributing to the development and maintenance of secure, high-availability applications in … of configuration, installation, and user documentation. Monitor the cybersecurity threat landscape-particularly malware trends-and track developments in emerging endpoint protection technologies. Perform configuration audits to ensure compliance with COMPUSEC measures, directives, and procedures across NATO CIS endpoints. Provide expert advice and technical support to NATO CIS administrators and IT security officers regarding endpoint protection. Support the NATO Cyber … Security Centre (NCSC) by providing security analyst expertise for incident handling and response. Maintain and update endpoint security configurations and associated documentation for NATO CIS systems. Review technical documentation intended for publication or delivery to NCIA customers as part of project outputs. Offer cybersecurity consulting and guidance to projects, plans, and technical teams. Collaborate with system and More ❯
Join to apply for the Head of Security Operations role at Votre Sommelier We are seeking a dynamic and experienced Head of Security Operations to lead and mature our security operations function. This pivotal role will be responsible for defining and driving the overall security operations strategy and lifecycle, ensuring the protection of our critical assets … and data. The ideal candidate will possess deep expertise in vulnerability management, threat intelligence, security operations centre (SOC) management, and incident response. This leader will build and mentor high-performing teams, optimise processes, and proactively mitigate security risks in ASOS's evolving environment. Day To Day Responsibilities: Develop and implement a comprehensive security operations strategy aligned with … the company's risk appetite and business objectives. Define and maintain the security operations roadmap, prioritising initiatives and resource allocation. Stay abreast of emerging threats, technologies, and industry best practices, and translate them into actionable strategies. Provide leadership and direction to the leads of the functional areas. Lead the Cyber Defence function that includes Security Operations, IAM, Vulnerability More ❯