Insight Global is actively hiring a Cybersecurity Strategist & Technical Analyst to join our team supporting a large DoD Program out of Fort Meade, MD. In this role, you will play a critical role in supporting the command's cybersecurity posture through both hands-on technical expertise and strategic planning. You'll work across multiple concurrent projects, contributing to the development … demands a proactive learner who thrives in dynamic environments and can translate complex cybersecurity concepts into actionable strategies. The selected candidates will provide holistic enterprise defensive strategies for enterprise cybersecurity capabilities implemented within the infrastructure to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. You will provide analysis of architectures, technologies, policies, information … access points, and endpoints. Minimum job requirements include: - An Active TS/SCI Clearance - IAT Level II Certification (Security+ or Similar) - Bachelors and 4-12 YOE in a technical cybersecurity role. (Experience can be used in lieu of a degree) - A broad understanding of Cybersecurity and DoD Operations including Network Security, Vulnerability Management, Cloud Security, and Incident Response. - Familiarity More ❯
As a cybersecurity engineer, you'll help tackle a diverse set of challenging technical and engineering activities in a collaborative, Agile environment, leveraging technical and interpersonal skills in a structured team framework. The position involves aiding testing efforts and related activities across multiple platforms and technologies- like embedded hardware, phased-array systems, space payloads, and radio frequency solutions, using advanced … techniques and methodologies. JOB DUTIES AND RESPONSIBILITIES • Design and deploy anti-tamper and embedded cybersecurity frameworks for DoD-focused product lines. • Lead software analysis, code analysis, requirements analysis, software review, and interface design to ensure secure systems. • Design, code, and debug applications in C/C++, Python, and Shell Scripting, with a focus on secure software development. • Manage Linux distributions … environment, leveraging Agile methodologies and tools like Jira, Confluence, Docker, and GitLab. JOB REQUIREMENTS AND MINIMUM QUALIFICATIONS • Bachelor's or higher degree in Computer Science, Software Engineering, or a CyberSecurity related field. • 9 years in software development or cybersecurity, with 5+ years in application security or system hardening in a senior role. • Expertise in software analysis, code analysis, requirements More ❯
or 9 years and bachelors degree of related professional work experience to support our long term contract with a DoD customer onsite in Colorado Spring, CO. Job Duties: Provide Cybersecurity Systems Engineering (CSSE) knowledge and expertise for the program MILSATCOM systems to: Maintain awareness of current and emerging Cyber threats Assist with the analysis of Cyber threats and help determine … by DoD provided defensive cyber operations (DCO). Analyzing, reporting, and summarizing DISA Endpoint Security Solution (ESS) data Perform primary operational point of contact duties for the program's cybersecurity defense suite of tools, known as Cybersecurity Subsystem (CSS) Manage CSS accounts, accesses, and monitoring dashboards Provide Tier 1 troubleshooting for CSS tools (Splunk, DISA ACAS, DISA ESS) Provide CSSE … includes identified RMF package delivery dates), as provided in the prime contractor format, that captures the status of the submission frequency of the identified RMF artifacts per system sustainment cybersecurity-related activities being performed in accordance with this contract Creating and updating information system artifacts, such as hardware/software baselines, Ports, Protocols, and Services Management (PPSM), network diagrams, etc. More ❯
organization-wide security and privacy risk and update assessment results on an ongoing basis Perform system analysis and develop system test for cyber threats, cyber test activities, and the cybersecurity of large-scale events Support and facilitate various ATO/IATT packages including processing IAVMs and CTOs for the same Perform cyber risk assessments and develop risk mitigation plans (i.e. … to the Cyber Tools Documentation and verification of all installation and configuration steps for the labs and operations deliveries Providing feedback to Cyber Leadership and engineers to improve the cybersecurity tools and processes Collaborating with local Information System Security Officers (ISSOs) to ensure compliance with relevant cybersecurity standards and regulations Support cyber threat intelligence activities Support the development and maintenance More ❯
team. Barbaricum is seeking an Information System Security Manager (ISSM) to guide the delivery of secure systems within the Navy's Risk Management Framework (RMF). This role provides cybersecurity oversight and lifecycle documentation support to ensure sustained compliance and threat resilience. Responsibilities: Develop and submit RMF and DIACAP risk assessment packages Ensure systems and solutions meet DoD cybersecurity policy … and accreditation requirements Track system compliance status and coordinate with stakeholders to mitigate security gaps Maintain configuration management of security baselines and assess impacts of change Guide teams through cybersecurity audits and implement corrective action plans as needed Maintain continuing education hours and OJT milestones per DoD policy Qualifications: Active DoD Secret Clearance; TS eligible Bachelor's degree or equivalent … CNSSI/military certification 3+ years of specialized experience in Information Systems Security Management (72) One of the following certifications: Security+ (CE), CAP, CASP, or PMP Familiarity with NAVEDTRA cybersecurity evaluation requirements Commitment to maintaining 40+ hours of cybersecurity continuing education annually EEO Commitment All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national More ❯
DoDD 8140.01 and DoD 8570.01-M IAT Level III and CSSP Incident Responder. Job Duties: • Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cybersecurity incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government. • Coordinates with … incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis; • Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services; • Provides adversary attribution; • Performs malware analysis and signature … development; • Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent reoccurrence. Job Requirements: • Bachelors Degree and or 6 years' experience in CyberSecurity (CSOS) • Active TS/SCI, ability to obtain a polygraph • DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder. Provides input to and coordinates with More ❯
This includes, but not limited to, responsibilities established in DoDI 8500.01, AFI 17-101 and the activities related to maintaining situational awareness and initiating actions to improve or restore cybersecurity posture. WORK ENVIRONMENT This is an onsite position that requires work to be performed onsite in Colorado Springs, CO. Indoor office working conditions. PHYSICAL DEMANDS Must be able to sit … PM EST REQUIERMENTS: CERTIFICATION: CGRC/CAP or CASP+ or CCSP or Cloud+ or SSCP or Security+ or GSEC. REQUIED EDUCATION: Bachelor of Science degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science, from an Accreditation Board for Engineering and Technology (ABET) accredited or Certified Association Executive (CAE) designated institution preferred. EXPERIENCE: At least three years of More ❯
TS/SCI Position Expert CyberSecurity Engineers capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration. Location: Chantilly, VA/Patriot Ridge (Springfield, VA) Duties: Assists with leading development teams working to design and develop information systems or upgrade … into system security designs and processes. Assists with leading the development and documentation of Security Architectures, Roadmaps, and investments. Oversees the work of Senior-, Mid-, and Junior-level contractor CyberSecurity Engineers. Required Skills & Experience: 18+ yrs experience Master's degree in Engineering, Computer Science, Information Technology, Management Information Systems, or related STEM degree program, or equivalent Expert level experience … as a CyberSecurity Engineer. Expert working experience in government or industry within CyberSecurity Engineering. DoD 8570 Level II (IASAE) certification compliance. Desired: Expert working experience in government or industry leading enterprise-level cybersecurity efforts involving architecting, designing, development, and configuration of cloud and on premise based systems and software. Experience engineering CyberSecurity solutions using Cloud Based More ❯
Labor Category: CyberSecurity Engineer Position Title: Information Systems Security Engineer Position Level: Level 3 - Senior Salary: Up to $170,000.00 per year Core Hours: 9am to 4pm Location: Chantilly VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. • Lead for automated security testing efforts leveraging Customers enterprise scanning tools • Responsible for creation and delivery … SSP) for A&A • Provides the required security education and plan to customer for the program • Authors and maintains the programs Automated Information Systems (AIS) Plan Details: Labor Category: CyberSecurity Engineer Position Title: Information Systems Security Engineer Position Level: Level 3 - Senior Salary: Up to $170,000.00 per year Core Hours: 9am to 4pm Location: Chantilly VA Mandatory Requirements More ❯
The Computer Operator IV supports Navy undersea range systems by managing servers, workstations, and networks. This role involves maintaining system security, installing and updating software, troubleshooting technical issues, and providing configuration management for range software and hardware. Key Responsibilities: • Provide More ❯
Apex Systems is currently hiring for CyberSecurity Engineer with a US Airforce Base based in Hampton, VA. Project Details/Mission Supported: • The resource will be responsible for supporting and administering of the following solutions: SCCM, McAfee EPO, McAfee Move, Tenable Nessus (ACAS), and LogRhythm for the Airforce Base. Qualified candidates will have the following experience and skills: • Security+ … CE ( IAT II Certification ) • 4+ Years of HBSS/ESS/ACAS/Endpoint Security/DLP or Similar • Able to ensure compliance with KR and DOD cybersecurity policies and procedures. • Able to review IaaS related software release notes and provide feedback for approval to load from a security-related perspective. Able to draft and brief reports on cyberMore ❯
we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking an CyberSecurity Specialist 4 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers More ❯
tech running smoothly-from desktops to servers-and elevating our systems to meet evolving business and security needs. You'll handle everything from system upgrades and workstation setup to cybersecurity and end-user training. You'll act as a subject-matter expert on core platforms like Windows, iOS, Microsoft 365, SharePoint, Google Workspace, and Adobe suite, ensuring both functionality and … improvements and business-critical IT tasks to boost productivity. Research, assess, and implement emerging hardware, software, and technologies. Act as SME for Windows, iOS, Microsoft, Adobe, Google Workspace. Manage cybersecurity tools, procedures, compliance, and SharePoint/Office 365 security. Install, configure, and support workstations, printers, phones, and mobile devices. Administer time & attendance and various business systems. Support Infor ERP and … asset database management. Participate in IT projects-documentation, training, testing, and rollout. Monitor and execute software/app upgrades to ensure compliance. Aid cybersecurity awareness efforts and sustain Cyber Essentials+ accreditations. Contribute to policy development by interpreting company IT guidelines. Skills & Qualifications Minimum five years' IT experience with hardware, software, and systems. Proven ability to liaise with third-party vendors More ❯
Policies & Procedures Act as an Escalation Point & Coordinate with other Teams when required Key Skills & Experience Required for Vulnerability Management Analyst role will include: Strong Understanding of Information/CyberSecurity Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with … Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information Security Engineer/Security Operations Analyst/SOC Engineer/CyberSecurity Engineer/SecOps Engineer/SecOps Analyst/SOC Analyst/Systems Administrator At SECURE, we value Attitude & Aptitude over Certifications. If you possess the drive and relevant experience … to deliver tangible results aligned with our clients needs, reach out. We embrace DE & I and welcome applications from underrepresented groups, minorities, women in cybersecurity, neurodiverse individuals, LGBTQ+ community members, veterans, and those from diverse socioeconomic backgrounds. Curious to learn more about the Company, Culture & Purpose? Apply Today to discover where your journey with us can lead. More ❯
Policies & Procedures Act as an Escalation Point & Coordinate with other Teams when required Key Skills & Experience Required for Vulnerability Management Analyst role will include: Strong Understanding of Information/CyberSecurity Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with … Attention to Detail Strong Team Player Searches: Vulnerability Management Analyst/VM Analyst/Information Security Analyst/Information Security Engineer/Security Operations Analyst/SOC Engineer/CyberSecurity Engineer/SecOps Engineer/SecOps Analyst/SOC Analyst/Systems Administrator At SECURE, we value Attitude & Aptitude over Certifications. If you possess the drive and relevant experience … to deliver tangible results aligned with our clients needs, reach out. We embrace DE & I and welcome applications from underrepresented groups, minorities, women in cybersecurity, neurodiverse individuals, LGBTQ+ community members, veterans, and those from diverse socioeconomic backgrounds. Curious to learn more about the Company, Culture & Purpose? Apply Today to discover where your journey with us can lead. More ❯
Centre, VoIP systems, and warehouse/dispatch operations. Maintained and troubleshooted printers, Wi-Fi, and barcode scanners. Installed, configured, and maintained software and hardware. Applied security patches and monitored cybersecurity systems. Supported Microsoft 365 and maintained IT asset inventory. Documented technical issues and ensured compliance with IT policies. Skills and Experience required to be considered for this IT Support Specialist … operating systems. Familiarity with Active Directory, and basic networking (TCP/IP, DNS, DHCP). Excellent customer service. Excellent troubleshooting, problem-solving, and communication skills. Understanding and awareness of CyberSecurity best practices. Ability to work independently and manage multiple tasks simultaneously If you feel like you meet the above criteria & would like to be considered for this IT Support More ❯
and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Tackling cybersecurity hurdles for organisations, particularly in Operational Technology (OT) Hybrid working with the team on client site or in our office a minimum of two days per week. However, the actual … your background might be better suited to. Security management of industrial control and operational technology systems and applications such as: Process control SCADA Distributed control PLCs and RTUs Industrial cybersecurity and data communications Electricity transmission and distribution network control. IoT and Industrial IoT Industrial cybersecurity risk management, architecture and security monitoring Key industries such as: Electricity generation, transmission More ❯
Demonstrate the ability to drive results, provide solutions, and prioritize multiple projects independently. Meet Grouper We are our customers' trusted partner in the exciting world of safeguarding data, strengthening cybersecurity, and strategic consulting. We lead the way in ensuring data integrity, securing information, and navigating regulatory compliance with confidence. With a blend of technical expertise and clever thinking, we redefine More ❯
Southampton, Hampshire, South East, United Kingdom
Sterling Bridge Limited
quality of its technical team. In this role, youll be pushed to develop your skills towards 3rd Line level within your first year. Youll receive structured training on Azure, CyberSecurity, M365, and more all fully funded. The team is young, driven, and highly technical, with regular social events and a culture that rewards achievement. They say youre the product … environment you want to be in if youre looking to level up fast. Exclusive Benefits: Highly competitive annual salary (£30,000 £35,000) Clear progression path into Azure/CyberSecurity Paid training & certifications (Azure, CyberSecurity & more) 30 days annual leave (+8 bank holidays) 10% pension contribution Social, collaborative team environment Key Requirements: MSP experience in a 2nd Line More ❯
CGI CyberSecurity Team in the UK is one of the largest Cyber consultancies in the UK with around 300 members. The UK Cyber team works across a variety of domains including: Government, Defence, Critical Infrastructure, Healthcare, Utilities, Banking and Financial Services and Many more. At CGI you will get the opportunity to work across a number of domains and … work in all areas of CyberSecurity allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, Penetration Testing … the criteria to obtain a UK Security Clearance. Your future duties and responsibilities An opportunity for an experienced penetration testers has become available due to growth, joining the CGI CyberSecurity business unit, one of the largest groups of cybersecurity specialists in the UK. CGI has a long established reputation in this area, undertaking rigorous testing for a variety More ❯
SecOps specialist with experience of both SecOps Analysis and Engineering to join a growing yet established firm at a crucial point as they completely build out their Information and CyberSecurity capability. Whilst they have the fundamentals in place, this is a relatively greenfield SOC buildout, where you will work alongside the SOC Manager to shape their SOC monitoring, detection … Mobile Payments FinTech firms build out their cyber defence capability and leave a lasting impact on one of the most reputable organisations whilst working alongside a team of genuine CyberSecurity SMEs, click the to apply or get in touch directly – j.dale@lawrenceharvey.com More ❯
detects external-facing security gaps and misconfigurations, ensuring timely escalation to relevant resolver teams for remediation Your skills and experiences: A extensive technical background with a detailed knowledge of cybersecurity, computer networks and operating systems Broad and detailed experience of technologies including but not limited to DNS, Certificate Transparency, firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server More ❯
greenfield environment, building compliant AI pipelines using Gemini (GCP), Azure OpenAI or Self Hosting embedding security and privacy controls from experimentation to production, in alignment with the bank's cybersecurity and regulatory standards. Accountabilities & Responsibilities Architect and implement secure AI services from lab to production, ensuring scalability and compliance Develop robust APIs for LLMs, RAG pipelines, agentic workflows and document … intelligence systems Embed cybersecurity and data privacy controls across all AI workflows (e.g., encryption, anonymisation, access logging) Collaborate with the CISO function on threat modeling, security reviews, and AI-specific control design. Integrate with enterprise IAM systems, enforcing RBAC, least privilege Conduct vulnerability scans, pen-test remediation, and support internal and regulatory audits (FCA, PRA) Required Knowledge & Experience Delivered greenfield … Context Protocol (MCP) to manage secure, auditable context injection across agentic systems Experience building RAG pipelines with strict data governance and contextual integrity Familiarity with EU AI Act, FCA cybersecurity principles, and oversight of critical systems Worked directly with cybersecurity and compliance teams in regulated deployments Implemented or maintained controls under ISO 27001, NIST, or SOC2 frameworks Technical Skills & Technologies More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Synoptix Limited
Designing requirements and architecture across a large, complex naval programme, managing the complexity inherent in programmes. - Developing training and development packages for the NHS around applied systems thinking. - Providing cybersecurity threat modelling and secure-by-design expertise to a large cancer care AI startup. Day to day tasking can include: - Support and work on a number of our projects helping More ❯
greenfield environment, building compliant AI pipelines using Gemini (GCP), Azure OpenAI or Self Hosting embedding security and privacy controls from experimentation to production, in alignment with the bank's cybersecurity and regulatory standards. Accountabilities & Responsibilities Architect and implement secure AI services from lab to production, ensuring scalability and compliance Develop robust APIs for LLMs, RAG pipelines, agentic workflows and document … intelligence systems Embed cybersecurity and data privacy controls across all AI workflows (e.g., encryption, anonymisation, access logging) Collaborate with the CISO function on threat modeling, security reviews, and AI-specific control design. Integrate with enterprise IAM systems, enforcing RBAC, least privilege Conduct vulnerability scans, pen-test remediation, and support internal and regulatory audits (FCA, PRA) Required Knowledge & Experience Delivered greenfield … Context Protocol (MCP) to manage secure, auditable context injection across agentic systems Experience building RAG pipelines with strict data governance and contextual integrity Familiarity with EU AI Act, FCA cybersecurity principles, and oversight of critical systems Worked directly with cybersecurity and compliance teams in regulated deployments Implemented or maintained controls under ISO 27001, NIST, or SOC2 frameworks Technical Skills & Technologies More ❯