Job Number: 336 Job Category: GovTech Job Title: CYBERSECURITY NETWORK ANALYST (336) - MARYLAND -URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 158K-175K Background Experience with computer network exploitation, construction, and diagnostics of computer networks, network analysis, network threats and risks, incident response, and … range of operating system Requirements Bachelor's degree in software engineering, computer science, engineering, or related field from an accredited college or university 2 years of demonstrated experience in cybersecurity techniques and network analysis; 3 years of demonstrated experience in intrusion analysis and incident responses Preferred Demonstrated experience with TCP/IP fundamentals, Windows and Linux/Unix Operating Systems More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
to transform how knowledge is shared, applied and enhanced. About the team: The security team, part of Group CTO, protects UK Education and Research against a wide range of cybersecurity threats, supporting our members and customers in improving their digital resilience. Our products and services are currently organised into five principal groups: Protective services, Professional services, Service Team, Product … monitoring. The Security Services Team includes network, SIEM and SOC focused services, service development, transition and delivery. This is where this role sits. About the role: As Jisc's Cybersecurity service manager, you will be responsible for service management activities in the delivery of the security operations centre (SOC). The primary focus is on guiding customers through the More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
Sparta Global is looking for passionate and committed individuals who want to kickstart a career in technology! You must be willing to complete full-time training, and will then be assigned to work in a role with one of our More ❯
Systems Security Engineer 2 The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and … security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Build Cybersecurity into systems deployed to operational environments. Assist architects and systems developers in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise … as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments. • Apply knowledge of Cybersecurity policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments. • Interact with the customer and other project team members. • Participate as the primary securityMore ❯
Position Overview: We are seeking a mission-focused Information Systems Security Engineer (ISSE) to join our cybersecurity team supporting Department of Defense (DoD) systems. The ideal candidate will provide technical expertise in the design, implementation, and assessment of system security measures across the full system development lifecycle. This role is critical to ensuring the confidentiality, integrity, and availability of DoD … to harden systems and assess compliance. Provide technical consultation on the integration of new technologies into existing environments. Required Qualifications: Active DoD Secret Clearance. 5+ years of experience in cybersecurity or information assurance engineering. Strong working knowledge of the Risk Management Framework (RMF), NIST 800-53, and DoD security policies. Experience with vulnerability assessment tools such as ACAS, Nessus, and … STIG Viewer. Ability to develop, interpret, and analyze cybersecurity documentation and artifacts. Preferred Qualifications: CISSP, CAP, or equivalent cybersecurity certification. Experience supporting classified DoD environments. Familiarity with DevSecOps practices and secure cloud architecture. Knowledge of cross-domain solutions and enclave segmentation. Work Environment & Conditions: On-site role in Colorado Springs, CO. Some after-hours or on-call support may be More ❯
Location: This role offers flexibility to work remotely, with occasional visits to client sites. Alternatively, you can choose a hybrid arrangement and work from our offices in Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired More ❯
Location: This role offers flexibility to work remotely, with occasional visits to client sites. Alternatively, you can choose a hybrid arrangement and work from our offices in Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Location: This role offers flexibility to work remotely, with occasional visits to client sites. Alternatively, you can choose a hybrid arrangement and work from our offices in Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired More ❯
This role offers flexibility to work remotely, with occasional visits to client sites. Alternatively, you can choose a hybrid arrangement and work from our offices in Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by More ❯
Clearance Required) Location: Greater Boston, MA (Onsite) Length: 3+ years Job Description: Our client is seeking a skilled and motivated Information Systems Security Officer (ISSO) to join their dynamic Cybersecurity Team. This role is crucial in maintaining and developing our Information Security (IS) program and ensuring compliance with established security policies and procedures. The ISSO will be responsible for overseeing … through continuous security assessments and audits. • Conduct system vulnerability scanning, configuration assessment, and remediation to maintain system integrity and security. Qualifications: • Bachelor's degree in Computer Science, Information Systems, Cybersecurity, or a related field is required. • Proven experience in cybersecurity, risk management, or information security roles, particularly in relation to system security, vulnerability management, and compliance activities. • Strong knowledge of … and propose effective solutions. • Excellent communication skills to interact with key stakeholders and provide clear security documentation and reports. • A minimum of Security+ certification (8570 compliance) is required. Additional cybersecurity certifications are a plus. • Due to the nature of the work, a Top-Secret (TS) clearance with SCI eligibility is required. Candidates may be required to undergo a CI polygraph More ❯
of the team building and maintaining the critical classified infrastructure. This will provide the opportunity to work with and learn from some of the world's best engineers and cybersecurity professionals as the team implements cutting-edge systems are implemented. You will work directly with customers and systems deployed across the globe in support of national security missions all while … gaining invaluable experience navigating complex cybersecurity regulation frameworks. RESPONSIBILITIES: • Provide 1st and 2nd tier IT support to the Company's employees across classified systems. • Install, operate, maintain and troubleshoot air-gapped classified IT systems consisting of a variety of operating systems and hardware. • Provide on-call, on-site IT support (in accordance with a predefined schedule). • Write instructional documentation More ❯
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
Description: The Security Engineering and Operation Lead will be located at the NOAA Cybersecurity Center (NCSC) in Boulder, CO or Fairmont, WV, with the authority to oversee the site's IT operations in support of the NCSC mission. This leadership position involves managing the operation and maintenance of the Boulder and Fairmont sites, as well as providing oversight for the … particularly with NOAA or other federal agencies. - Familiarity with Trusted Internet Connections Access Provider (TICAP) infrastructure. - Experience in long-range IT systems planning and modernization efforts. - Knowledge of relevant cybersecurity frameworks and compliance standards. - Experience with IT service management (ITSM) tools and best practices. Eligibility requirements apply to some benefits and may depend on your job classification and length of More ❯
differing data protection/classification requirements Support ATO accreditation with analyzing security scans, organizational policies, and perform continuous monitoring Provide security planning, assessment, risk analysis, and risk management Recommend cybersecurity-enabled products to implement security measures that provide confidentiality, integrity, availability, authentication and non-repudiation. Perform/support or review security assessments to identify IA vulnerabilities or non-compliances and More ❯
Details 1) Strong network engineering background 2) Strong Firewall experience - Palo Alto 3) Endpoint device host-based security 4) IPsec tunnels Secondary Skills - Nice to Haves Security Information securityCybersecurity Job Description Design, build, test, and deploy new security technologies, which include the development of the operational manual and run books Provides technical security operations engineering services to support More ❯
common use cases as well as drive standardization of security controls and practices across the enterprise cloud environment. WHAT YOU OFFER successfully completed Bachelor's degree in computer science, cybersecurity, information technology or a related field of study 5+ years of experinece in cloud security with a focus on AWS services extensive experience in cloud security architecture with deep expertise More ❯
analyst or similar in a government setting Proficient with government security frameworks, policies and standards (e.g. PSPF, ISM, DSPF. ASD Essential Eight) PREFERRED QUALIFICATIONS Degree or equivalent experience in (CyberSecurity, IT Security Management, Government Security, Personnel Security, Security Risk Management) a related security field Certificate IV in Government Security (Personnel Vetting) An entrepreneurial spirit; a passion to improve at More ❯
Position Title: ISSO - Information Assurance Clearance: Secret/Location: APG Education: Bachelor's Degree in CyberSecurity, Computer Science, Information Systems, Engineering, or related scientific or technical discipline. (Can be substituted with an additional 5 years of related Information Assurance experience and CISSP, CISM, CAP, CeH, or equivalent certifications.) Position Overview: We are looking for an experienced Information Assurance Specialist … to provide architecture support, certification and accreditation (C&A) expertise, and manage security monitoring activities. The role requires comprehensive experience in DoD cybersecurity authorization processes, familiarity with relevant Army and DoD regulations, and the ability to manage test events and cybersecurity monitoring. Key Responsibilities: Provide Information Assurance (IA) architecture support and facilitate certification and accreditation (C&A) processes. Conduct security … with engineering teams to ensure system designs meet the Risk Management Framework (RMF) subsystem requirements, ensuring alignment with The Federal Information Security Management Act (FISMA) and DoD and Army cybersecurity policies and regulations. Support the design, development, and implementation of IA programs for identity and access management (IAM), Public Key Infrastructure (PKI), cyber situational awareness, and defensive cyber infrastructure and More ❯
Conducting vulnerability assessments and penetration tests to identify and mitigate security risks ️ Collaborating with IT teams to implement secure configurations and ensure best practices are followed ️ Developing and enforcing cybersecurity policies, standards, and procedures to enhance overall security posture What We're Looking For: ️ Proven experience as a Cybersecurity Specialist or in a similar role within IT security ️ Strong knowledge … of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to defend against cyber threats More ❯
Are you ready to start a cybersecurity career The demand for newly trained and qualified CyberSecurity professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits. Companies across the globe try to protect themselves from an increase in cyber attacks. We help you develop the skills required with three globally recognised qualifications, real-world … guarantee on completion. Newto Training can support you at any stage of your career journey whether you’re new to the industry or looking to exchange your skills, this CyberSecurity course is designed to get you job-ready. Within our CyberSecurity career programme, you will: 100+ hours of live instructor-led online training 3 certifications: Microsoft Azure Fundamentals … if you think you have the soft skills (communication skills, passion) needed then we can help you launch the career you want. Click 'Apply Now’ to begin your new cybersecurity career More ❯
Cybersecurity Director - UK Region Reporting to the EMEA Regional Security Officer, this role is key in managing the regional and solution line operational security risk levels within acceptable parameters through leading remediation programs and deploying Global Cybersecurity Services (GCS) controls. The role acts as a primary contact for all Cybersecurity matters, requiring a broad understanding of security controls and their … will look like The RSO service provides a regional/sub-regional/solution line connection to GCS to ensure appropriate leverage for risk mitigation. The security services include: Cybersecurity Leadership: Provide cybersecurity reporting to leadership committees and Boards. Represent cybersecurity to regulatory bodies. Own and manage the cybersecurity strategy for the area, leveraging GCS services and promoting local control … adoption. Oversee the colleague security culture program. Represent the region in security incident management. Manage remediation efforts, e.g., internal audit findings. Ensure cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee. Track remediation of audit and compliance findings. Review cybersecurity metrics and lead remediation programs. Lead or sponsor cybersecurity initiatives. Coordinate with Data Privacy to ensure More ❯
about the role Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing security consulting, solutions and services to organisations around the globe. We strive to protect freedom and build a safer digital society. We are looking for a Senior SecurityConsultant ( SASE )to join our team in the UK. Working as a Senior SecurityConsultant ( SASE ) We … are seeking a skilled and experienced Senior Security Consultant to join our Presales team.This role requires a strong understanding of cybersecurity, with expertise in SASE (Secure Access Service Edge) and Next Generation Firewall (NGFW) solutions, particularly across Netskope, ZScaler, Palo Alto SASE products (Prisma Access, Prisma SD-WAN), and firewalls including Checkpoint, Fortinet, and Palo Alto. The ideal candidate will … Prisma SASE) are highly desirable. Bachelor's degree in information security, Computer Science, or a related field (or equivalent experience). By joining one of the world's leading cybersecurity companies, you will be offered the following: An opportunity to join a forward-thinking company, and a supportive work environment Competitive salary Private medical healthcare Health cash plan Company More ❯
IT Security Specialist Purpose of the job We seek an experienced IT Security Specialist to lead our cybersecurity efforts, protecting systems, networks, and data. This role involves developing security policies, responding to incidents, ensuring regulatory compliance, and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies, standards, and procedures. Lead … Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect data. Manage the organization's cybersecurity compliance with relevant regulations, including ISO 27001/NIS2/Dora requirements. Collaborate with IT and business teams to design secure systems and enhance network security. Conduct employee training sessions … management on security status, incidents, and remediation efforts. Stay up-to-date with evolving cyber threats, technologies, and regulatory requirements to proactively address risks. Requirements Experience: +3 years in cybersecurity, ideally within consulting, with expertise across the following areas: Cloud Security: In-depth experience with Microsoft Azure and an affinity for cloud security best practices. Information Security Knowledge: Strong knowledge More ❯
our vision is to become ‘the most valued network in the profession’. The primary purpose of this role is to support Grant Thornton International Ltd.’s internal cybersecurity adversarial exposure programme, which monitors and validates the technical exposure of our global network of Member Firms against real world cybersecurity threats. The ideal candidate will have experience with attack surface … discovery, exposure management, security controls validation and threat intelligence technologies. Reporting directly to the Director of Cybersecurity Programmes within our compliance workstream, the candidate will bring a strong technical background, combined with an articulate risk profiling mindset. Main Responsibilities The Senior Associate will support with the implementation of the global adversarial exposure programme, including: Security Testing Continuously discover external assets … to initiate and lead conversations with various stakeholders Ability to prioritise and manage a varying workload Experience - desirable Operational delivery of red teaming or penetration testing exercises Understanding of cybersecurity best practices including knowledge of the general cyber threat landscape and common security controls architecture. Due to the global scope of the role, any multi-language capability would be More ❯