of the team building and maintaining the critical classified infrastructure. This will provide the opportunity to work with and learn from some of the world's best engineers and cybersecurity professionals as the team implements cutting-edge systems are implemented. You will work directly with customers and systems deployed across the globe in support of national security missions all while … gaining invaluable experience navigating complex cybersecurity regulation frameworks. RESPONSIBILITIES: • Provide 1st and 2nd tier IT support to the Company's employees across classified systems. • Install, operate, maintain and troubleshoot air-gapped classified IT systems consisting of a variety of operating systems and hardware. • Provide on-call, on-site IT support (in accordance with a predefined schedule). • Write instructional documentation More ❯
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
Description: The Security Engineering and Operation Lead will be located at the NOAA Cybersecurity Center (NCSC) in Boulder, CO or Fairmont, WV, with the authority to oversee the site's IT operations in support of the NCSC mission. This leadership position involves managing the operation and maintenance of the Boulder and Fairmont sites, as well as providing oversight for the … particularly with NOAA or other federal agencies. - Familiarity with Trusted Internet Connections Access Provider (TICAP) infrastructure. - Experience in long-range IT systems planning and modernization efforts. - Knowledge of relevant cybersecurity frameworks and compliance standards. - Experience with IT service management (ITSM) tools and best practices. Eligibility requirements apply to some benefits and may depend on your job classification and length of More ❯
differing data protection/classification requirements Support ATO accreditation with analyzing security scans, organizational policies, and perform continuous monitoring Provide security planning, assessment, risk analysis, and risk management Recommend cybersecurity-enabled products to implement security measures that provide confidentiality, integrity, availability, authentication and non-repudiation. Perform/support or review security assessments to identify IA vulnerabilities or non-compliances and More ❯
Details 1) Strong network engineering background 2) Strong Firewall experience - Palo Alto 3) Endpoint device host-based security 4) IPsec tunnels Secondary Skills - Nice to Haves Security Information securityCybersecurity Job Description Design, build, test, and deploy new security technologies, which include the development of the operational manual and run books Provides technical security operations engineering services to support More ❯
common use cases as well as drive standardization of security controls and practices across the enterprise cloud environment. WHAT YOU OFFER successfully completed Bachelor's degree in computer science, cybersecurity, information technology or a related field of study 5+ years of experinece in cloud security with a focus on AWS services extensive experience in cloud security architecture with deep expertise More ❯
analyst or similar in a government setting Proficient with government security frameworks, policies and standards (e.g. PSPF, ISM, DSPF. ASD Essential Eight) PREFERRED QUALIFICATIONS Degree or equivalent experience in (CyberSecurity, IT Security Management, Government Security, Personnel Security, Security Risk Management) a related security field Certificate IV in Government Security (Personnel Vetting) An entrepreneurial spirit; a passion to improve at More ❯
Position Title: ISSO - Information Assurance Clearance: Secret/Location: APG Education: Bachelor's Degree in CyberSecurity, Computer Science, Information Systems, Engineering, or related scientific or technical discipline. (Can be substituted with an additional 5 years of related Information Assurance experience and CISSP, CISM, CAP, CeH, or equivalent certifications.) Position Overview: We are looking for an experienced Information Assurance Specialist … to provide architecture support, certification and accreditation (C&A) expertise, and manage security monitoring activities. The role requires comprehensive experience in DoD cybersecurity authorization processes, familiarity with relevant Army and DoD regulations, and the ability to manage test events and cybersecurity monitoring. Key Responsibilities: Provide Information Assurance (IA) architecture support and facilitate certification and accreditation (C&A) processes. Conduct security … with engineering teams to ensure system designs meet the Risk Management Framework (RMF) subsystem requirements, ensuring alignment with The Federal Information Security Management Act (FISMA) and DoD and Army cybersecurity policies and regulations. Support the design, development, and implementation of IA programs for identity and access management (IAM), Public Key Infrastructure (PKI), cyber situational awareness, and defensive cyber infrastructure and More ❯
Conducting vulnerability assessments and penetration tests to identify and mitigate security risks ️ Collaborating with IT teams to implement secure configurations and ensure best practices are followed ️ Developing and enforcing cybersecurity policies, standards, and procedures to enhance overall security posture What We're Looking For: ️ Proven experience as a Cybersecurity Specialist or in a similar role within IT security ️ Strong knowledge … of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to defend against cyber threats More ❯
Are you ready to start a cybersecurity career The demand for newly trained and qualified CyberSecurity professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits. Companies across the globe try to protect themselves from an increase in cyber attacks. We help you develop the skills required with three globally recognised qualifications, real-world … guarantee on completion. Newto Training can support you at any stage of your career journey whether you’re new to the industry or looking to exchange your skills, this CyberSecurity course is designed to get you job-ready. Within our CyberSecurity career programme, you will: 100+ hours of live instructor-led online training 3 certifications: Microsoft Azure Fundamentals … if you think you have the soft skills (communication skills, passion) needed then we can help you launch the career you want. Click 'Apply Now’ to begin your new cybersecurity career More ❯
Cybersecurity Director - UK Region Reporting to the EMEA Regional Security Officer, this role is key in managing the regional and solution line operational security risk levels within acceptable parameters through leading remediation programs and deploying Global Cybersecurity Services (GCS) controls. The role acts as a primary contact for all Cybersecurity matters, requiring a broad understanding of security controls and their … will look like The RSO service provides a regional/sub-regional/solution line connection to GCS to ensure appropriate leverage for risk mitigation. The security services include: Cybersecurity Leadership: Provide cybersecurity reporting to leadership committees and Boards. Represent cybersecurity to regulatory bodies. Own and manage the cybersecurity strategy for the area, leveraging GCS services and promoting local control … adoption. Oversee the colleague security culture program. Represent the region in security incident management. Manage remediation efforts, e.g., internal audit findings. Ensure cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee. Track remediation of audit and compliance findings. Review cybersecurity metrics and lead remediation programs. Lead or sponsor cybersecurity initiatives. Coordinate with Data Privacy to ensure More ❯
about the role Orange Cyberdefense is the expert cybersecurity business unit of the Orange Group, providing security consulting, solutions and services to organisations around the globe. We strive to protect freedom and build a safer digital society. We are looking for a Senior SecurityConsultant ( SASE )to join our team in the UK. Working as a Senior SecurityConsultant ( SASE ) We … are seeking a skilled and experienced Senior Security Consultant to join our Presales team.This role requires a strong understanding of cybersecurity, with expertise in SASE (Secure Access Service Edge) and Next Generation Firewall (NGFW) solutions, particularly across Netskope, ZScaler, Palo Alto SASE products (Prisma Access, Prisma SD-WAN), and firewalls including Checkpoint, Fortinet, and Palo Alto. The ideal candidate will … Prisma SASE) are highly desirable. Bachelor's degree in information security, Computer Science, or a related field (or equivalent experience). By joining one of the world's leading cybersecurity companies, you will be offered the following: An opportunity to join a forward-thinking company, and a supportive work environment Competitive salary Private medical healthcare Health cash plan Company More ❯
IT Security Specialist Purpose of the job We seek an experienced IT Security Specialist to lead our cybersecurity efforts, protecting systems, networks, and data. This role involves developing security policies, responding to incidents, ensuring regulatory compliance, and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies, standards, and procedures. Lead … Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect data. Manage the organization's cybersecurity compliance with relevant regulations, including ISO 27001/NIS2/Dora requirements. Collaborate with IT and business teams to design secure systems and enhance network security. Conduct employee training sessions … management on security status, incidents, and remediation efforts. Stay up-to-date with evolving cyber threats, technologies, and regulatory requirements to proactively address risks. Requirements Experience: +3 years in cybersecurity, ideally within consulting, with expertise across the following areas: Cloud Security: In-depth experience with Microsoft Azure and an affinity for cloud security best practices. Information Security Knowledge: Strong knowledge More ❯
our vision is to become ‘the most valued network in the profession’. The primary purpose of this role is to support Grant Thornton International Ltd.’s internal cybersecurity adversarial exposure programme, which monitors and validates the technical exposure of our global network of Member Firms against real world cybersecurity threats. The ideal candidate will have experience with attack surface … discovery, exposure management, security controls validation and threat intelligence technologies. Reporting directly to the Director of Cybersecurity Programmes within our compliance workstream, the candidate will bring a strong technical background, combined with an articulate risk profiling mindset. Main Responsibilities The Senior Associate will support with the implementation of the global adversarial exposure programme, including: Security Testing Continuously discover external assets … to initiate and lead conversations with various stakeholders Ability to prioritise and manage a varying workload Experience - desirable Operational delivery of red teaming or penetration testing exercises Understanding of cybersecurity best practices including knowledge of the general cyber threat landscape and common security controls architecture. Due to the global scope of the role, any multi-language capability would be More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom
Nominate Recruitment Ltd
is a fantastic opportunity to join a dynamic and future-focused business, working in a fast-paced, innovative environment that is genuinely a great place to work. Job Duties: Cybersecurity Oversight : Leads the implementation and ongoing oversight of the Cyber Assessment Framework, ensuring the organisation’s systems and data remain secure and compliant. Audit Leadership : Organises and manages critical audits … security skills - ability to manage complex security environment across a hybrid of on-premises and cloud solutions. Ability to adopt, oversee, and drive the implementation of information security and cybersecurity tools, ensuring alignment with business objectives and risk posture. Microsoft Office Suite - presentation skills, excel skills for documentation and tracking, and word for formal business policy/procedure development. More ❯
Job Description Job Purpose The ICE Cybersecurity Digital Forensics and Incident Response (DFIR) team is responsible for defending critical financial infrastructure from Global Cyber threats. We leverage an evolving arsenal of controls that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and More ❯
the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO In our team you will learn: You will have a CyberSecurity background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will … threats within client environments highlighting any identified risks Collaborate with security detection engineers to design and implement customised detection alerts Provide threat-related input and investigation support during relevant cybersecurity incidents Deliver detailed threat reporting including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM … tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly Commitment to staying abreast of emerging threats, technologies, and methodologies in cybersecurity Creative and resourceful in finding solutions More ❯
This is an excellent opportunity to join a world-class Cybersecurity organization. As a Senior Product Security Architect in the Cybersecurity & Technology Controls (CTC) team for the International Consumer, you will work proactively with your technology and business colleagues to identify and quantify security issues within their business and empower them to take decisive risk decisions at speed and scale. … expert with a strong mix of technical and communication skills and are passionate about enabling safe and secure innovation. You will work with some of the best and brightest cybersecurity and technology engineers to solve complex problems, which will both challenge you and help you develop your skills in one of the most innovative and respected companies in the world. … self-motivated to learn all about them, applying critical thinking to identify hidden issues along the way. Be your product's security thought leader. Learn from your product and cybersecurity teams and share best practice in both directions. Be recognized in your product as the clear point of escalation and subject matter expert for IT Risk and Cyber domains. Act More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
Junior Cybersecurity Consultant Milton Keynes, UK Full-Time, Permanent £30,000 - £32,000 per annum We’re recruiting on behalf of a leading cybersecurity client who is looking for a Cybersecurity Consultant to join their UK team. This is a hands-on, client-facing role where you'll help businesses improve their cyber defences—especially in areas like DDoS protection … WAAP). You’ll receive full training in DDoS mitigation and WAAP technologies, making this a great opportunity to develop your skills in a fast-growing area. Responsibilities: Conduct cybersecurity audits, simulations, and assessments Develop clear and practical recommendations for clients Deliver training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date More ❯
the communities in which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: You will have a CyberSecurity background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will … threats within client environments highlighting any identified risks Collaborate with security detection engineers to design and implement customised detection alerts Provide threat-related input and investigation support during relevant cybersecurity incidents Deliver detailed threat reporting including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM … tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly Commitment to staying abreast of emerging threats, technologies, and methodologies in cybersecurity Creative and resourceful in finding solutions More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
R3vamp Limited
left” initiatives Acting as the go-to expert on Microsoft Entra ID and Active Directory What You’ll Bring Proven leadership experience in Security Operations, Identity & Access Management or Cybersecurity Strong hands-on knowledge of Microsoft Entra ID and Active Directory Experience managing or shaping a technical team Deep understanding of threat detection, incident response and security best practices A More ❯
of the function however you see fit, in line with business need. We are an ambitious bunch at Risk Ledger, always learning and pushing boundaries to change the way cybersecurity is managed in the supply chain. Our own internal security is pivotal to this. We won’t compromise and don’t expect you to either. We’re looking for … more years experience as a qualified Head (or Deputy Head) of Information Security role, seasoned with scale-up organisation challenges. {CISSP, CISM} Has solid experience of assuring compliance with cybersecurity and data protection regulations within the UK and globally (e.g. GDPR, NIS Directive, EBA Guidelines). Has a comprehensive understanding of what it takes to comply with cybersecurity … industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cybersecurity threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working with colleagues to define More ❯
of the function however you see fit, in line with business need. We are an ambitious bunch at Risk Ledger, always learning and pushing boundaries to change the way cybersecurity is managed in the supply chain. Our own internal security is pivotal to this. We won't compromise and don't expect you to either. We're looking for … more years experience as a qualified Head (or Deputy Head) of Information Security role, seasoned with scale-up organisation challenges. CISSP, CISM Has solid experience of assuring compliance with cybersecurity and data protection regulations within the UK and globally (e.g. GDPR, NIS Directive, EBA Guidelines). Has a comprehensive understanding of what it takes to comply with cybersecurity … industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cybersecurity threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working with colleagues to define More ❯
Wandsworth, Greater London, UK Hybrid / WFH Options
Risk Ledger Ltd
of the function however you see fit, in line with business need. We are an ambitious bunch at Risk Ledger, always learning and pushing boundaries to change the way cybersecurity is managed in the supply chain. Our own internal security is pivotal to this. We won’t compromise and don’t expect you to either. We’re looking for … more years experience as a qualified Head (or Deputy Head) of Information Security role, seasoned with scale-up organisation challenges. {CISSP, CISM} Has solid experience of assuring compliance with cybersecurity and data protection regulations within the UK and globally (e.g. GDPR, NIS Directive, EBA Guidelines). Has a comprehensive understanding of what it takes to comply with cybersecurity … industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cybersecurity threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working with colleagues to define More ❯
Our Client is seeking an experienced Head of Information Security to lead the InfoSec function across their UK and European operations. This is a leadership role that combines deep cybersecurity expertise, regulatory awareness, and business acumen to drive the security agenda in a fast-paced, regulated financial services environment. As the Head of Information Security, you'll be the primary More ❯