Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a dynamic team responsible for design, implementation, operations & maintenance, and cybersecurity for large complex resilient hardware and virtualized infrastructure to ensure implemented solutions meet stakeholder needs, standards, and performance requirements. Responsibilities What you'll do: In this role you will be More ❯
clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
and NAS protocols Experience virtualizing enterprise applications (Active Directory, MS SQL, RHEL, MS SharePoint, Unified Communications, etc.). Experience developing highly secure and reliable solutions that meet all organizational Cybersecurity and Information Assurance requirements. Experience with Data Center Automation and Infrastructure as a Service (IaaS), API management, scripting languages including PowerShell, Python, JSON, Bash, etc. Meet DoD 8570 IAT Level More ❯
Perform investigative analysis supporting corporate due diligence and commercial supply chain analyses with a focus on identifying risks associated with mergers & acquisitions activity, political risk, theft of intellectual property, cybersecurity vulnerabilities, and sanctions violations, among others. Develop industry expertise and identify new research opportunities to support customer requirements. Synthesize and understand pertinent information derived from secondary research, subject matter experts More ❯
Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Hill AFB Ogden UT Salary: 130K -136K Background Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Hill AFB Ogden UT Salary: 130K -136K Background Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Responsibilities ISYS Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cybersecurity, or cutting-edge engineering applications, ISYS is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado More ❯
ability to work collaboratively in a team environment.Preferred Qualifications: Experience with microservices architecture and API development. Knowledge of CI/CD pipelines and containerization (Docker, Kubernetes). Familiarity with cybersecurity best practices in software development. Strong experience with testing frameworks (JUnit, Selenium, Jest). More ❯
Social network you want to login/join with: Vice President, Senior Audit Manager, Cybersecurity and Infrastructure, London col-narrow-left Client: MUFG Location: London, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Reference: 4b4c596acf2d Job Views: 5 Posted: 29.06.2025 Expiry Date: 13.08.2025 col-wide Job Description: Do you want your voice heard and …/Investment Banking Sector, or similar Big-4 experience with relevant industry exposure; Extensive experience of delivering integrated audit engagements, working closely with business audit teams. Technology infrastructure and cybersecurity audit knowledge and demonstrable understanding of key risks and corresponding audit techniques, including, but not limited to, threat and vulnerability management, security monitoring, Cloud, networks and databases. Demonstrable experience of More ❯
and the incorporation of emerging technologies and agile methodologies. Key Responsibilities: Plan and design DevOps workflows, covering the entire Software Development Life Cycle (SDLC). Automate DevSecOps pipelines, incorporating cybersecurity seamlessly into the development process. Develop and implement test automation frameworks as part of DevOps delivery. Ensure effective monitoring in the DevOps environment. Collaborate in an Agile development process, contributing More ❯
of a team -Ability to manage multiple priorities and meet deadlines About Oak Leaf Founded in 2008, Oak Leaf Solutions provides cutting edge system design, development, engineering, operations and cybersecurity to the United States Government. We are a small business that focuses on creating exciting career opportunities and promoting employee wellness. We offer higher-than-usual salaries with a very More ❯
Program Manager (PM) serves as the primary point of contact for work performed under the contract, responsible for overseeing and managing various projects related to application development, network operations, cybersecurity, and customer engagement. The PM plans, directs, and coordinates cross-functional team activities to manage and implement project and/or interrelated programs from initiation to the operational stage. Provides More ❯
within the established SLA measurements -Maintain the availability of the customer's infrastructure to include the support of emergent issues that may be experienced -Perform required maintenance to maintain cybersecurity compliance with established windows and/or procedures -Follow the approved configuration control procedures provided by the Government -Additional routine IT tasks of varying complexity may be assigned at customer More ❯
San Antonio, Texas, United States Hybrid / WFH Options
EXPANSIA
support complex migration efforts into the DAF CLOUDworks environment by executing discovery, planning, and implementation tasks across AWS and Azure platforms. You'll apply your expertise in cloud infrastructure, cybersecurity, and modernization to ensure secure, efficient, and low-risk transitions for mission partners. Responsibilities include: Act as a liaison between mission partners, DAFCw engineering, and leadership to communicate timelines, risks More ❯
Vice President, Senior Audit Manager, Cybersecurity and Infrastructure Do you want your voice heard and your actions to count? Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across the globe, we're 120,000 colleagues, striving to make a difference for every client, organization, and community we serve. We stand for …/Investment Banking Sector, or similar Big-4 experience with relevant industry exposure; Extensive experience of delivering integrated audit engagements, working closely with business audit teams. Technology infrastructure and cybersecurity audit knowledge and demonstrable understanding of key risks and corresponding audit techniques. Demonstrable experience of leading multiple concurrent complex audits. Preferred: Experience of working in a 1st line technology role. More ❯
Signature Federal Systems seeks a motivated, career and customer-oriented Principal CyberSecurity Engineer to join our team in Chantilly, VA. Responsibilities include but are not limited to: • Engineer, design, implement, integrate, and sustain Comply-to-Connect (C2C) deployment support to migrate, deploy, improve, and maintain C2C services. Comply-to-Connect support is comprised of managing and maintaining the appliances … performance and faults and recommend improvements. • Interacts with other team members and customers at multiple levels to gather, supply, or coordinate information • Supports Assessment and Authorization activities related to cybersecurity technologies, where applicable Minimum Qualifications: • Bachelor's degree or 4+ years of additional cyber experience in lieu of degree • 7+ years of cyber experience • Experience with technologies involved in large More ❯
Title: CyberSecurity Engineer (Mid-Level) Location: WMA - Washington Metropolitan Area McIntire Solutions, LLC is inviting a CyberSecurity Engineer (Mid-Level) to join our team in WMA - Washington Metropolitan Area. Mid-level CyberSecurity Engineers support the refinement of information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful … with CI Polygraph • Bachelor's degree in Engineering, Computer Science, Information Technology, Management Information Systems, or related STEM degree program. • Mid-level working experience in government or industry within CyberSecurity Engineering. • DoD 8570 Level I (IASAE) certification compliance Desired Skills and Experience • DoD 8570 Level II (IASAE) certification compliance • Mid-level working experience in government or industry supporting enterprise … level cybersecurity efforts involving architecting, designing, development, and configuration of cloud and on premise based systems and software. McIntire Solutions, LLC is a veteran owned small business based in Northern Virginia and provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition More ❯
we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking an CyberSecurity Specialist 4 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers More ❯
A leading organisation in the offshore and renewables sector is seeking an experienced Information Security Manager (ISM) to head its CyberSecurity strategy and best practices. Operating in the booming renewables industry, they specialise in installation, construction, offshore renewables, decommissioning, and engineering. This permanent role offers the flexibility to be based in their offices in Aberdeen or London. This is … crucial part in shaping and delivering security initiatives that protect critical infrastructure while ensuring alignment with business objectives. Key Responsibilities: As ISM, you will design and implement a robust cybersecurity strategy, proactively identifying and mitigating risks while ensuring compliance with industry standards. You will lead a team of security professionals, providing guidance and mentorship to drive operational excellence. Your role … application), as well as a whole host of benefits including car allowance, strong pension contribution, good holiday allowance and private medical + dental care. If you're passionate about CyberSecurity and feel like you could be a good fit, please apply or reach out to Lewis at Cathcart Technology. More ❯
have an active TS/SCI clearance Must be able to obtain DHS Suitability prior to starting employment 5+ years of directly relevant experience in cyber incident management or cybersecurity operations Responsibilities Include: Correlating incident data to identify specific trends in reported incidents Recommending defense in depth principles and practices (i.e. Defense in Multiple Places, layered defenses, security robustness, etc. … to include determining scope, urgency, and potential impact Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data Monitoring external data sources to maintain currency of … regulations Desired Certifications: GCIH, GCFA, GISP, GCED, CCFP, CISSP Required Education: BS Incident Management, Operations Management, Cybersecurity, or related degree. HS Diploma with 7+ years of incident management or cybersecurity experience More ❯
contract. This is a key role within a mature and well-established Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing cybersecurity function. This is a challenging, rewarding role for a seasoned SOC professional looking to make a tangible impact. Apply now to join a team focused on protecting enterprise assets against … techniques. Collaborate with engineering teams to optimise Microsoft security tool integrations. Maintain and enhance incident response procedures and documentation. Skills/Must have: Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role. Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic rules, and automation. Hands-on experience More ❯
Infrastructure and Cloud Engineer required by this Bournemouth based Managed Servive Provider to lead their Cloud Services & Infrastructure, Cybersecurity, and Field Services teams. If you have deep technical expertise, strong leadership skills, and a passion for guiding organisations through the ever-evolving tech landscape, including AI and advanced cybersecurity, we want to hear from you. This role offers a salary … leading from the front, setting the strategic direction, and being the ultimate technical authority for our crucial delivery teams. You'll be: Leading, managing, and mentoring our Cloud Services, Cybersecurity, and Field Services teams, ensuring top performance and professional growth. Overseeing the delivery of all technical projects and services, making sure they hit our business goals and exceed client expectations. … multidisciplinary technical teams. Excellent communication, stakeholder engagement, and project management skills. The ability to evaluate and implement emerging technologies , including AI and automation. Relevant certifications such as Microsoft Certified, CyberSecurity, Azure, and Networking (CompTIA). Additional Information: As our Senior Technical Lead, you'll play a pivotal role in shaping the future of our technical capabilities. This means identifying More ❯
recognised. We are in growth mode and there is a ton of opportunity at Forescout. Apply now to find out more! More About Forescout Forescout Technologies, Inc. delivers automated cybersecurity across the digital terrain, maintaining continuous alignment of customers' security frameworks with their digital realities, including all asset types - IT, OT, IoT, IoMT. The Forescout Continuum Platform provides complete asset … visibility, continuous compliance, network segmentation and a strong foundation for Zero Trust. For more than 20 years, Fortune 100 organisations and government agencies have trusted Forescout to provide automated cybersecurity at scale. Forescout arms customers with data-powered intelligence to accurately detect risks and quickly remediate cyberthreats without disruption of critical business assets. Learn more at . Our Mission To More ❯
Hi there Thanks for wanting to know more about Hack The Box career opportunities! Let's redefine cybersecurity expertise standards and connect business - community through highly engaging hacking experiences. (Find out more insights about Hack The Box culture in our career site). The core mission of the Defensive Content Engineer: The core mission of the Defensive Content Engineer … businesses. While HTB is well established for its red team content, through your work, you'll enable the company to broaden its services and become a place for all cybersecurity professionals to upskill themselves, thus dealing with the great shortage of talent that exists in cyberspace. The fellowship you'll be joining: HTB's defensive team is a relatively … What your Hack The Box adventure will have in store: You'll have the exhilarating opportunity to contribute to a product that is highly appreciated by users and the cybersecurity community at large. You'll experience a highly supportive and caring environment, fostering growth, flexibility, and autonomy. You'll embark on an exciting journey of continuous learning and problem-solving More ❯