Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
ensuring alignment with program requirements and timelines. Coordinate defect tracking, triage, and resolution in collaboration with development and operations teams. Ensure compliance with Section 508 accessibility standards and DoD cybersecurity testing requirements. Implement quality gates within CI/CD pipelines and promote test automation for scalable releases. Conduct regression, performance, integration, and user acceptance testing (UAT) as part of the … such as Selenium, JIRA, TestRail, Postman, or equivalent Strong knowledge of Agile development, DevSecOps practices, and automated testing frameworks Familiarity with Section 508/WCAG accessibility standards and DoD cybersecurity compliance Excellent analytical, communication, and documentation skills More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
DSO) responsibilities for Bear River in coordination with DoD stakeholders. Maintain proactive client communication, end user training, resolve issues, and foster strong long-term relationships. Ensure full compliance with cybersecurity requirements, including NIST SP 800-171, DFARS, and DISA STIGs. This includes ensuring the security of all SQL database systems and data as well as the security configuration of the … stability and security of the ITS/DMM application. Participate in the planning and execution of application upgrades and enhancements. Required Qualifications: Bachelor's degree in IT, Computer Science, Cybersecurity, or a related discipline. IAT Level III certification (e.g., CISSP, CASP+) per DoD 8570 guidelines. At least 5 years of experience in IT engineering, administration, or secure program support, with More ❯
consumers. You'll Bring These Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an More ❯
/III level, or equivalent. Strong capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
london (city of london), south east england, united kingdom
Slaughter and May
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
for managing and optimizing cloud-native platforms, automating infrastructure deployments, and ensuring secure and reliable operations across multiple environments. You'll work closely with software developers, system administrators, and cybersecurity teams to streamline delivery of secure, scalable applications within classified environments. Key Responsibilities: Design, implement, and manage secure, scalable AWS infrastructure in support of mission systems Automate deployment, monitoring, and More ❯
Job Title: CyberSecurity Analyst (Contract) Contract Rate: Negotiable (Inside IR35) Shift Pattern (Day/Night) Location: Andover, Hampshire Security Clearance: ** Current valid SC clearance required ** Eligibility: ** UK eyes only ** About the Role: This is a brilliant opportunity to join our growing team at CND. We are looking for an experienced Security Analyst. This role offers a great shift pattern More ❯
Job Title: CyberSecurity Analyst (Contract) Contract Rate: Negotiable (Inside IR35) Shift Pattern (Day/Night) Location: Andover, Hampshire Security Clearance: ** Current valid SC clearance required ** Eligibility: ** UK eyes only ** About the Role: This is a brilliant opportunity to join our growing team at CND. We are looking for an experienced Security Analyst. This role offers a great shift pattern More ❯
including Integrated Sensor Architecture (ISA) and JICD • Create software estimates and examine vendor proposals related to software engineering • Conduct full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates Minimum Requirements • Documented experience with software tools, including Photon, Salvage, Visual Studio, Eclipse … including product definition, requirements, design, integration & test, and system software deployment for a DOD acquisition program office • Experience conducting full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates • Experience developing software estimates and review of vendor technical proposals • Must Be knowledgeable More ❯
the integration of hardware and operating systems (OS). Understanding of data RAID, data backup uses and technologies. Install and configure software applications requested by end users. Work with Cybersecurity professionals to maintain security requirements and provide documentation and training on advanced IT processes and procedures and other tasks as assigned. Full time 100% Onsite position. Qualifications You Must Have More ❯
/SCI clearance looking to make an impact in national security? Join our team supporting the Air Force Research Lab in Rome, NY, where you'll work on groundbreaking cybersecurity and R&D initiatives. Job Description: Seeking a Systems Engineer to support the SecureView Program Management Office in Rome NY (onsite). Duties will include the software/hardware testing More ❯
data governance strategies across enterprise systems Lead efforts in data integration, quality assurance, and metadata management Define and enforce policies for data access, lineage, and lifecycle management Collaborate with cybersecurity and cloud teams to ensure secure data sharing and storage Support development of enterprise data architectures and services frameworks Ensure compliance with federal data policies and security standards Advise stakeholders More ❯
our environment. New applications within the SharePoint Farms need to be developed and implemented to meet the needs of the customers all while complying with Department of Defense (DoD) cybersecurity requirements and Microsoft's best practices for SharePoint. This project will require assisting current application developers with migrating existing ColdFusion applications into the SharePoint environment using the existing methodology used More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
cb5 Solutions, LLC
reliability Diagnose and resolve complex cloud-related technical issues Recommend functional approaches for new applications and services Provide input on enhancements to existing cloud products and features Qualifications: DoD cybersecurity experience Experience with AWS GovCloud Experience with containerization technologies and orchestration tools like Kubernetes Experience with Azure Familiar with DoD Accreditation Processes Familiar working in a SCIF environment Work well More ❯
of a small team • Technical competency in one of the following fields: SIGINT Collection/Analysis/Targeting, ELINT Collection/Analysis, Electronic Warfare (EW), Cryptologic Linguist, Radio Operations, CyberSecurity, Network Engineering/Security, Information Technology (with degree), HAM Operations and certification Education and Experience • Bachelor's Degree and four (4) years relevant experience. • Direct relevant and military experience More ❯
design, development, installation and upgrade of development, support and tools as directed and follow IPT/SSA processes and procedures Support automation to the extent possible of test scripts, cybersecurity scans, and pipeline control gates Provide support for the CI/CD pipeline as directed and as managed by the SAFe, Agile, Kanban, and/or Scrum processes and backlog More ❯