Patuxent River, Maryland, United States Hybrid / WFH Options
Spalding, a Saalex Company
as moving CI/CD capability from on-prem to the Cloud. Create and manage execution of budgets related to CI/CD offerings (including labor, hardware, software, and CyberSecurity costs). Maintain working relationships with CI/CD software vendors, renew software maintenance contracts, and ensure CI/CD environments remain in compliance with software licenses. Other duties … communication and documentation skills with experience preparing technical guidance/how-to instructions, test plans, and providing presentations/demos/training to internal and external stakeholders. Understanding of CyberSecurity guidelines and how to resolve code vulnerabilities. Will need to be capable of interpreting CyberSecurity requirements such as Rapid Assess and Incorporate Software Engineering (RAISE) to ensure pipeline More ❯
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
Experience with Risk Management and/or Quality Assurance. • Familiarity with Space Domain or IT Operations. • DoD 8570 IAT Level I Certification (e.g., Security+ CE, CySA+). Company Description: CyberSecurity company, specializing in specific cyber defense activities and IT services. We are a SDVOSB. OSAAVA Services considers all qualified applicants for employment without regard to disability or veteran status More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
their strategic priorities, across all sectors, including: Digital Acceleration and Transformation Enterprise Enablement Big Data and Analytics Applications Rationalization Cloud Modernization Sourcing and Ecosystem Optimization Contract and Cost Optimization Cybersecurity and Resilience Due to its current success, Gartner is in the process of expanding its high-performance EMEA Cybersecurity Resilience Consulting practice and is seeking a Director for UKI. We … help leading organizations and their executives, CIOs, and CISOs collaborate and optimize their cybersecurity resilience defensibility in an evolving digital and uncertain world. Gartner's trusted data-driven insights give executives confidence to prioritize and make informed decisions about cybersecurity resilience. In today's world, a consulting firm that incorporates security as part of its "DNA", (with the ability to … technology initiatives) has relevance to the most important strategic decisions any business will make. We work with clients to: Prioritize what to accelerate and where to invest to improve cybersecurity resilient while enabling the business Enable culture hacks to accelerate change and embed security throughout the organization Support digital momentum and value realization in a secure manner What you'll More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
ensuring alignment with program requirements and timelines. Coordinate defect tracking, triage, and resolution in collaboration with development and operations teams. Ensure compliance with Section 508 accessibility standards and DoD cybersecurity testing requirements. Implement quality gates within CI/CD pipelines and promote test automation for scalable releases. Conduct regression, performance, integration, and user acceptance testing (UAT) as part of the … such as Selenium, JIRA, TestRail, Postman, or equivalent Strong knowledge of Agile development, DevSecOps practices, and automated testing frameworks Familiarity with Section 508/WCAG accessibility standards and DoD cybersecurity compliance Excellent analytical, communication, and documentation skills More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Office 365, Identity, Endpoint and Cloud Apps Define and implement security baselines and compliance policies for M365 workloads Lead investigations and incident response leveraging Microsoft security tools Collaborate with cybersecurity, infrastructure and architecture teams to ensure alignment with overall cloud strategy Required Skills & Experience: Proven expertise in Microsoft 365 security technologies (Defender suite, Purview, Entra ID, Intune) Strong knowledge More ❯
Mission to Fortify Amazon's Defenses as a Support Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Support Engineer specialising in cybersecurity to join our Vulnerability Management and Remediation Operations (VMRO) team in Sydney, Australia. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation … largest and most complex technology ecosystems from our Sydney office, we'd love to hear from you! BASIC QUALIFICATIONS - Bachelor's degree in Computer Science, Computer Engineering, Software Engineering, Cybersecurity or related technical degree or equivalent; or 2+ years equivalent technology experience - Strong understanding of security concepts with a security mindset. - Strong understanding of computer and network weaknesses and mitigating More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
love to hear from you. The role and what youll be getting up to on a day to day basis: Are you a strategic leader with a passion for cybersecurity and service excellence? AtLittlefish, were looking for aCyber Operations Managerto join our Cyber division and play a key role in delivering high-quality, customer-focused cyber services. Youll be More ❯
information security principles, and the ability to communicate effectively with technical and non-technical audiences. Experience in managing program budgets and timelines, tracking risks and dependencies. A background in cybersecurity frameworks (e.g., NIST, ISO 27001) and experience in regulated environments is highly desirable. Fluent in Dutch, + English Location: regime hybrid, remote & West Flanders You are based in Belgium Curious More ❯
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. … will focus on execution, coordination, and building scalable communication systems for Sophos X-Ops. What You Will Do Lead the execution of external-facing communications related to threat intelligence, cybersecurity incidents, and best practices Build and manage scalable communication processes-calendars, approvals, feedback loops, delivery workflows Manage and coach a team of five - setting goals and ensuring delivery Act as … sensitive and high-impact communications Bring structure and operational rigor to how communications are planned, approved, and delivered What You Will Bring Must have 5+ years of experience in cybersecurity communications and content operations involving external stakeholder communication Experience working alongside advanced security functions such as threat intelligence, incident response, or security operations Must have team management experience, including leadership More ❯
augmentation systems (weapon scopes and sights, lasers, night vision goggles, and thermal imaging systems), tactical vehicles, ammunition, ballistics, personnel and vehicle armor systems, computer networks, GPS, cellular telephone networks, CyberSecurity operations including offensive and defensive techniques, Counter Unmanned Aerial Systems (CUAS), and Directed Energy. The contractor will also have knowledge in areas supported by the specified subject area to More ❯
About the Role: At Holland & Barrett, cybersecurity is at the heart of our digital transformation. As we continue to grow and innovate, securing our applications and protecting customer data is a top priority. We are looking for a Senior Application Security Engineer to lead our efforts in strengthening application security, mitigating risks, and ensuring best-in-class security practices. If … you are passionate about cybersecurity and eager to make a real impact, we want you on our team! Key Responsibilities: Security Strategy: Help define and execute the Holland & Barrett application security strategy. Collaborate with both tech and non-tech teams to integrate security principles into the early stages of product design and development. Secure SLDC: Establish a secure Software Development More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Business Analyst should demonstrate understanding of business requirements, processes, and identify risks and threats impacting operations, data, and assets. This includes identifying vulnerabilities in systems, networks, and applications, evaluating cybersecurity technologies, conducting business impact analyses, and collaborating within Agile methodologies, preferably using Azure DevOps. The BA must organize workshops to gather business needs, technical requirements, and functional specifications for OT … cybersecurity projects. Strong OT background is mandatory, and experience in the water sector is highly desirable and will be a differentiator. Understanding of NIS-2/e-CAF, Purdue model, and IT/OT convergence is essential. Demonstrate a strong understanding of Operational Technology (OT) and Industrial Control Systems (ICS), including architecture, protocols, and security challenges. Benefits: You will receive More ❯
a substantial backlog of outdated software installations to support Zero Trust goals. • Maintain an accurate and current software inventory using enterprise tools (e.g., ServiceNow, Remedy). • Coordinate with procurement, cybersecurity, legal, engineering, and operations teams to ensure compliant and cost-effective software usage. • Monitor software utilization and recommend optimization and consolidation strategies to reduce waste and ensure compliance. • Act as … license status, usage, and compliance risks for stakeholders and leadership. • Provide user training and internal guidance on license acquisition, usage, and tracking. Minimum Qualifications: • Bachelor's degree in IT, Cybersecurity, or related field, or equivalent practical experience. • 5+ years of direct experience in software asset/license management, preferably within DoD or IC environments. • Strong understanding of enterprise licensing models … a high-priority mission to bring software license operations into compliance in support of DoD Zero Trust transformation. Your work will have a direct impact on the nation's cybersecurity posture, enterprise efficiency, and readiness. Company Description: OSAAVA Services is a Cybersecurity and IT services provider and Service-Disabled Veteran-Owned Small Business (SDVOSB) supporting U.S. national security missions. We More ❯
all levels in the organization. Education Preferred: BS, Computer Science, Computer Information Systems, or equivalent experience (4+ years of related experience) Certification Preferred: IAM vendor specific certification Company Description: CyberSecurity company, specializing in specific cyber defense activities and IT services. We are a SDVOSB. OSAAVA Services considers all qualified applicants for employment without regard to disability or veteran status More ❯
and operate our internal IT stack-device lifecycle management, SSO, Intune, networking, onboarding/offboarding, vendor tools, etc. Everything from config to compliance. Own InfoSec: Be accountable for our cybersecurity posture. Define controls, drive implementation, and respond to incidents. You'll guide us to SOC2 compliance and beyond. Support the Business: Be the hands-on enabler of cross-functional productivity … You Need to Bring Bachelor's degree in computer science, information technology, or a related field. A master's degree is preferred Proven experience across both IT operations and cybersecurity, ideally in fast-paced, cloud-native environments. Hands-on expertise in AWS/Azure, IAM, Intune/Autopilot, device security, and endpoint protection. Extensive experience with zscaler SOC2 experience-preparation More ❯
including Integrated Sensor Architecture (ISA) and JICD • Create software estimates and examine vendor proposals related to software engineering • Conduct full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates Minimum Requirements • Documented experience with software tools, including Photon, Salvage, Visual Studio, Eclipse … including product definition, requirements, design, integration & test, and system software deployment for a DOD acquisition program office • Experience conducting full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates • Experience developing software estimates and review of vendor technical proposals • Must Be knowledgeable More ❯