Cybersecurity Job Vacancies

1,576 to 1,600 of 4,842 Cybersecurity Jobs

CI/CD Tech Team Lead with Security Clearance

Patuxent River, Maryland, United States
Hybrid / WFH Options
Spalding, a Saalex Company
as moving CI/CD capability from on-prem to the Cloud. Create and manage execution of budgets related to CI/CD offerings (including labor, hardware, software, and Cyber Security costs). Maintain working relationships with CI/CD software vendors, renew software maintenance contracts, and ensure CI/CD environments remain in compliance with software licenses. Other duties … communication and documentation skills with experience preparing technical guidance/how-to instructions, test plans, and providing presentations/demos/training to internal and external stakeholders. Understanding of Cyber Security guidelines and how to resolve code vulnerabilities. Will need to be capable of interpreting Cyber Security requirements such as Rapid Assess and Incorporate Software Engineering (RAISE) to ensure pipeline More ❯
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

Access Control Attendant with Security Clearance

Washington, Washington DC, United States
Golden Tech Systems Inc
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cyber security solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Configuration Management Analyst with Security Clearance

Colorado Springs, Colorado, United States
OSAAVA Services
Experience with Risk Management and/or Quality Assurance. • Familiarity with Space Domain or IT Operations. • DoD 8570 IAT Level I Certification (e.g., Security+ CE, CySA+). Company Description: Cyber Security company, specializing in specific cyber defense activities and IT services. We are a SDVOSB. OSAAVA Services considers all qualified applicants for employment without regard to disability or veteran status More ❯
Employment Type: Permanent
Salary: USD 147,900 Annual
Posted:

ISSM 2 102-025 with Security Clearance

Hampton, Virginia, United States
IC-CAP
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-085 with Security Clearance

Arlington, Virginia, United States
IC-CAP
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-022 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-041 with Security Clearance

Hill Afb, Utah, United States
IC-CAP
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-060 with Security Clearance

Dayton, Ohio, United States
IC-CAP
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Associate Director, IT Strategy Consulting, Cybersecurity

London, United Kingdom
Hybrid / WFH Options
Gartner
their strategic priorities, across all sectors, including: Digital Acceleration and Transformation Enterprise Enablement Big Data and Analytics Applications Rationalization Cloud Modernization Sourcing and Ecosystem Optimization Contract and Cost Optimization Cybersecurity and Resilience Due to its current success, Gartner is in the process of expanding its high-performance EMEA Cybersecurity Resilience Consulting practice and is seeking a Director for UKI. We … help leading organizations and their executives, CIOs, and CISOs collaborate and optimize their cybersecurity resilience defensibility in an evolving digital and uncertain world. Gartner's trusted data-driven insights give executives confidence to prioritize and make informed decisions about cybersecurity resilience. In today's world, a consulting firm that incorporates security as part of its "DNA", (with the ability to … technology initiatives) has relevance to the most important strategic decisions any business will make. We work with clients to: Prioritize what to accelerate and where to invest to improve cybersecurity resilient while enabling the business Enable culture hacks to accelerate change and embed security throughout the organization Support digital momentum and value realization in a secure manner What you'll More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

ISSM 1 102-133 with Security Clearance

Colorado Springs, Colorado, United States
IC-CAP
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Quality Assurance Lead with Security Clearance

Maryland, United States
Zolon Tech, Inc
ensuring alignment with program requirements and timelines. Coordinate defect tracking, triage, and resolution in collaboration with development and operations teams. Ensure compliance with Section 508 accessibility standards and DoD cybersecurity testing requirements. Implement quality gates within CI/CD pipelines and promote test automation for scalable releases. Conduct regression, performance, integration, and user acceptance testing (UAT) as part of the … such as Selenium, JIRA, TestRail, Postman, or equivalent Strong knowledge of Agile development, DevSecOps practices, and automated testing frameworks Familiarity with Section 508/WCAG accessibility standards and DoD cybersecurity compliance Excellent analytical, communication, and documentation skills More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 1 102-401 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

M365 Cloud Security Specialist

London, South East, England, United Kingdom
Sanderson
Office 365, Identity, Endpoint and Cloud Apps Define and implement security baselines and compliance policies for M365 workloads Lead investigations and incident response leveraging Microsoft security tools Collaborate with cyber security, infrastructure and architecture teams to ensure alignment with overall cloud strategy Required Skills & Experience: Proven expertise in Microsoft 365 security technologies (Defender suite, Purview, Entra ID, Intune) Strong knowledge More ❯
Employment Type: Contractor
Rate: £451 - £550 per day
Posted:

Security Support Engineer, Vulnerability Management and Remediation

London, United Kingdom
Amazon
Mission to Fortify Amazon's Defenses as a Support Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Support Engineer specialising in cybersecurity to join our Vulnerability Management and Remediation Operations (VMRO) team in Sydney, Australia. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation … largest and most complex technology ecosystems from our Sydney office, we'd love to hear from you! BASIC QUALIFICATIONS - Bachelor's degree in Computer Science, Computer Engineering, Software Engineering, Cybersecurity or related technical degree or equivalent; or 2+ years equivalent technology experience - Strong understanding of security concepts with a security mindset. - Strong understanding of computer and network weaknesses and mitigating More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Operations Manager

Nottingham, Nottinghamshire, East Midlands, United Kingdom
Hybrid / WFH Options
Littlefish
love to hear from you. The role and what youll be getting up to on a day to day basis: Are you a strategic leader with a passion for cyber security and service excellence? AtLittlefish, were looking for aCyber Operations Managerto join our Cyber division and play a key role in delivering high-quality, customer-focused cyber services. Youll be More ❯
Employment Type: Permanent
Salary: £60,000
Posted:

Chief Information Security Officer

Belgium
Hybrid / WFH Options
XPLUS
information security principles, and the ability to communicate effectively with technical and non-technical audiences. Experience in managing program budgets and timelines, tracking risks and dependencies. A background in cybersecurity frameworks (e.g., NIST, ISO 27001) and experience in regulated environments is highly desirable. Fluent in Dutch, + English Location: regime hybrid, remote & West Flanders You are based in Belgium Curious More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Senior Manager, Cybersecurity Communications - Sophos X-Ops

United Kingdom
Hybrid / WFH Options
Sophos Group
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. … will focus on execution, coordination, and building scalable communication systems for Sophos X-Ops. What You Will Do Lead the execution of external-facing communications related to threat intelligence, cybersecurity incidents, and best practices Build and manage scalable communication processes-calendars, approvals, feedback loops, delivery workflows Manage and coach a team of five - setting goals and ensuring delivery Act as … sensitive and high-impact communications Bring structure and operational rigor to how communications are planned, approved, and delivered What You Will Bring Must have 5+ years of experience in cybersecurity communications and content operations involving external stakeholder communication Experience working alongside advanced security functions such as threat intelligence, incident response, or security operations Must have team management experience, including leadership More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Subject Matter Expert - Senior with Security Clearance

North Carolina, United States
K2 Solutions Inc
augmentation systems (weapon scopes and sights, lasers, night vision goggles, and thermal imaging systems), tactical vehicles, ammunition, ballistics, personnel and vehicle armor systems, computer networks, GPS, cellular telephone networks, Cyber Security operations including offensive and defensive techniques, Counter Unmanned Aerial Systems (CUAS), and Directed Energy. The contractor will also have knowledge in areas supported by the specified subject area to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Application Security Engineer

London, South East, England, United Kingdom
Holland & Barrett International Limited
About the Role: At Holland & Barrett, cybersecurity is at the heart of our digital transformation. As we continue to grow and innovate, securing our applications and protecting customer data is a top priority. We are looking for a Senior Application Security Engineer to lead our efforts in strengthening application security, mitigating risks, and ensuring best-in-class security practices. If … you are passionate about cybersecurity and eager to make a real impact, we want you on our team! Key Responsibilities: Security Strategy: Help define and execute the Holland & Barrett application security strategy. Collaborate with both tech and non-tech teams to integrate security principles into the early stages of product design and development. Secure SLDC: Establish a secure Software Development More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Penetration Tester with Security Clearance

Fort Belvoir, Virginia, United States
Hybrid / WFH Options
Gridiron IT Solutions
clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, Cyber Security, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Employment Type: Permanent
Salary: USD 180,000 Annual
Posted:

Business Analyst - OT Security

Reading, Berkshire, United Kingdom
Wipro Technologies
Business Analyst should demonstrate understanding of business requirements, processes, and identify risks and threats impacting operations, data, and assets. This includes identifying vulnerabilities in systems, networks, and applications, evaluating cybersecurity technologies, conducting business impact analyses, and collaborating within Agile methodologies, preferably using Azure DevOps. The BA must organize workshops to gather business needs, technical requirements, and functional specifications for OT … cybersecurity projects. Strong OT background is mandatory, and experience in the water sector is highly desirable and will be a differentiator. Understanding of NIS-2/e-CAF, Purdue model, and IT/OT convergence is essential. Demonstrate a strong understanding of Operational Technology (OT) and Industrial Control Systems (ICS), including architecture, protocols, and security challenges. Benefits: You will receive More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Software License Manager with Security Clearance

Colorado Springs, Colorado, United States
OSAAVA Services
a substantial backlog of outdated software installations to support Zero Trust goals. • Maintain an accurate and current software inventory using enterprise tools (e.g., ServiceNow, Remedy). • Coordinate with procurement, cybersecurity, legal, engineering, and operations teams to ensure compliant and cost-effective software usage. • Monitor software utilization and recommend optimization and consolidation strategies to reduce waste and ensure compliance. • Act as … license status, usage, and compliance risks for stakeholders and leadership. • Provide user training and internal guidance on license acquisition, usage, and tracking. Minimum Qualifications: • Bachelor's degree in IT, Cybersecurity, or related field, or equivalent practical experience. • 5+ years of direct experience in software asset/license management, preferably within DoD or IC environments. • Strong understanding of enterprise licensing models … a high-priority mission to bring software license operations into compliance in support of DoD Zero Trust transformation. Your work will have a direct impact on the nation's cybersecurity posture, enterprise efficiency, and readiness. Company Description: OSAAVA Services is a Cybersecurity and IT services provider and Service-Disabled Veteran-Owned Small Business (SDVOSB) supporting U.S. national security missions. We More ❯
Employment Type: Permanent
Salary: USD 155,000 Annual
Posted:

SailPoint Developer / IAM Engineer with Security Clearance

Huntsville, Alabama, United States
OSAAVA Services
all levels in the organization. Education Preferred: BS, Computer Science, Computer Information Systems, or equivalent experience (4+ years of related experience) Certification Preferred: IAM vendor specific certification Company Description: Cyber Security company, specializing in specific cyber defense activities and IT services. We are a SDVOSB. OSAAVA Services considers all qualified applicants for employment without regard to disability or veteran status More ❯
Employment Type: Permanent
Salary: USD 175,000 Annual
Posted:

Head of IT & Information Security

London, United Kingdom
Hybrid / WFH Options
Valstro
and operate our internal IT stack-device lifecycle management, SSO, Intune, networking, onboarding/offboarding, vendor tools, etc. Everything from config to compliance. Own InfoSec: Be accountable for our cybersecurity posture. Define controls, drive implementation, and respond to incidents. You'll guide us to SOC2 compliance and beyond. Support the Business: Be the hands-on enabler of cross-functional productivity … You Need to Bring Bachelor's degree in computer science, information technology, or a related field. A master's degree is preferred Proven experience across both IT operations and cybersecurity, ideally in fast-paced, cloud-native environments. Hands-on expertise in AWS/Azure, IAM, Intune/Autopilot, device security, and endpoint protection. Extensive experience with zscaler SOC2 experience-preparation More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Software Engineer (SSE) with Security Clearance

Hanover, Maryland, United States
James Scott Group
including Integrated Sensor Architecture (ISA) and JICD • Create software estimates and examine vendor proposals related to software engineering • Conduct full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates Minimum Requirements • Documented experience with software tools, including Photon, Salvage, Visual Studio, Eclipse … including product definition, requirements, design, integration & test, and system software deployment for a DOD acquisition program office • Experience conducting full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates • Experience developing software estimates and review of vendor technical proposals • Must Be knowledgeable More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Cybersecurity
10th Percentile
£26,250
25th Percentile
£38,780
Median
£50,000
75th Percentile
£71,750
90th Percentile
£93,750