We are seeking a skilled and experienced Federal Proposal Writer specializing in cybersecurity solutions to craft compelling RFPs, RFIs, and pricing strategies tailored to federal clients. The ideal candidate will possess deep expertise in cybersecurity frameworks, services, and compliance requirements, paired with exceptional writing skills and a proven track record in securing federal contracts. Experience in pricing strategies and analysis … for cybersecurity initiatives will be preferred. Key Responsibilities • Analyze federal RFPs/RFIs with a focus on cybersecurity requirements to ensure compliance and strategic alignment. • Collaborate with technical teams to gather cybersecurity-specific solutions, operational insights, and pricing inputs. • Develop clear, concise, and persuasive content for executive summaries, technical sections, and pricing narratives related to cybersecurity services. • Conduct detailed cost … analysis and pricing strategies for cybersecurity offerings, ensuring proposals remain competitive and compliant. • Research market trends in cybersecurity to inform pricing strategies and highlight differentiators. • Ensure proposals adhere to federal acquisition regulations (FAR/DFARS) and cybersecurity standards such as NIST, CMMC, and FISMA. • Maintain and manage proposal templates, schedules, and ensure timely and accurate submissions. Qualifications • Bachelor's in More ❯
home working, or the ability to flex your start and finish times. Where possible, we support a working pattern that suits your lifestyle and helps you reach your ambitions. CyberSecurity Architect LIFE AS A THALES CYBERSECURITY ARCHITECT We are looking for CyberSecurity Architects to join our growing team. As a CyberSecurity Architect, you'll work on … study of alternatives and a risk assessment Consult on potential security components architectures (e.g. SIEM, IAM, gateways, detection and deception capabilities ) Evaluate architectures against Business Line policy and major cybersecurity standards & regulation frameworks (NIST, ISO, JSP, etc.) Produce justification for architectural choices Ensure technical coordination across a multi-discipline team Present, recommend and demonstrate solutions to customer representatives, peers … ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You have the ability to work with customers and technical teams NICE TO HAVE: Domain knowledge - Defence More ❯
CyberSecurity Project Engineer Location: McLean, VA Senior Cyber Operations: Required Skills • Ability to create queries and alerts that feed into a dashboard for monitoring and analysis of various logs • Experience with creating Splunk dashboards • Provide analysis and review of Splunk audit logs to include OS, database, and application logs • Experience in evaluating query results and reporting results to the … or destruction • Ability to assess, plan, and enact security measures to help protect an organization from security breaches and attacks on its computer networks and systems. • Analyzes all relevant cybersecurity event data and other sources for attack indicators and potential security breaches • Applies knowledge of Information Assurance Vulnerability Alerts (IAVAs) • Detects, triages, investigates, responds and reports on all of More ❯
Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetration testing, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise sources determining causes of alerts. • Security reviews, gap analysis and risk mitigation in security architecture. • Intrusion Detection System/Intrusion … Packet-level analysis and collecting data from a variety of cyber defense resources. Degree (Required or certifications below can be substituted in lieu of): • BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science, from an ABET accredited or CAE designated institution. Certification (Preferred one of the following in lieu of Required Degree): • Certified Ethical Hacker (CEH … FITSP-O) • GIAC Certified Enterprise Defender (GCED), Foundational Cybersecurity Technologies (GFACT), Information Security Fundamentals (GISF), Certified Forensics Analyst (GCFA), Certified Intrusion Analyst (GCIA), Defensible Security Architecture (GDSA), Global Industrial CyberSecurity Professional (GICSP), Security Essentials Certification (GSEC) Salary: Based on demonstrated skills and abilities to perform required responsibilities. Hiring Manager: Gino Wylie, Services Manager, Email: Target Start Date: February/ More ❯
Position Overview: We are seeking a Journeyman Information Security Analyst to support cybersecurity operations and information assurance activities at Eglin AFB. The ideal candidate will play a key role in maintaining the confidentiality, integrity, and availability of mission-critical systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities: Monitor and analyze system security logs and alerts … to identify suspicious activities and potential threats. Support vulnerability assessments and risk analysis activities. Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework). Assist with security incident response, containment, investigation, and remediation efforts. Maintain and review documentation for systems accreditation and security posture. Support audits, inspections, and assessments to ensure compliance with applicable security … to resolve security issues. Required Qualifications: Active Top Secret clearance. Current CompTIA Security+ certification (IAT Level II). 2-5 years of hands-on experience in information security or cybersecurity analysis. Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks. Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms. Strong analytical and problem-solving skills. More ❯
Net Talent is proud to partner with a leading FinTech company in Glasgow, which is looking for a passionate and experienced CyberSecurity Lead to join their innovative IT department. This position offers a unique opportunity to spearhead cybersecurity initiatives while managing a dedicated team in a hybrid working environment, allowing you to enjoy the best of both remote … collaboration. You will be instrumental in leveraging Microsoft 365 security technologies and fostering a culture of continuous improvement within the team. Manage, mentor, and develop a small team of cybersecurity engineers. Set and manage team projects, utilizing Azure DevOps for effective workflow. Oversee service request tickets related to cybersecurity, ensuring compliance with service desk SLAs. Maximize the value … outcomes. Collaborate with the Security Operating Centre and Networking engineers to drive security initiatives. Act as the technical lead for cybersecurity-related queries and provide escalation support. Research cybersecurity best practices and make recommendations for enhancements. Offer technical mentoring and training to team members, promoting knowledge sharing. Ensure active monitoring and timely response to cybersecurity platforms. Utilize More ❯
Job summary Are you ready to make a meaningful management impact in the world of CyberSecurity? Join our vibrant team at NHS Blood and Transplant, where innovation and excellence collide. For the past three years, we've been on an exciting journey to build a new CyberSecurity Operations Centre (CSOC) at our World Class Barnsley Manufacturing Centre. Our … managing, enhancing, and expanding CSOC capabilities. This is a rewarding role in an organisation dedicated to saving and improving lives. Join us, and let's shape the future of CyberSecurity together at NHS Blood and Transplant. Note: It is a condition of this role that you successfully obtain (or transfer in) UK Security Clearance (SC) Clearance. Main duties of … the job In this role you will be responsible for managing the NHS Blood & Transplant CyberSecurity Operations Centre (CSOC) services staff and tools, to provide 24x7 CyberSecurity Service. Your responsibilities will include: Developing and enhancing the CSOC to reduce Cyber risks Representing NHS Blood & Transplant Cyber at internal and external forums Managing and maintaining the CyberSecurity Area More ❯
We are searching for a Software Developer who will be crucial in driving the development of high-quality cybersecurity applications. This role involves building and maintaining backend and frontend services as we transition towards a microservices-based infrastructure to support our rapid growth. Responsibilities Build and maintain backend services in Python (FastAPI) Contribute to software, database, and product design More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Ecm Selection
This leading tech company specialises in integrated software and hardware systems for high-speed data processing, cybersecurity and radio communications. They are looking for a lead software engineer to join their team to provide expert C and C++ knowledge as well as be a mentor and leader for other engineers. You will be working alongside talented software engineers as More ❯
business units and stakeholders A consultative and professional approach to customer engagement Ability to adapt in meetings rather than sticking to scripts Experience managing accounts in the cloud or cybersecurity ecosystem to elevate business performance is preferred. Wiz is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, sex (including pregnancy, childbirth, reproductive health More ❯
Tampa, Florida, United States Hybrid / WFH Options
Living Talent
Well-established & Rapidly Growing MSP Culture: Fast-paced, yet highly collaborative & entrepreneurial. Hybrid: 2 days in office (downtown Tampa) Base Salary 90k - 110k Services include : Managed IT Infrastructure, Cloud, Cybersecurity Client profile : Enterprise & SMBs Primary role & responsibilities Technical Leadership and Development Team size: 5 Client Communication, Relationship Management and Support Service Delivery Oversight Process & Policy Development Report to the CTO More ❯
Varied projects with high-performance C/C++ coding This leading tech company specialises in integrated software and hardware systems for high-speed data processing, cybersecurity and radio communications. They are looking for a lead software engineer to join their team to provide expert C and C++ knowledge as well as be a mentor and leader for other engineers. More ❯
Varied projects with high-performance C/C++ coding This leading tech company specialises in integrated software and hardware systems for high-speed data processing, cybersecurity and radio communications. They are looking for a lead software engineer to join their team to provide expert C and C++ knowledge as well as be a mentor and leader for other engineers. More ❯
hash-based) Hands-on experience with Scripting and automation tools (Python, Bash, CI/CD) Proficiency in development languages like Python, Java, C++ or Rust Familiarity with secure coding, cybersecurity practices, and PQC standards More ❯
Identity Channel Partner Manager London Location: South East UK (commutable to London) We are working with a CyberSecurity business who are looking for a Channel Partner Manager to drive and grow relationships across their identity ecosystem. Prior experience working within VARs, distributors, vendors or resellers in the identity space is essential. You must have experience working with technologies such More ❯
Whiteley, Fareham, Hampshire, England, United Kingdom
Gattaca
are looking for a knowledgeable consultant within the Defence and National Security Technology industry to join us on a Permanent desk where you will typically recruit for candidates across CyberSecurity, IT Infrastructure, Cloud, Software Development and Network Engineering. What’s in it for you? 1. An opportunity to join a team who are already market leaders in the Defence More ❯
awareness and compliance regarding data protection issues. Development and management of the data protection and privacy framework to ensure compliance with the GDPR and other applicable privacy, AI and cybersecurity legislation & guidance. Delivering proactive and pragmatic advice to maximise compliance and minimise disruption and costs to the business. Our Company Rubicon Consulting is a Talent management consultancy which helps More ❯
Points and determining required actions to close gaps. Demonstrable proficiency in a wide range of information IT security technologies and embedded security Ability to maintain a working knowledge of cybersecurity principles and elements Understand global program structure, launch plan and timing, and global program ownership Demonstrable experience of senior stakeholder management and relevant management reporting. Ability to coach team members More ❯
Shirley, West Midlands, United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
professional with a passion for digital transformation, this is your chance to join a thriving team selling innovative, end-to-end solutions across IT Managed Services, Cloud, Unified Comms, CyberSecurity, and more. What You'll Be Doing Proactively identify and win new SME and enterprise-level clients Build and manage a qualified high-value sales pipeline Pitch and sell More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
CyberSecurity Analyst - Tier 3 When registering to this job board you will be redirected to the online application form. Please ensure that this is completed in full in order that your application can be reviewed. Come and join the Littlefish team! Role: CyberSecurity Analyst Tier 3 Work location: Nottingham or Sheffield (Hybrid) Salary banding: £55,000 Must be … energetic, friendly people we would love to hear from you. The role and what youll be getting up to on a day to day basis: Littlefish is seeking a CyberSecurity Analyst Tier 3 to come and join our growing Cyber division. As our CyberSecurity Analyst Tier 3, you will monitor customer infrastructure for potential threats. Undertaking timely investigation … and response to security alerts to identify security incidents and act to appropriately contain threats. Supporting, as required, the CSOC Manager in the day-to-day running of the CyberSecurity Operations Centre (CSOC) operations team. Acting as a point of escalation for the CyberSecurity Analysts the role has responsibility for coaching and mentoring the analysts on a day More ❯
Solihull, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
professional with a passion for digital transformation, this is your chance to join a thriving team selling innovative, end-to-end solutions across IT Managed Services, Cloud, Unified Comms, CyberSecurity, and more. What You'll Be Doing Proactively identify and win new SME and enterprise-level clients Build and manage a qualified high-value sales pipeline Pitch and sell More ❯
Employment Type: Permanent
Salary: £50000 - £55000/annum + Comm + Car Allowance + Bens
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Sterling Bridge Limited
new business sales within the MSP or IT services space Confident identifying, qualifying, and closing SMB and mid-market clients Strong knowledge of cloud, IT support, managed services, or cybersecurity Excellent communication, consultative selling style, and pipeline management skills Self-motivated, target-driven, and eager to help build a sales machine Exclusive Benefits: £35,000 Basic Salary + More ❯
HubSpot, Google Analytics + Confident using social media platforms in a professional context and editing content + Able to manage multiple tasks at once + Performance marketing Tech or Cybersecurity experience is preferred but not essential. If you feel like you have the right skills and experience for this role, then please apply with a copy of your updated CV. More ❯
Magic, etc Extensive experience of requirements management practices in line with Systems Engineering processes Real world experience of system engineering process and method development Knowledge of system modelling, FMA, Cybersecurity, Functional safety practices More ❯
Magic, etc Extensive experience of requirements management practices in line with Systems Engineering processes Real world experience of system engineering process and method development Knowledge of system modelling, FMA, Cybersecurity, Functional safety practices Education: Relevant Systems Engineering studies, accreditations and practices More ❯