opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Cloud Security Engineer to assist with the strategic input & mitigation of security risks for a Data centre migration to the AWS. Extensive experience in cybersecurity engineering Proven track record of operating within enterprise-level infrastructure environments In-depth knowledge of security principles, technologies, and industry best practices Skilled in scripting More ❯
facing our customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview Encompasses technical, engineering, data analytics, cybersecurity, management, operational, logistical, and administrative support for Bureau of Diplomatic Security, Cyber and Technology Security Directorate in three key offices/functional areas: CyberMore ❯
management (IAM) concepts and tools. • Experience with encryption techniques and cryptographic protocols. • Understanding of containerization technologies like Docker and Kubernetes. • In-depth understanding of cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to More ❯
Basic Qualifications A minimum of a Bachelor's degree coupled with 3-5 years' experience in the Information Technology , Computer Science, IT, Information/CyberSecurity field from an accredited college or university arena or Master's Degree with 1 + years of relevant experience. Superior writing, communication and critical More ❯
shares; Site-to-Site VPN configuration & maintenance; PowerShell; Windows IIS security & management; Event Log analysis and troubleshooting; Working with external cloud and security providers; CyberSecurity experience including resolving issues raised from external PEN testing; Analytical skills in monitoring, evaluating and reporting on risk scenarios; Strong report-writing skills both More ❯
the local laws, regulations, and company rules to perform network maintenance or information security tasks; 1-3 years of experience in network maintenance, configuration, cybersecurity, and information; hard-working and quick learning. Experience with the details and practical application of current data protection legislation, with an in-depth understanding More ❯
NIST SP 800-82 Rev. A, ISO/IEC 27001, CIS Controls, DoD 8500.01, etc. The Network Operations engineer should also be familiar with cybersecurity tools such as SIEM (Security Information and Event Management) systems, and vulnerability scanners i.e. Assured Compliance Assessment Solution (ACAS). This position is located in More ❯
of the country or region to do the relative network maintenance or information security jobs; 1-3 years of experience in network maintenance, configuration, cybersecurity and information; Hardworking and quick learning. (2) Experience with the details and practical application of current data protection legislation, and possess an in-depth More ❯
of the country or region to do the relative network maintenance or information security jobs; 1-3 years of experience in network maintenance, configuration, cybersecurity and information; Hardworking and quick learning. (2) Experience with the details and practical application of current data protection legislation, and possess an in-depth More ❯
Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 4+ Years of experience in networking administration. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). More ❯
technical information effectively to non-technical stakeholders. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). More ❯
tools (e.g. Volatility). Analysis results documented in forensics report. Additional forensics/malware analysis activities may include: Perform efficient and prioritized identification of cybersecurity threats and incidents with an emphasis on clear articulation of the potential threat(s) and actualized risks associated with such threats and incidents. Objectively More ❯
Microsoft Defender, GitHub, Infrastructure as a code, Secrets Management Requirements And Qualifications: A bachelor's or master's degree in computer science, information technology, cybersecurity or a related field 8+ years of cloud security experience, focusing on designing and implementing secure cloud computing solutions mainly with AWS and Azure securityMore ❯
in securing DevSecOps and container platforms against accreditation requirements in classified environments. Strong experience in system engineering and collaboration with infrastructure service providers and cybersecurity stakeholders to architect and implement enterprise solutions. Strong experience architecting, designing, and building DevSecOps solutions at scale, in the cloud or on-premise, across multiple More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
with multiple agile teams across the program to determine the best DevSecOps practices across custom applications and COTS product •Apply hardware and software knowledge, cybersecurity standards in mission applications, & feedback from users to develop/modernize software. Basic Qualifications: • 3+ Years experience with DevSecOps principles and practices • Experience with More ❯
senior stakeholders, ensuring security is integrated by design from project inception to completion. Key Responsibilities Lead the development and implementation of end-to-end cybersecurity solutions, including architecture design, process creation, and alignment with industry best practices. Drive security integration early in the project lifecycle to ensure risks are More ❯
San Antonio, TX. The Military Medical Treatment Facilities (MTFs) IT (Information Technology) division supports the continued management and administration of DHA systems, applications, networks, cybersecurity, and telecommunications services for the PEO MS/J-6 through contractor staff augmentation. The Sr. Systems Administrator is tasked with improving IT practices and More ❯
San Antonio, TX. The Military Medical Treatment Facilities (MTFs) IT (Information Technology) division supports the continued management and administration of DHA systems, applications, networks, cybersecurity, and telecommunications services for the PEO MS/J-6 through contractor staff augmentation. The Sr. Systems Engineer is tasked with improving IT practices and More ❯
security implications of new technologies • Integrate new services into an existing system baseline with minimal disruption • Maintain detailed architecture documentation and interface definitions • Apply cybersecurity best practices in accordance with the Sponsor's Risk Management Framework (RMF) • Collaborate across organizational boundaries, including coordinating technical exchange meetings, stakeholder engagements, and user More ❯
with the ability to obtain a Top Secret Ability to be onsite 5 days a week in Washington, DC. 5+ years of experience in cybersecurity engineering, cloud security, or IT security, with a focus on Google Workspace (G Suite), AWS or Azure. Strong expertise in Google Admin Console, Security Center More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
with multiple agile teams across the program to determine the best DevSecOps practices across custom applications and COTS product •Apply hardware and software knowledge, cybersecurity standards in mission applications, & feedback from users to develop/modernize software. Basic Qualifications: • 3+ Years experience with Software Development principles and practices • Experience More ❯
etc, and the ability to apply them in diverse environments. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP More ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
ICEO
Second Line of Defense responsibilities in InfoSec and IT Compliance & Frameworks : Demonstrated success meeting GDPR, EU NIS2, and familiarity with ISO 27001, NIST, and cybersecurity best practices Risk & Governance : Skilled in conducting risk assessments, defining mitigation strategies, and creating/enforcing security policies Good technical understanding of IT infrastructure, software More ❯
successful candidate must be an individual who understands modern software development trends, understands engineering-led software security practices, and keeps up with the evolving cybersecurity threat landscape. The successful candidate will liaise with internal groups and our regional partners to ensure that program deliverables are met. Success in the More ❯