Job Summary: The Security Operations Lead is responsible for our security monitoring and incident response capabilities within the Square Enix CyberSecurity team (covering Europe and North America). The primary goals of the role are the timely detection of security incidents, effective response and the continuous improvement of our preventative and detective controls. This role will work alongside our … effectiveness of our preventative and detective controls, probing weaknesses and implementing improvements alongside our risk and engineering teams. The role is aimed at candidates with a broad and senior CyberSecurity skillset who are seeking to further develop their CyberSecurity career in an exciting industry. Engineering skills in maintaining Security Information and Event Management (SIEM) platforms and the configuration … productivity and effectiveness. Key Deliverables: Threat Detection & Incident Response Leading investigation and analysis of security alerts to identify and promptly respond to security events. Leading the response to major cybersecurity incidents, collaborating with key business and technical stakeholders during investigations to gather further information and coordinate response actions. Identifying and responding to game related threats like leaks, cheats, piracy More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Seeking a Cyber Technical Specialist 4 that is able to work with a dynamic team of system engineers and administrators responsible for design, implementation, operations … maintenance, and cybersecurity for large complex resilient hardware and virtualized infrastructure. This position will perform Cybersecurity/Information Assurance for all customer managed systems, applications, and hardware. Responsibilities Essential responsibilities and activities include but are not limited to: Design, implement, and maintain provided Security and Vulnerability tools including Host Based Security System (HBSS), Splunk, and Microsoft Defender for Endpoints. Analyze … implementing hardware and software solutions and virtual infrastructure technologies. Strong MS Excel, Word, PowerPoint, and Visio Skills Ability to travel internationally 10% Desired/Advantageous Qualifications CompTIA Security+ CompTia Cybersecurity Analyst (CySA+) Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Systems Security Certified Practitioner (SSCP) GIAC Security Essentials More ❯
Team supporting operations at Schriever Space Force Base. This role will provide expert-level network engineering support to mission-critical, secure environments with a focus on performance, resilience, and cybersecurity compliance. As part of an elite technical team, you'll be responsible for engineering, securing, and maintaining enterprise network infrastructure to support advanced cyber operations and national defense objectives. Key … and root cause analysis for Tier III/IV network issues in classified environments. • Optimize network performance and reliability through capacity planning, tuning, and proactive maintenance. • Collaborate closely with cybersecurity, systems, and mission teams to ensure network support for cyber initiatives. • Ensure compliance with DoD cybersecurity policies, including RMF and DISA STIGs. • Develop and maintain network documentation, including diagrams, SOPs … Extensive experience with Cisco and/or Juniper platforms in secure environments. • Familiarity with network security appliances (e.g., Palo Alto, Cisco ASA, IDS/IPS). • Strong understanding of cybersecurity compliance (RMF, DISA STIGs). • Ability to work independently under high-pressure mission conditions. Preferred Qualifications: • Certifications: CCNP, CCIE, JNCIP, Security+, or similar. • Experience with Zero Trust frameworks and IPv6 More ❯
The Role We are seeking a seasoned Senior CyberSecurity Consultant with a background in SOC engineering tools plus one of Cloud Security, Identity and Access Management (IAM) or Threat Modelling. In this role, you will work with cross-functional teams to deliver cutting-edge security solutions that address the evolving threat landscape, helping organisations to safeguard their critical assets. More ❯
Senior CyberSecurity Engineer As Senior CyberSecurity Engineer, you will be responsible for developing a high-quality response function that will navigate security incidents, drive process improvement and develop a collaborative culture where incidents are communicated and colleagues gain knowledge in these areas. Also, you ll build the infrastructure that the organisation needs to scale their detection and response More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
Senior CyberSecurity Engineer As Senior CyberSecurity Engineer, you will be responsible for developing a high-quality response function that will navigate security incidents, drive process improvement and develop a collaborative culture where incidents are communicated and colleagues gain knowledge in these areas. Also, you'll build the infrastructure that the organisation needs to scale their detection and response More ❯
severity of breaches. MicroSys provides HIRT remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based and network-based cybersecurity analysis capabilities. JOB DESCRIPTION: Cyber Incident Manager (IMG) Responsibilities: • Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise • Applying … knowledge of the tactics, techniques, and procedures of various criminal, insider, hacktivist, and nation state threat actors to identify and validate threats • Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data • Conducting cursory analysis of log data • Monitoring external data sources (e.g., Computer Network Defense … education. Desired Certifications: GCIH, GCFA GISP, GCED, CCFP or CISSP OPPORTUNITY Join an ELITE Cyber Team protecting our nation's critical infrastructure! This is a tremendous opportunity for experienced CyberSecurity Engineers to further their hands on technical skills in full life cycle security engineering in a highly technical environment using excellent state of the art technologies. This program is More ❯
Work for in London , Top 75 in the UK , and Top 50 Best Technology Companies to Work for . As part of their continued growth, they are seeking a CyberSecurity SOC Support Analyst to join their expanding Service Desk Team. About the Role This is an exciting opportunity for a motivated individual with at least 1 years of experience … of defence, monitoring systems and responding to alerts received through support tickets or telephone calls. Key Responsibilities Monitor and categorise potential threats based on priority and severity Triage all cybersecurity incidents as part of the first response team Take ownership of incidents, providing initial remedial actions per established playbooks Liaise with third-party service providers and log support tickets … as required Provide operational support to the wider CyberSecurity Team during incident response Maintain accurate documentation of all actions and resolutions Essential Experience Working knowledge of Microsoft Defender XDR and Microsoft Sentinel SIEM technologies Working knowledge of Microsoft Defender suite including Endpoint Detection and Response Understanding of key Microsoft 365 Cloud Technologies from a threat landscape perspective Essential Certifications More ❯
Job Description: Leonardo are currently seeking a skilled Principal CyberSecurity Engineer to join our Enterprise Security Engineering Team in Bristol. This role offers the opportunity to make a real impact by shaping the future of cyber defence for the UK's most critical national systems. Your Impact You will contribute to safeguarding vital national information systems by: Taking ownership More ❯
ITC Infotech is looking for a CyberSecurity Analyst to join our team in Edinburgh, UK. Your X-Factor Work ethic - You are a consummate professional. Aptitude - You have an innate capacity to transition from project to project without skipping a beat. Communication - You have excellent written and verbal communication skills for coordination across projects and teams. Impact - You are … in support of the global cyber operations function Assist with forensics investigations. Participate in the creation, modification and maintenance of all Cyber Monitoring policies and procedures Keep abreast of cybersecurity trends and the emerging threat landscape in general and as it relates to client. Deliver timely and detailed documentation related to any incident including the findings, review and follow More ❯
Bedford, Massachusetts, United States Hybrid / WFH Options
SkyBridge Aviation
SkyBridge Aviation is seeking a highly skilled Security Control Assessor to support a U.S. Air Force cyber and electronic warfare contract. The ideal candidate will have extensive experience with cybersecurity assessments and Risk Management Framework (RMF) processes and hold an active Top Secret clearance. This position requires a strong understanding of DoD cybersecurity requirements and the ability to support mission … critical systems in a hybrid work environment. Key Responsibilities: • Conduct comprehensive cybersecurity assessments in support of RMF accreditation for Air Force systems. • Develop and maintain cybersecurity documentation including System Security Plans (SSPs), POA&Ms, and Security Assessment Reports (SARs). • Perform control validation, security control testing, and system vulnerability assessments. • Support the Authorization and Accreditation (A&A) process in compliance … with DoDI 8510.01 and NIST SP 800-53. • Collaborate with system engineers, ISSMs, and other stakeholders to ensure cybersecurity requirements are integrated into system design. • Monitor and report on cybersecurity posture and ensure systems maintain their authorized security baseline. • Stay current on DoD cybersecurity policies, procedures, and emerging threats. Required Qualifications: • Active Top Secret clearance • DoD 8570.01-M IAT More ❯
Principal Defence Consultant - CyberSecurity Principal Defence Consultant - CyberSecurity Company: Graduate Recruitment Bureau (Hiring for client) Courses Considered: Chemical Engineering,Data Science,Economics,Electronic and Electrical Engineering,IT,Maths and Stats,Mechanical Engineering,Physics, Course Notes: Experience over academics, although likely to be smart bachelor degree Are you an experienced cybersecurity professional with a passion for protecting national … to the security and resilience of mission-critical ICT systems across the Armed Forces and wider defence community. In this high-trust role, you'll design and deliver advanced cybersecurity solutions for complex defence programmes-projects that underpin operational readiness, secure classified information, and protect national interests. Working closely with senior military and civilian stakeholders, you'll play a … work on-site with clients across the UK, you'll gain unique exposure to the broader national security ecosystems, building both your technical expertise and your understanding of how cybersecurity supports the UK's strategic defence objectives. Minimum of 5 years' experience working with complex ICT systems, ideally within defence, national security, or other high-assurance environments Strong understanding More ❯
are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is hiring a Senior Technical Program Manager to support enterprise IT and cybersecurity initiatives under the Military Community and Family Policy (MC&FP) Outreach and Digital Enterprise Services (MODES) contract. This role ensures technical performance across infrastructure, security, and compliance efforts within a … visibility, mission-critical environment. Responsibilities: Oversee IT and IA contract support staff and performance metrics. Lead project teams in Agile, CMMI, and ITIL environments. Manage implementation of RMF compliance, cybersecurity controls, and CC SRG adherence. Drive organizational change management and quality assurance processes. Serve as primary escalation and reporting point for technical and contractual issues. Ensure projects remain within scope More ❯
and communicate progress status updates and weekly status updates on all technical risk assessment reports, cases describing potential security concerns and mitigations to enhance security posture. Required Skills: 1. CyberSecurity Support: 2. Demonstrated experience analyzing IT systems for cybersecurity vulnerabilities. 3. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and … Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cybersecurity vulnerabilities. 5. Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232. 6. Demonstrated experience with multiple OS's, including Windows … experience ensuring appropriate risk mitigation considerations, risks and vulnerabilities are well understood and appropriately mitigated. 13. Demonstrated experience analyzing procurement processes of hardware, software and services to comply with cybersecurity and operational needs. 14. Demonstrated experience creating concise and well-structured written assessments. 15. Certifications: CISSP Certification. Desired Skills: 1. CyberSecurity Support 2. Demonstrated experience with the Sponsor More ❯
disseminating abundant information accurately Ability to write reports Exceptional verbal, written, and visual communication skills At least 5 years working in virtual counterintelligence (CI) operations and supporting federal defensive cybersecurity operations AND/OR At least 5 years of familiarity with virtual social media platforms in support of national mission objectives and goals. Bachelor's degree in computer science, international … with an innovative approach to business planning Knowledge of DoD CI/HUMINT policies and structure. Familiarity with emerging intelligence technologies and their applications in CI/HUMINT. DoD cybersecurity coursework and certifications demonstrating comfort with databases, technologies, and methods of support to virtual operations. Security Requirements Must possess and maintain a TS/SCI clearance at time of hire More ❯
Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: Job Description Leonardo UK is seeking a Senior Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the delivery of security aspects to the company's core products and to external stakeholders. This requires engaging with engineering teams and delivery of all facets of cyber and information security related to the delivery … to changing schedules; reliability and quality of task delivery; flexibility in working hours and locations; team player. A degree in an engineering discipline and/or degree in a cybersecurity discipline, OR equivalent recognised professional cybersecurity certification. Knowledge and Demonstratable Experience 3+ Years delivery experience in a Cyber/Engineering Role. Involvement in MOD accreditation and secure by … It would be nice if you had: Understanding of the engineering lifecycle. Knowledge of current Cryptographic technologies,Key ManagementSystems & practicalCOMSECimplementations in line with MOD/NCSC standards. Knowledge of CyberSecurity & Airworthiness (RCTA-DO-326A/B, 355A & 356A). Security Clearance You must be eligible for full security clearance. For more information and guidance please visit : Life at Leonardo More ❯
Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: Job Description Leonardo UK is seeking a proven, experienced Principal Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the delivery of security aspects to the company's core products and to external stakeholders. This requires co-ordination with engineering teams and delivery of all facets of cyber and information security related … changing schedules; reliability and quality of task delivery; flexibility in working hours and locations; team player. A degree and/or MSc. in an engineering discipline and/or cybersecurity discipline, OR equivalent recognised professional cybersecurity certification. Knowledge and Demonstratable Experience 5+ Years delivery experience in a Cyber/Engineering Role. Leading delivery of MOD accreditation and secure … understanding of the engineering lifecycle and key gate review activities. Knowledge of current Cryptographic technologies,Key ManagementSystems & practicalCOMSECimplementations in line with MOD/NCSC standards. Knowledge or experience of CyberSecurity & Airworthiness (RCTA-DO-326A/B, 355A & 356A). Security Clearance You must be eligible for full security clearance. For more information and guidance please visit : Life at Leonardo More ❯
of AI risk and ethics frameworks including NIST AI RMF, OECD AI Principles, and ISO/IEC 42001; able to assess systems for fairness, bias, and explainability. Familiarity with cybersecurity compliance frameworks (e.g., NIST RMF, FISMA, CMMC) and integration of AI systems into secure, audit-ready environments. Proficient in machine learning techniques (supervised, unsupervised, reinforcement learning) and deep learning architectures More ❯
Government/Military Clearance Required: TS/SCI with Polygraph Full-Time Fully Funded $130,000-$150,000 (Depending on Experience) Overview: Helm Point Solutions is a woman-owned cybersecurity and physical security firm supporting the nation's most critical systems and infrastructure. We're seeking experienced Information Systems Security Engineers (ISSEs) to support vital intelligence operations that directly impact … national security. You'll join a skilled cybersecurity team responsible for strengthening the systems that protect the country's most sensitive missions-delivering standardized, scalable security solutions across multiple teams and environments. What You'll Do: • Conduct security assessments to identify vulnerabilities and ensure IA compliance. • Define, verify, and validate system security requirements and contribute to the design of security … architectures. • Implement and integrate IA and cybersecurity solutions across complex technical environments. • Support architects and developers in applying security policies and enterprise security solutions. • Identify, assess, and mitigate risks throughout the program lifecycle. • Apply advanced knowledge in risk management, incident handling, intrusion detection, and security engineering. • Support certification and accreditation activities within NSA/CSS NISCAP, DoD RMF, and NIST More ❯
TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: If you are looking for a position that is different from your normal network/cybersecurity position, please keep reading. We are looking for Network Security Engineers who are familiar with both network defense and offensive techniques to support ongoing operations and secure our customers … management and familiarity with network penetration testing and offensive security. Candidates should have a minimum of 7+ years of experience as a Network Engineer, System Engineer or in the CyberSecurity field as a hands-on penetration tester. Candidates with fewer years of experience will be considered on a case-by-case basis, depending on technical skill level. JOB SUMMARY … include performing network packet inspection, traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of information security practices. • Experience using virtual infrastructure (e.g., vSphere). • Experience in a cyber-security role such as network defense, penetration testing and network forensics. • Experience in either the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure. • Proven ability More ❯
The National Physical Laboratory (NPL) is seeking a Principal Enterprise Security Architect to lead cybersecurity design and assurance for national-scale Position, Navigation, and Timing (PNT) programmes; requiring expertise in enterprise security architecture frameworks, cloud and IT technologies, risk mitigation, and relevant certifications such as CISSP or CISM, while collaborating with senior stakeholders and ensuring alignment with NPL's … security strategy and compliance with government and industry standards. This role will be responsible for the overall cybersecurity design, development and delivery across strategic PNT programmes. The role will be responsible for delivering assurance relating to activities of high complexity and risk, making decisions that will enable NPL to achieve its goals within its risk appetite. The Principal Enterprise … Security Architect will lead the CyberSecurity pillar within the PNT Technical Design Authority, overseeing the implementation of solutions to ensure technology and digital solutions align with the enterprise security roadmap. This specialist position will be report into the head of NPL's CyberSecurity Team, part of the NPL CIO function helping to provide all of NPL with day More ❯
Weapon System Element and Combat System Domain Engineering, Fleet and Land Based Test Site Support. TASKING: Software/security tools development using Python Engineering support for technical implementation of cybersecurity solutions in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration. Conduct vulnerability research, malware analysis … penetration testing, and reverse engineering development of computer network operations, as required. Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and applications and perform proof-of-concept, product evaluation of those tools and applications to determine feasibility of meeting the Navy's cybersecurity requirements. Responsible for researching, deriving, and documenting cybersecurity requirements as they relate to … Secret security clearance (US Citizenship required) Bachelor's Degree in Computer Science or related field Strong Python skills Knowledge of cybersecurity concepts that identify, exploit, protect against, or mitigate cybersecurity vulnerabilities Knowledge of Virtual Machine (VM) architecture and configurations is preferred We are equal opportunity/affirmative action employers, committed to diversity in the workplace. All qualified applicants will More ❯
O&R) Team; however, this role may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams. This role is also responsible for coordinating with both the Cybersecurity Services Section and other sections or divisions within the organization. Job Duties: -Perform network security monitoring and incident response for a large organization -Coordinate with other government agencies to record … detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cybersecurity/incident response events; architecting, engineering, developing and implementing cybersecurity/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software … NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. -3 years of penetration testing experience for networks, web applications, and enterprise systems. -2 years of experience with Federal cybersecurity standards, industry best practices and guidelines. -Bachelor's degree in computer science, information systems analysis, science/technology, information management, computer engineering, or electrical/electronic engineering or equivalent combination More ❯
innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is seeking a Senior Information Assurance Specialist to lead cybersecurity efforts for TRADOC G2 operations at Fort Eustis, VA, ensuring compliance with DoD Risk Management Framework (RMF), DISA STIGs, and cybersecurity policies. This role requires expertise in system accreditation, vulnerability … Oversee security audits and incident response activities. Provide guidance and mentorship to junior information assurance personnel. Qualifications Active DoD Top Secret/SCI clearance required. Bachelor's degree in cybersecurity, IT, or related field preferred. 8-13 years' experience CISSP, CISM, or equivalent certification required. Extensive experience with DoD cybersecurity frameworks and RMF. EEO Commitment All qualified applicants will receive More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Senior CyberSecurity Enterprise Architect will support the enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling roadmap for cyber security. The role … methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Support the development and maintenance of the cybersecurity tooling strategy and technical sub strategies in areas such as identity, network, detection, firewalls and encryption. Support the cybersecurity architecture design authority and a mechanism to govern the … business programmes and the Chief Technology Officer and the wider Enterprise Architecture team to define and implement new capabilities and secure architectures suitable for the Group. You have Good cybersecurity experience with hands-on cybersecurity experience in IT/OT, with knowledge in a range of the technical disciplines such as: Cloud security, network security, Identity and Access More ❯