you'll enable our customers to securely integrate and automate their cloud environments, leading deployments of Palo Alto Networks' Cortex XSOAR platform to accelerate detection, response, and integration across cybersecurity tools. You'll serve as a trusted consultant, guiding customers through complex deployments, developing strategic automation workflows, and driving continuous improvement through real-time support and innovation. You'll collaborate … playbook customization Linux/Unix command-line proficiency and basic network troubleshooting Experience managing complex automated security solutions in large environments Deep understanding of security threats, internet protocols and cybersecurity tools and applications Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals Detailed experience in the installation, configuration, operation and documentation … of security solutions to prevent cybersecurity threats Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers Experience with RMF, STIGs, SCAP, or NIST frameworks Ability to document and explain complex security processes clearly Relevant certifications such as Security+, CEH, CISSP, GCIA are a plus More ❯
We are seeking a motivated and detail-oriented Information Security Engineer to join our team here at ZAVA. In this role, the successful candidate will support the organisation's cybersecurity efforts by assisting with the implementation, monitoring, and maintenance of security systems and processes. They will work closely with senior security team members to identify vulnerabilities, respond to incidents, and … our data Investigate Events of Interest (EoIs) Act upon alerts Continuous learning development Documentation writing and reviews Technical skills & experience A degree (preferred but not mandatory) in Computer Science, Cybersecurity, Information Technology, or a related field is often advantageous. Entry-level certifications (optional but beneficial) that demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ More ❯
reporting outputs with enterprise risk management and control frameworks. Strong knowledge of risk management frameworks (e.g., NIST, ISO 27001, COBIT) and control environments. Deep understanding of IT general controls, cybersecurity principles, and technology risk domains. Proven experience in risk analytics, data visualization, and reporting (e.g., using Power BI, Tableau, or similar tools). Familiarity with GRC platforms and risk … data management practices. Experience in a risk management, IT audit, or cybersecurity role within a financial services or regulated environment. Qualifications: Educated to degree level or equivalent. Hold professional qualifications in a related subject for example, CRISC, CISSP, CISM, CISA 7 years + experience in technology or cyber risk management role with a focus on analytics and controls Experience More ❯
you'll enable our customers to securely integrate and automate their cloud environments, leading deployments of Palo Alto Networks' Cortex XSOAR platform to accelerate detection, response, and integration across cybersecurity tools. You'll serve as a trusted consultant, guiding customers through complex deployments, developing strategic automation workflows, and driving continuous improvement through real-time support and innovation. You'll collaborate … playbook customization Linux/Unix command-line proficiency and basic network troubleshooting Experience managing complex automated security solutions in large environments Deep understanding of security threats, internet protocols and cybersecurity tools and applications Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals Detailed experience in the installation, configuration, operation and documentation … of security solutions to prevent cybersecurity threats Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers Experience with RMF, STIGs, SCAP, or NIST frameworks Ability to document and explain complex security processes clearly Relevant certifications such as Security+, CEH, CISSP, GCIA are a plus Up to 30% domestic travel may be required More ❯
This position is dedicated to Project Management across SSD, with a specific focus on Cybersecurity and Operational, and will report to the Manager, Strategy and Project Management. In this role you will: • Responsible for executing multiple Cybersecurity high visibility, high risk and complex SSD projects in collaboration with other Departments, and Divisions. • Create and maintain project charter, project plans, risk … be responsible for the development of project documents such as project charter, communications plan, requirements metrics, and similar documents. • 2-3 years of experience working in one of these: cybersecurity, DoD or similar government industry • Minimum 2 years of experience working in a Project Management Office • Proficiency in O365, Microsoft Project Plan (.mpp) Office • Strong skills in excel and power More ❯
classified system operations to maintain mission-critical infrastructure. The Infrastructure SME will serve as a technical authority for network security, system integration, and operational resilience, ensuring compliance with DoD cybersecurity policies, infrastructure best practices, and mission objectives. Candidate must be familiar and worked in a 24/7 Network Operations Center (NOC), or Infrastructure & Operations (I&O) environment, and a … Air Force, other Dept of Defense branches, or Dept of State. Key Responsibilities Infrastructure Operations & System Administration: Oversee IT infrastructure, networks, and system architecture supporting Space C2 operations. Network & Cybersecurity Management: Ensure network integrity, security, and performance in classified and unclassified environments. Incident Response & Troubleshooting: Serve as the Tier 3 escalation point for complex infrastructure and network issues. Agile-Based … Familiarity with virtualization, cloud platforms, and hybrid infrastructure (e.g., VMware, Azure, AWS) - Ability to lead system upgrades and tech refresh projects - Knowledge of DoD RMF compliance, DISA STIGs, and cybersecurity controls 3. Operational Responsibilities - Provide onsite infrastructure support - Oversee infrastructure maintenance, troubleshooting, and Tier 3 escalation - Support ATLAS monitoring system and integration with Space C2 systems 4. Collaboration & Documentation - Coordinate More ❯
ecosystem. This role ensures that security, reliability, and performance are embedded into every stage of solution design and delivery. Operating at the intersection of business strategy, technology architecture, and cybersecurity, the Senior Cyber Solutions Architect drives the strategy in relation to the integration of security governance, risk management, and compliance frameworks (ISO, NIST, Essential Eight) to protect platforms, data … Descopes practices, the role drives value creation by aligning technical roadmaps to customer and business outcomes and identifying opportunities for adopting AI technology. Success in this role means architecting cybersecurity and delivery requirements into solutions defined by clear, actionable designs, fostering cross-functional collaboration, and ensuring the enterprise consistently delivers secure, high-quality solutions that meet customer expectations. Key … Australian-owned and operated corporation, Consunet strives to be the country's leading cyber and spectrum security solution developer, and trusted industry partner to the Australian Defence and cybersecurity communities. A strong research and development and collaboration emphasis underpins our culture of innovation and excellence. We lead with vision to deliver trusted and sustainable outcomes for discerning and astute More ❯
contribute to developing and testing innovative solutions while ensuring compliance with rigorous security and operational standards. This role involves collaboration with cross-functional teams, including DevOps, software engineering, and cybersecurity professionals, to deliver high-quality, secure, and efficient solutions. Key Responsibilities: 1. Testing and QA: Develop, execute, and maintain automated test scripts using tools like Pytest and Selenium. Perform backend … Windows systems. Manage virtualized environments (e.g., VMware, VirtualBox). Troubleshoot networking issues, including IP address configuration and virtual NICs. 5. Security and Compliance: Conduct vulnerability assessments and remediation. Apply cybersecurity principles to ensure secure software and system design. Qualifications: Education: BS in Computer Science or equivalent technical field. Advanced degree preferred. Experience: 5+ years in software development, testing, or DevSecOps More ❯
of mergers, acquisitions, and divestitures, ensuring access and security protocols are followed. • Draft internal IT communications and notifications related to outages and maintenance windows. Qualifications: • Bachelor's degree in Cybersecurity, Information Systems, or related field (or equivalent work experience). • 3+ years of experience in IT compliance, security, or risk management within classified or regulated environments. • A minimum of 5+ … both technical and non-technical audiences. • Ability to operate independently as well as in collaborative team environments. • Experience with automation tools (Ansible preferred). • In-depth knowledge of DoD cybersecurity frameworks (NIST 800-171, 800-53, RMF) is strongly preferred. • Familiarity with STIGs and DoD security hardening best practices is advantageous. • Security+ (or equivalent) certification or the ability to obtain More ❯
Centurion seeks highly qualified Systems Integration Lab Manager with a strong working knowledge of network engineering to provide expert guidance and direction underpinning on-site support to Air Force Life Cycle Management Center/Cyber and Networks Directorate. This position More ❯
Description To grow the Cybersecurity team, we are looking for: Global Cybersecurity Risk Service Manager Location: Remote from Poland or UK Responsibilities: Owns the services related to Cybersecurity Risk Management Identifies core requirements for Risk Management in cooperation with stakeholders Develops requirements and frameworks for Issue and Risk Management in alignment within the department Ensures processes and procedures in the More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
Are you a CyberSecurity professional ready to take the next step in your career? Join a forward-thinking, award-winning London-based MSP that’s at the forefront of CyberSecurity services and play a pivotal role in their journey to becoming a Cyber Essentials Plus Certification Body. We’re looking for a CyberSecurity Assessor to join my … client's expanding CyberSecurity Projects team. If you're passionate about security, skilled in Microsoft 365 and Azure, and experienced with audits and offensive security tools, we want to hear from you. What You’ll Be Doing Conducting CyberSecurity Assessments and audits across Microsoft 365 and Azure environments Performing Cyber Essentials and Cyber Essentials PLUS audits in line … as an escalation point for security-related technical queries and pre-sales support To be considered for this role you’ll need At least 2 years in a similar CyberSecurity Assessment/Auditing role Previous work in a Managed Service Provider (MSP) environment A Strong understanding of Microsoft 365 & Azure Cloud Experience with technical audits and offensive security tools More ❯
Data Protection Team to promote the sharing of best practice and ensure alignment between SCI and Member information security and data protection programmes. Job Title: Specialist, Information Security Team: Cybersecurity and Information Assurance, Reports To: Head of Information Security Services Work Pattern : Hybrid/Remote with flexible working options available Contract Length: Permanent Grade : P3 Location : Any approved Save the … alignment of information security tools and best practices across the movement. Help facilitate clear and regular communications regarding security initiatives and concerns. Experience and Skills Essential Experience working on cybersecurity, information security and data protection requirements within a global organization or related, technical or IT support. Good understanding of IT infrastructure including cloud, networks and information systems. Good knowledge of … organisational and self-management skills. Strong communication skills, in English. Commitment to Save the Children mission and values Desirable Strong working knowledge of ISO/IEC 27001 and NIST Cybersecurity Framework (CSF) Experience of 'field operations' and the cybersecurity-related issues associated with working in remote, inhospitable and insecure environments Strong understanding of/willingness to learn key trends in More ❯
when you're inspired to think big and bring your ambition to work every day, which is why, at British Airways the sky is never the limit. The role: CyberSecurity Engineering Principal The CyberSecurity Engineering Principal is a highly experienced and skilled leader within the BA Cyber Team, reporting to the CyberSecurity Engineering Manager. This role plays … a critical part in shaping and driving improvements in BA's Cybersecurity posture. As the line manager of a small team of CyberSecurity Engineers, you will provide both technical advice on BA's security products and foster a culture of continuous learning and development. You will ensure that your team stays ahead of emerging threats and technologies by … security professionals and an ability to foster a collaborative and learning-oriented environment Proven track record of implementing and managing security solutions in a complex environment Strong understanding of cybersecurity processes, people and technology Experience in implementing and managing security solutions in complex environments Focused on building and nurturing the team's capability and understanding Ability to maintain a More ❯
Job Summary C++ Developer Country: United Kingdom Location: Malvern Sector: Software Developer Salary: GBP Up to £40,000 Job Type: Permanent Technologies: C++ developer SC Programming Code Java CyberSecurity Windows Linux Solaris Agile Degree HTTP C# SMTP AWS Docker Azure Powershell Perl Python PHP A growing cyber-security company is looking for a C++ Developer to join their existing … highly skilled development team writing complex cybersecurity solution software. This is the perfect opportunity for somebody who has a passion for cybersecurity and for high quality coding. 2 years of C++ programming experience required. Role and Responsibilities: Writing high quality code following the in-house full life cycle development methodologies and our clients chosen toolset. Unit, module and … UK security clearance. Problem solving and analytical skills. Computing, scientific or mathematical degree is preferred (2 nd Class honours or over). Domain knowledge of, or an interest in, cybersecurity is preferred. A minimum of 2 years' experience of programming in C++. The ability to work collaboratively across functions within the business and to be adaptable and flexible. Good More ❯
Security Control Assessor (Authorizing Official) Position Summary: As Security Control Assessor (Authorizing Official/AO) you will provide cybersecurity support to the National Geospatial-Intelligence Agency (NGA) in Springfield, VA. You will award authorization to operate (ATO) for systems and/or networks based on the determination of acceptable risk. Clearance Requirement: Must have an active DoD Top Secret/… and protocols, and network security methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk) Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cybersecurity and privacy principles and tools. Knowledge of Security the Risk Management Framework (RMF) and Assessment and Authorization process. Knowledge of information technology (IT) security principles … and methods (e.g., firewalls, demilitarized zones, encryption). Skill in discerning the protection needs (i.e., security controls) of information systems and networks. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to coordinate cyber operations with other organization functions or support activities. Physical Demands and Expectations: Regular physical activity More ❯
our people-first culture and collaborative environment. Position Overview We are seeking an experienced IT Manager to lead and oversee all aspects of our organization's IT infrastructure and cybersecurity initiatives. This role is critical to ensuring the performance, security, and reliability of our technology systems to support ongoing operations in a fast-paced food manufacturing environment. Essential Duties and … and governance. Collaborate with executive leadership to align technology strategies with business needs. Manage the IT budget, including capital investments, operating expenses, and staffing. Develop and maintain a comprehensive cybersecurity strategy to protect the organization from internal and external threats. Collaborate with other departments to understand technology needs and deliver effective solutions. Maintain documentation for systems, processes, and IT policies. … manage the IT, providing mentorship, development opportunities, and performance evaluations. Foster a culture of continuous improvement, security awareness, and collaboration. Ensure that training programs are in place to maintain cybersecurity awareness for all employees. Oversee the daily operations of IT systems, including networks, servers, applications, and telecommunications. Ensure uptime, reliability, and scalability of IT infrastructure. Implement disaster recovery and business More ❯
our people-first culture and collaborative environment. Position Overview We are seeking an experienced IT Manager to lead and oversee all aspects of our organization's IT infrastructure and cybersecurity initiatives. This role is critical to ensuring the performance, security, and reliability of our technology systems to support ongoing operations in a fast-paced food manufacturing environment. Essential Duties and … and governance. Collaborate with executive leadership to align technology strategies with business needs. Manage the IT budget, including capital investments, operating expenses, and staffing. Develop and maintain a comprehensive cybersecurity strategy to protect the organization from internal and external threats. Collaborate with other departments to understand technology needs and deliver effective solutions. Maintain documentation for systems, processes, and IT policies. … manage the IT, providing mentorship, development opportunities, and performance evaluations. Foster a culture of continuous improvement, security awareness, and collaboration. Ensure that training programs are in place to maintain cybersecurity awareness for all employees. Oversee the daily operations of IT systems, including networks, servers, applications, and telecommunications. Ensure uptime, reliability, and scalability of IT infrastructure. Implement disaster recovery and business More ❯
supporting SMC and AFSPC acquisition programs. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization. Responsibilities include, but are not limited to : Serve as the RMF Cybersecurity Specialist for the organization's Systems. Maintain Day-to-Day security analysis of More ❯
supporting SMC and AFSPC acquisition programs. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization. Responsibilities include, but are not limited to : Serve as the RMF Cybersecurity Specialist for the organization's Systems. Maintain Day-to-Day security analysis of More ❯
TEKsystems is searching for a CyberSecurity Engineer for a partner in the Atlanta area. Must be onsite. The CyberSecurity Software Engineer designs, develops, and tests cybersecurity software in languages such as Java, C, and C++. The CyberSecurity Software Engineer requires extensive knowledge of programming languages, software development, and computer operating systems in order to apply engineering principles … to software creation. The necessary skill areas for the CyberSecurity Software Engineer include programming and coding, fundamentals of computer science, design and architecture, algorithms and data structures, information analysis, debugging software, and testing software. The CyberSecurity Software Engineer also creates novel cybersecurity technology components and software to ensure that critical systems and information are resilient to cyber … exploits and attacks. The researcher also performs attendant vulnerability assessments, analysis, and software engineering and design. The CyberSecurity Software Engineer also develops hardware and software prototypes, and tests those prototypes in realistic environments. Key Responsibilities • Perform software development, software testing/debugging, software modification/enhancement, and software documentation • Develop and maintain kernel and user-level software and scripts More ❯