Experience with testing and reviewing OT architectures and related network device configurations. Experience with testing Critical National Infrastructure environments. Experience with working with IEC 62443 or comparable standards. Recognised cybersecurity certifications: e.g. CREST CCT, Cyber Scheme CSTL … CHECK Team Lead. Technical certifications/training aligned to OT security: e.g.: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Knowledge of cybersecurity regulatory landscape: e.g. CAF, NCSC, NIS. Knowledge of OT network protocols: e.g. modbus, DNP3, LoRaWAN. Tools: Experience with standard penetration testing tools, such as port and vulnerability scanners, BurpSuite … to maintaining the highest ethical and professional standards. Prior experience leading OT/ICS security assessments. Are you an experienced Lead Operational Technology (OT)/Industrial Control System (ICS) CyberSecurity Consultant looking to further improve your skills and take on more responsibilities? If so, this opportunity is perfect for you More ❯
closely with stakeholders across IT, security, and compliance, you'll strengthen the business's overall security posture. What You'll Bring: Extensive experience in governance, risk, and compliance within cybersecurity Proven leadership skills, with experience guiding teams in dynamic, complex environments Deep understanding of risk management frameworks and cybersecurity best practices Strong analytical and communication abilities, with a More ❯
Conducting vulnerability assessments and penetration tests to identify and mitigate security risks ️ Collaborating with IT teams to implement secure configurations and ensure best practices are followed ️ Developing and enforcing cybersecurity policies, standards, and procedures to enhance overall security posture What We're Looking For: ️ Proven experience as a Cybersecurity Specialist or in a similar role within IT security ️ Strong knowledge … of cybersecurity principles, threat intelligence, and security controls ️ Experience with security tools (e.g., SIEM, firewalls, EDR, VPN, DLP) and vulnerability management ️ Solid understanding of regulatory frameworks and industry standards (e.g., GDPR, NIST, ISO 27001) ️ Certifications such as CISSP, CISM, CompTIA Security+, or CEH are highly desirable Ready to defend against cyber threats More ❯
Für den Standort München suchen wir: SENIOR CYBERSECURITY PENETRATION TESTER (D/F/M) Your tasks: Execution of penetration tests on web applications, networks, cloud environments, and mobile applications, as well as participation in red team exercises Identification, exploitation, and documentation of vulnerabilities in compliance with ethical testing standards Development and implementation of security testing methods and frameworks More ❯
Job Number: 336 Job Category: GovTech Job Title: CYBERSECURITY NETWORK ANALYST (336) - MARYLAND -URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 158K-175K Background Experience with computer network exploitation, construction, and diagnostics of computer networks, network analysis, network threats and risks, incident response, and … range of operating system Requirements Bachelor's degree in software engineering, computer science, engineering, or related field from an accredited college or university 2 years of demonstrated experience in cybersecurity techniques and network analysis; 3 years of demonstrated experience in intrusion analysis and incident responses Preferred Demonstrated experience with TCP/IP fundamentals, Windows and Linux/Unix Operating Systems More ❯
programs. At DVS, we recognize that our employees are our number one resource. If you are a problem-solving people-person, apply today! Job Description We are seeking a CyberSecurity Proposal Recruiter to join our dynamic team in Tysons Corner, VA. As a key member of our Talent Acquisition team, you will support recruiting efforts for cybersecurity-focused … managers, proposal teams, and subject matter experts to build a pipeline of qualified candidates. Responsibilities • Collaborate with proposal teams to understand staffing requirements and create recruitment strategies tailored to cybersecurity roles. • Source, screen, and evaluate candidates with a focus on technical skills, clearances, and government contracting experience. • Develop and maintain relationships with candidates, ensuring timely and professional communication throughout … and engage passive candidates through social media, networking events, and industry databases. • Conduct preliminary interviews to assess technical competencies, cultural fit, and clearance eligibility. • Stay current with industry trends, cybersecurity certifications, and government contracting requirements to enhance recruitment strategies. • Support proposal submissions by creating and maintaining resumes, bios, and qualification matrices for key personnel. Qualifications • 2-4 years of More ❯
A global quantitative trading firm specializing in algorithmic and high-frequency trading (HFT) is hiring a CyberSecurity Engineer (2-4 years' experience) to operate in a broad, vendor-agnostic security environment. This fully onsite role (5 days per week) offers exposure to cutting-edge security challenges across multiple domains. This is an opportunity to deep-dive into security engineering More ❯
address the intermittency issues posed by renewables and plays a key role in the UK's journey to Net Zero by 2050. Focusing on Information Technology, Operational Technology and Cybersecurity, you will help protect our people, our premises and digital systems to maintain trust in National Grid Ventures Interconnectors. You will be given ownership of your own deliverables and … expected to deliver successful outcomes for the business, your work might include: Supporting compliance maturity under NIS Regulations (The Security of Network & Information Systems). Investigate Next-Gen CyberSecurity products, services and forward-looking innovation that add value and strength. Develop plans to deal with security incidents by enhancing existing measures in place to include review of assurance mechanisms … are appropriate. Research, implement and maintain solutions to mitigate cybersecurity risks and improve the business' security and resilience posture. Prepare technical reports to support our strategic roadmap and risk management approach. Carry out appropriate testing on systems to expose weaknesses in security. Report on vulnerabilities or incidents. Along with all of this, you'll be working in a varied More ❯
CODY TECHNOLOGY PARK, IVELY ROAD, FARNBOROUGH, England
IGNITION TECHNOLOGY LTD
to help maintain an efficient team and an organised company Participate in projects by contributing to the planning, testing, and implementation phases Stay up to date on the latest CyberSecurity and Information Technology news and trends to enhance technical capability for both Training Why choose our CyberSecurity Engineer Level 4 apprenticeship? The CyberSecurity Engineer apprentice can help … to design, build and test secure networks, security products or systems to help protect your organisation against cyber threats. QA is a market leader in cybersecurity training, with a state-of-the-art immersive cyber gamified learning, giving apprentices a hands-on learning experience in simulating a real cyber threat. QA's exclusive partnership with Circadence Corporation, the pioneer … of the hands-on gamified learning platform Project Ares®, allows us to uniquely incorporate hands-on scenario training into our cybersecurity apprenticeships. The Project Ares platform offers a totally immersive experience, using automated features to support skills adoption with an in-game advisor, Athena, who advises our players through scenario-based challenges. The platform scenarios replicate the unpredictability and More ❯
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: VodafoneThree - Product Manager CyberSecurity Business Area: Local Vodafone Business Unit Posting Country: United Kingdom Full Time/Part Time: Full Time Contract Type: Permanent At Vodafone, we're working hard to build a better future. A more connected, inclusive and sustainable … AI and the Internet of Things (IoT). What you'll do You will be overseeing the complete end-to-end product life-cycle for a segment of the CyberSecurity portfolio, including Managed Security Services (MSS) and Network Security. This involves product development, continuous improvement, life-cycle management, and decommissioning. Additionally, collaborating with the Security Product community to ensure … into the appropriate sales segments and market Ensure products deliver excellent internal and external customer experience Continuous management of existing products, including driving business efficiencies Contribute towards the overall cybersecurity product strategy with responsibility for shaping your individual product/portfolio strategy and roadmap Track and measure success of product, reporting into stakeholders at regular cadence Create robust business More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Vodafone
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: VodafoneThree - Product Manager CyberSecurity Business Area: Local Vodafone Business Unit Posting Country: United Kingdom Full Time/Part Time: Full Time Contract Type: Permanent At Vodafone, we're working hard to build a better future. A more connected, inclusive and sustainable … AI and the Internet of Things (IoT). What you'll do You will be overseeing the complete end-to-end product life-cycle for a segment of the CyberSecurity portfolio, including Managed Security Services (MSS) and Network Security. This involves product development, continuous improvement, life-cycle management, and decommissioning. Additionally, collaborating with the Security Product community to ensure … into the appropriate sales segments and market Ensure products deliver excellent internal and external customer experience Continuous management of existing products, including driving business efficiencies Contribute towards the overall cybersecurity product strategy with responsibility for shaping your individual product/portfolio strategy and roadmap Track and measure success of product, reporting into stakeholders at regular cadence Create robust business More ❯
Information Systems Security Officer (ISSO) Mid-Senior Level $90,000 - $140,000 Colorado Springs, CO TS/SCI Clearance Required Protect critical systems. Power national defense. Your cybersecurity leadership starts here. A Day in the Life - What You'll Do • Maintain and enhance the security posture of classified information systems within DoD environments. • Collaborate with the ISSM and ISO to … manage day-to-day cybersecurity operations, vulnerability mitigation, and RMF compliance. • Coordinate and document system security changes, continuous monitoring efforts, and configuration management activities. • Conduct audit reviews, security assessments, and generate compliance reports for internal stakeholders and external government agencies. Is This You? • 5-15 years of experience in cybersecurity or information assurance roles supporting defense or government systems. • Bachelor … focused, and confident interfacing with both technical teams and senior leadership. • Skilled in implementing and managing Risk Management Framework (RMF) processes and conducting security impact analysis. Core Skills & Tools Cybersecurity & Compliance • NIST 800-53, RMF, DoD 8500 Series, Security Authorization Packages • Continuous Monitoring & Vulnerability Assessment • Configuration Management and System Recovery Systems & Platforms • Windows and Linux Operating Systems • Secure Media Handling More ❯
Technologies (JTT) is looking for motivated Mid-Level/Senior Information System Security Engineers in Philadelphia, PA! We are a Service-Disabled Veteran Owned Small Business (SDVOSB) specializing in cybersecurity engineering. We offer outstanding benefits and opportunities for leadership development. This work is in support of Naval Surface Warfare Center - Philadelphia. Tasking includes: • Assist with the developing, maintaining, and tracking … to support compliance of the RMF boundaries' assets. • Assist with removal of SSD, HDD or other critical components of assets before destruction and removal from the RMF boundary. • Provide cybersecurity patching of assets in times of DoD and DoN TASKORDs, FRAGORDs, or even designated by Command ISSM, ACIO, and/or Code 104 management. • Support configuration change documentation and control More ❯
Technology Risk. This can be a home-based role anywhere in the UK. This will require someone with extensive knowledge of the Microsoft Security stack with an interest in CyberSecurity in Operational Technology (OT) environments. Position Responsible for detecting, analysing and responding to security incidents through to resolution. Providing support on baseline security analysis in OT projects. Manage operational More ❯
intelligence gaps, and overall technical threat (s) to NGA. Produce CI Information Reports and IIRs from data collected and reported by either the Technical CI team or the NGA cybersecurity personnel. Provide a minimum of 6 Reports of Inquiry and/or Requests for Information within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure … Collaborate well with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, CyberSecurity Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. More ❯
Include imagery when available. Analytic judgments, intelligence gaps, and overall technical threat(s) to NGA. Produce IIRs from data collected and reported by either the Technical CI team, NGA cybersecurity personnel, or partner agencies. Provide a minimum of 9 IIRs within Fiscal year. Effective IIR writing requires: Coordination with teammates and stakeholders to ensure accuracy of reported information. Cross … to collaborate with internal NGA and external IC/Cyber community members. Coordinate CI Cyber activities originating from Enterprise Incident Response Events. Conduct liaison between CI Office, Insider Threat, CyberSecurity Operations Center (CSOC), other NGA Offices, and IC/DoD partners as applicable to conducting the CI Cyber Mission. Perform threat analysis, threat forecasts, threat alerts, and recommend countermeasures. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
to transform how knowledge is shared, applied and enhanced. About the team: The security team, part of Group CTO, protects UK Education and Research against a wide range of cybersecurity threats, supporting our members and customers in improving their digital resilience. Our products and services are currently organised into five principal groups: Protective services, Professional services, Service Team, Product … monitoring. The Security Services Team includes network, SIEM and SOC focused services, service development, transition and delivery. This is where this role sits. About the role: As Jisc's Cybersecurity service manager, you will be responsible for service management activities in the delivery of the security operations centre (SOC). The primary focus is on guiding customers through the More ❯
Binghamton, New York, United States Hybrid / WFH Options
Anonymous Employer
in the development of long-range plans for security systems, resolving integration issues related to the implementation of new systems, processes, and procedures. Work with program personnel, to include cybersecurity, to ensure audit functions are performed properly. • Develop corrective solutions and maintain associated documentation (to include required reports) as appropriate. • Coordinate with program/project stakeholders, the Security Special … implement and maintain an acceptable information systems security posture. • Assist program personnel at offsite locations to ensure they meet USG certification requirements and are properly trained to execute the cybersecurity program effectively and maintain security compliance. • Excellent oral and written communications skills. • Demonstrated critical thinking and problem-solving skills. • Confident personality with the ability to effectively prioritize multiple projects • Ability More ❯
and maintain vulnerability/compliance assessments and the resulting data and reports • Author and maintain SOPs and runbooks • Other duties as assigned Job Qualifications: • Bachelors degree in Information Technology, Cybersecurity, or related field with 8 or more years of STIG Compliance/Vulnerability Management experience to including implementing and evaluating STIG controls and security baselines; additional years of experience required … in lieu of a Bachelors degree. • Significant experience with NIST Cybersecurity Framework and/or risk management within the Intelligence Community. • 2+ years of project management experience. • Experience being part of a high performing A&A teams and adapting standards to create "best practices". • Demonstrate knowledge of ports and protocols. • Demonstrate knowledge of DISA STIGs and related tools. • Possess … the knowledge of security best practices, security solutions, and methodologies for risk management per NIST Cybersecurity Framework guidelines. • Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities. • Familiar with the management, operational, and technical aspects of IT Security in a complex environment. Clearance Requirement • An active DoD Top Secret clearance More ❯
Description: The Security Engineering and Operation Lead will be located at the NOAA Cybersecurity Center (NCSC) in Boulder, CO or Fairmont, WV, with the authority to oversee the site's IT operations in support of the NCSC mission. This leadership position involves managing the operation and maintenance of the Boulder and Fairmont sites, as well as providing oversight for the … particularly with NOAA or other federal agencies. - Familiarity with Trusted Internet Connections Access Provider (TICAP) infrastructure. - Experience in long-range IT systems planning and modernization efforts. - Knowledge of relevant cybersecurity frameworks and compliance standards. - Experience with IT service management (ITSM) tools and best practices. Eligibility requirements apply to some benefits and may depend on your job classification and length of More ❯
Network & Cybersecurity Engineer Start: ASAP Duration: 6-12 months Location: Edinburgh (2-3 days on site) Pay: negotiable DOE, INSIDE IR35 We are currently seeking a skilled Network & Cybersecurity Engineer to join our team on a contract basis. This is a hands-on role where you will apply your expertise in cybersecurity, DevOps, and software development to help secure critical … and DevOps frameworks. - Develop and manage DevOps pipelines, including containerisation (e.g., Docker, Kubernetes). - Analyse cyber vulnerabilities in software/products and recommend effective mitigation strategies. - Define and enforce cybersecurity guidelines and processes for product development. - Implement tools to ensure adherence to security standards and protocols. - Support risk identification and management efforts. - Conduct data analysis and data management tasks as … needed. Essential Skills & Experience - Proven understanding of network and cybersecurity practices, especially in utility systems. - Solid background in Agile product development and DevOps principles. - Experience supporting power system or utility system applications. - Excellent communication skills; able to liaise effectively with both customers and internal teams. - Ability to remain positive and professional in high-pressure or customer-facing situations. - Strong analytical More ❯
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cybersecurity threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cybersecurity threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cybersecurity threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end … operational and delivery teams to ensure security design principles have been evaluated and adopted • Provide clear expert advice and reliable guidance to end users on all things relating to cybersecurity • Effectively collaborate with internal teams in relation to cybersecurity audits, including the resolution of outstanding actions • Manage the creation and regular updating of Security policies • A proactive approach to supporting More ❯
Cheltenham, England, United Kingdom Hybrid / WFH Options
FR Secure
CyberSecurity & Information Assurance Consultants (eDV Cleared) Salary: £50,000 – £85,000 (DOE) Location: Manchester or Cheltenham (Hybrid Working) Clearance Required: Existing eDV (Enhanced Developed Vetting) Join a Leading Consultancy Driving National Security Innovation FR Secure is partnering with a rapidly expanding consultancy that delivers cutting-edge cyber and information assurance solutions for high-security government and industry clients. We … re looking for multiple CyberSecurity & Information Assurance Consultants at junior to senior levels to support long-term, mission-critical programmes in the National Security sector. Your Role As a CyberSecurity & Information Assurance Consultant, you will: Deliver expert security advice for BAU, technical refresh, and new project initiatives. Implement and improve governance models aligned with client business needs. Identify … posture. Develop, refine, or review security policies and procedures to align with corporate and regulatory standards. Build strong relationships with clients and internal teams to enhance the value of CyberSecurity & Information Assurance services delivered. What You Bring We’re looking for people who can make a real impact. You should have: Proven experience in CyberSecurity & Information Assurance within More ❯