Mission to Fortify Amazon's Defenses as a Support Engineer with the Vulnerability Management & Remediation Operations team! Amazon Security is seeking an experienced and innovative Support Engineer specialising in cybersecurity to join our Vulnerability Management and Remediation Operations (VMRO) team in London, UK. The VMRO team is a global team that is responsible for assessing, detecting, and driving the remediation … sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. BASIC QUALIFICATIONS - Bachelor's degree in Computer Science, Computer Engineering, Software Engineering, Cybersecurity or related technical degree or equivalent; or 3+ years equivalent technology experience - Strong understanding of security concepts with a security mindset. - Strong understanding of computer and network weaknesses and mitigating More ❯
including Integrated Sensor Architecture (ISA) and JICD • Create software estimates and examine vendor proposals related to software engineering • Conduct full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates Minimum Requirements • Documented experience with software tools, including Photon, Salvage, Visual Studio, Eclipse … including product definition, requirements, design, integration & test, and system software deployment for a DOD acquisition program office • Experience conducting full software engineering management support including patch and security maintenance, cybersecurity updates for Accreditation & Authorization, media duplication & management, remote software deployment and support, and non-destructive software updates • Experience developing software estimates and review of vendor technical proposals • Must Be knowledgeable More ❯
system performance and user experience. Operating with a high degree of autonomy, the specialist proactively resolves issues, adapts to evolving mission requirements, and educates users on system capabilities and cybersecurity best practices. A constant focus on IT security vigilance is essential to safeguard AF TENCAP's mission-critical systems and data. ESSENTIAL JOB FUNCTIONS Analyze complex end-user technical issues … support with broader IT operations. Maintain constant IT security vigilance, promptly identifying, reporting, and assisting in the mitigation of potential threats, in alignment with DoD 8570.01-M and AF cybersecurity directives. Operate with a high degree of autonomy, recognizing that AF TENCAP's unique mission environment requires proactive problem-solving, independent decision-making, and adaptability to rapidly changing operational priorities. More ❯
and implementation of AWS system architectures to include operational status and security of government systems (Authority To Operate - ATO). Reviews and provides input to system requirements based on cybersecurity posture. Compiles industry best practices and lessons learned into future iterations and new designs. Provides architectural analysis of cloud configurations and connections. Supports the Engineering Review Board, evaluating artifacts … clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Top Secret clearance Position Type: Full-Time About Echelon Services LLC Echelon Services LLC is a Native Hawaiian-owned, SBA 8(a)-certified government contractor delivering innovative IT, cloud, cybersecurity, and mission support services to the Department of Defense and federal agencies. We are driven by a shared commitment to serve those who serve our country, with a focus on … abilities Excellent oral and written communication skills Proven ability to build trust and influence stakeholders across various organizational levels Preferred Qualifications PMP certification required Active clearance Experience with IT, cybersecurity, or cloud-based DoD programs Experience working for a small business or 8(a) contractor Location This role will not require you to come to the office on a set More ❯
Cyber Threat Intelligence (CTI) Manager Location – Hybrid with locations across major UK cities. Salary - £65k - £80k Are you naturally curious about the cyber threat landscape and motivated to stay one step ahead of threat actors? A leading global consultancy is More ❯
Software Engineer (Front End Developer) - GCCS-J Mid to Senior Level $80,000-$155,000 Newport News, VA U.S. Citizenship Required - Secret Clearance (TS/SCI Preferred) Design the future of Joint Command and Control-develop innovative front-end solutions More ❯
Software Engineer (Back End Developer) Mid to Senior Level $80,000-$155,000 Newport News, VA U.S. Citizenship Required - Secret Clearance (TS/SCI Preferred) Shape the backbone of Joint Command and Control-develop and maintain robust back-end services More ❯
Test Engineer Sr Senior Level $100,000-$123,000 Newport News, VA U.S. Citizenship Required - Active Secret Clearance (TS/SCI Preferred) Lead testing excellence for Joint Command and Control-ensure GCCS-J delivers secure, resilient, and validated capabilities to More ❯
Technical Writer Sr Senior Level $100,000-$124,000 Newport News, VA U.S. Citizenship Required - Active Secret Clearance (TS/SCI Preferred) Lead technical communication for Joint Command and Control-drive documentation strategies that support GCCS-J modernization and ensure More ❯
Job summary A new and exciting opportunity has arisen to join the Digital Services Operations team as a Digital CyberSecurity Specialist at The Mid Yorkshire Teaching NHS Trust. The Digital Operations Team support the trust CyberSecurity, Servers, Network and Data Storage, along with the implementation and support of new systems. The successful candidate will lead the implementation of … of success. Our screening process is thorough, so if you have used AI, please make sure to disclose this on your application form. Main duties of the job The CyberSecurity Specialist will be a key member of the Digital Services team, responsible for ensuring the security, integrity, and resilience of the Trusts digital infrastructure, systems, and data. This includes … safeguarding clinical and corporate systems against cybersecurity threats while enabling secure and reliable access for staff and partner organisations. The role involves managing, maintaining, and continuously improving the Trust's cybersecurity posture in line with industry standards, legal requirements, and NHS guidelines. The post holder will provide expert technical advice and operational support on cybersecurity matters across More ❯
in evaluating the risk of companies looking for cyber insurance Provide advisory services to our clients and support loss control to help minimize client risk Provide thought leadership about cybersecurity and insurance Cyber insurance is projected to grow from $13 billion in 2023 to $33 billion in 2027. Unlike other lines of insurance which can be underwritten using traditional … include the Senior Managers and Certification Regime Conduct Rules, Solvency II, fair treatment of customers, Financial Crime, Data Protection, Conflicts of Interest, and Whistleblowing Skills and Experience: Experience in cybersecurity such as but not limited to a consulting security engineer, a consulting security architect, a CISO, a security evangelist, a pre-sales security engineer, a Governance, Risk, and Compliance … a global team you'll need the willingness to build trust with a diverse set of partners & clients. The ability to handle uncertainty and complexity Technical skills related to cybersecurity Languages: Fluent English and French or German. Arabic would be beneficial. Inshort, we need cybersecurity SMEs who can communicate with stakeholders.You'll use: Communication skills. Having a knack More ❯
Join a leading semiconductor company as a CyberSecurity Project Manager ! Are you an experienced project manager with a passion for cybersecurity? This is your opportunity to lead high-impact security initiatives within a global technology leader. You'll work across teams to deliver complex projects that strengthen our security posture and support our business growth. Job Overview We’re … looking for a confident and capable CyberSecurity Project Manager to lead the delivery of security-focused projects across cloud and on-prem environments. You’ll be responsible for managing cross-functional teams, driving remediation efforts, and ensuring alignment with business goals and compliance standards. Contract Details Contract Length: 6 months (with visibility to extend) Location: Cambridge (Hybrid – 2 days … per week on-site) Day Rate: £700 per day (inside IR35) Key Responsibilities Lead end-to-end delivery of cybersecurity projects, including remediation and risk mitigation. Manage internal and vendor resources, ensuring clear communication and escalation paths. Coordinate geographically distributed teams and collaborate with scrum masters and tower leads. Ensure delivery of business benefits by validating business cases, financials, and More ❯
you do for graduation/post graduation? I completed my bachelor's degreein Computer Engineering from PuneUniversity. What made you choose such an offbeat, unconventional and cool career in Cybersecurity? My journey into IT and Cybersecurity has been shaped by a mix of curiosity, inspiration, and pivotal experiences. Growing up, I was always fascinated by technology. I remember being the More ❯
Check out this new opportunity! CyberSecurity Systems Engineer/Linux System Administrator Huntsville, AL Minimum Starting Salary: $95,000/Year Actual salary is based on experience and quallifications. CyberSecurity Systems Engineer/Linux System Administrator job in Huntsville, Alabama is available with Moseley Technical Services Top Defense company. In this full time, direct hire, salaried job you … RHEL and Cisco Networks Experience with Red Hat Satellite servers and configuration Experience with VMWare ESXi, VMWare vCenter Experience with LAN and WAN management Familiarity with Network Technologies and Cybersecurity Strong systems administrator experience in Linux Operating System environments Experience with scripting using tools such as Python, Perl, Bash, PowerShell, etc. Experience with network administration and related infrastructure Experience with More ❯
/year. Primary Responsibilities: Examine JPEO-CBRND programs and system characteristics to determine whether compliance with DoDI 8500.01 is recommended or required and will develop an acquisition Cybersecurity Strategy when required. Ensure that each JPEO-CBRND program, when required, has a Cybersecurity Strategy that is consistent with DoD policies, standards, and architectures, to include relevant standards. Assist in the identification … maintain computer and network security software, including instances of the Assured Compliance Assessment Solution (ACAS), the Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) Viewer, and other cybersecurity software test and scanning software applications. Document programs' overall cybersecurity approach and requirements, including determining the appropriate Certification and Accreditation (C&A) process, contributing content for Life Cycle Management Plans … LCMPs), assisting programs in the creation of a Security Classification Guide (SCG), and assisting in the development of Program Protection Plans (PPPs) Appendix E, the Cybersecurity Strategy. Manage information-related risks in enterprise architectures, acquisition strategies, and testing and evaluation, and work to achieve cybersecurity C&A. Ensure fielded information systems and networks are defended to maintain confidentiality, integrity, availability More ❯
Month Fixed Term Apprenticeship Sunderland City Council has an exciting opportunity for an enthusiastic individual to join the ICT Service as a CyberSecurity Apprentice. Working as part of the information security team you will develop an understanding of Sunderland City Council's approach to cybersecurity and the critical role this plays supporting its strategic goals. During the apprenticeship … you will monitor and detect potential security threats and escalate as necessary. You will also assist to support secure and uninterrupted business operations through the implementation of cybersecurity mechanisms and the application of cybersecurity procedures and controls. As a CyberSecurity apprentice, you will undertake the Level 3 CyberSecurity Technician apprenticeship with Ixion, who will deliver the More ❯
ob Title: CyberSecurity Analyst - DV Location: Fully remote Contract Duration : Until Feb 2026 (ad-hoc days as and when needed. Around 10 days/month) Daily Rate: £730.40/day (Umbrella - Maximum) IR35 Status : Inside IR35 Security Clearance: DV Minimum Requirement: Have experience with dealing with real world threats in the serious and organised crime or cyber threat incidents. … malware behaviour and an ability to identify associated infrastructure. Have an excellent understanding of how cyber threat attackers build and use infrastructure to undertake malicious activity Essential Qualifications: CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security … This work will help inform more effective responses by government, law enforcement and developers alike to combat cybercrime. Researching malicious Internet infrastructure is a highly specialised field that blends cybersecurity, threat intelligence, and network analysis. A specialist in this area should possess a combination of technical skills, analytical capabilities, and practical experience. The key objective is to derive new insights More ❯
ob Title: CyberSecurity Analyst - DV Location: Fully remote Contract Duration : Until Feb 2026 (ad-hoc days as and when needed. Around 10 days/month) Daily Rate: £730.40/day (Umbrella - Maximum) IR35 Status : Inside IR35 Security Clearance: DV Minimum Requirement: Have experience with dealing with real world threats in the serious and organised crime or cyber threat incidents. … malware behaviour and an ability to identify associated infrastructure. Have an excellent understanding of how cyber threat attackers build and use infrastructure to undertake malicious activity Essential Qualifications: CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security … This work will help inform more effective responses by government, law enforcement and developers alike to combat cybercrime. Researching malicious Internet infrastructure is a highly specialised field that blends cybersecurity, threat intelligence, and network analysis. A specialist in this area should possess a combination of technical skills, analytical capabilities, and practical experience. The key objective is to derive new insights More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
What You'll Do: Join a leading Cyber Resilience team where your focus will be on developing, implementing, and maintaining the policies and procedures that keep the organisation's cybersecurity governance and compliance on track. You'll work closely with the Cyber Risk Management Manager and stakeholders across the business to make sure policies align with industry standards, regulatory … requirements, and the organisation's wider cybersecurity strategy. From drafting and reviewing documentation to supporting audits and ensuring controls are effective, your work will help strengthen cyber resilience and manage risk in a fast-moving environment. What You'll Bring: Strong experience in policy development and implementation, ideally in a cybersecurity context Solid knowledge of cybersecurity frameworks … regulations Understanding of risk management principles Excellent written and verbal communication skills (Desirable) Experience in a critical national infrastructure (CNI) environment (Desirable) Bachelor's or Master's degree in CyberSecurity, Risk Management, or a related field Why You Should Apply: This is a chance to make a tangible impact on an organisation's ability to manage cybersecurity risks More ❯
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage … our global scale and decades of experience to accelerate our clients' cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India. About the Job: As a Senior Account Executive specializing in Technology-Enabled Cybersecurity Services, you will be responsible for acquiring and managing … knowledge of security solutions to drive revenue growth and deliver exceptional value through our comprehensive managed security services and professional security services offerings to large enterprise organizations, leveraging your cybersecurity knowledge and sales acumen to address their security challenges and needs. The ideal candidate will pro-actively network, and sell to multiple contacts within an organization, including C-Suite. The More ❯
or mitigation actions. • Monitor security controls to maintain ISs' ATO status. • Served primary focal point for System Security Programs Minimum Qualifications: • Bachelor's or advanced degree in Computer Science, Cybersecurity, or related cyber discipline. • Minimum of 7 years' experience as an ISSO at a cleared facility to include the following: • Experience with developing Assessment packages for Determination. • Experience with Briefing More ❯
experience. Partnerships & Standards: Collaborate with technology vendors, vehicle OEMs, utility companies, and regulatory bodies to ensure interoperability, compliance with evolving standards (OCPP, ISO 15118, etc.), and industry leadership. Data & Cybersecurity: Establish strong cybersecurity protocols for IoT networks, ensure compliance with data privacy regulations (GDPR, CCPA), and leverage analytics for operational improvements R&D Leadership: Identify and invest in emerging technologies … scale-up environment. Understanding of EV charging hardware, backend networks, cloud infrastructure, IoT communication protocols (OCPP, MQTT), and energy management systems would be beneficial but not essential Experience with cybersecurity, data privacy laws, and mission-critical infrastructure. Hands-on technical expertise across software development, network architecture, and hardware integration. Skills/Capabilities: Strong data/analytical skills Customer focus Excellent More ❯
of modern analytics tools to deliver actionable business intelligence. AI & Innovation Enablement: Identify opportunities to leverage AI and machine learning to improve operational efficiency, customer engagement, and decision-making. Cybersecurity Leadership: Develop, implement, and maintain a robust cybersecurity strategy aligned with industry best practices and regulatory requirements. Ensure enterprise-wide protection of data, systems, and infrastructure through proactive risk assessment More ❯
IT Infrastructure Manager Azure/AWS/CyberSecurity £60,000 - £65,000 Fully remote An established organization in the cybersecurity is seeking an IT Infrastructure Manager to lead the operational delivery of its cloud platforms, core infrastructure, endpoint management, and enterprise tools. This role is central to maintaining secure, scalable, and resilient technology environments that support both external services … Entra ID and O365 Cloud native apps, e.g. Function Apps, Logic Aps, Power Automate, External Entra ID ISO27001 implementation and maintenance Proactive and self-motivated Desirable but not required: CyberSecurity experience - understanding of vulnerability, pen testing and communicate with CyberSec professionals. Please apply directly with an up today CV and we will be in touch More ❯