Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
toenhancing our six solutions, expanding and developing our team of expertconsultants, embracing a digital-first approach, strengthening our globalpresence, and building strong client relationships We are seeking an enthusiastic CyberSecurity Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering offensive securityservices including digital footprint reconnaissance, social engineering,penetration testing and vulnerability assessments and more … reconnaissance, socialengineering, vulnerability assessments, penetration testing, threat modelling,cyber-attack simulation exercises, and more to high profile clients across allindustries. The purpose of this role is to deliver our CyberSecurity services across our broad range of assurance and advisory engagementsto high profile clients across all industries. We are seeking an enthusiastic CyberSecurity Consultantto join our team. Working alongside … our ideal candidate: Experience of deliveringcyber security services. Demonstrable experience or performing cyberrisk and control assessments. Hold or working towards an industry recognisedcyber security certification. Relevant experience within a cybersecurity role. Familiar with technology trends, and cyber threats. Passionate to continue your career and provide cyber services to our clients. Self-organised and able to manage your time effectively. More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
be granted for directly related internships and education (1 yr. BS, 2 yrs. MS) Minimum 3 years of combined experience with cyberspace operations, operational planning, cyber mission force operations, cybersecurity studies, wargaming, defense policy, or modeling and simulation Experience with mission and OPLAN decomposition into Mission Essential Tasks to define mission level risk impact Team player capable of working well … clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Secret, Interim Top Secret) Because an active or interim DoD clearance is required, U.S. Citizenship is required The Air Force Civil Engineer Center (AFCEC) Facility Related Control Systems (FRCS) Cybersecurity On-Site Representative (OSR) position is located within the local Civil Engineer Squadron (CES). … The OSR communicates directly with civil engineer and communications squadrons as an interface back to the core team at Tyndall AFB, FL. Specific tasks include the following: Responsible for CyberSecurity of Civil Engineer (CE) owned FRCS: - Appointed in writing by the Enterprise Information System Security Manager (ISSM) as the Information System Security Officer (ISSO) for the CE control system … incidents. Liaison for AFCEC/COOI: - Coordinate within local CES organization for CE FRCS owners - Coordinate with AFCEC/COOI Team at Tyndall AFB for support of CE FRCS cybersecurity accreditation and protection. - Coordinate locally with base Communications Squadron for support of CE COINE infrastructure and CE FRCS operating on the enclave - Support visits from AFCEC/COOI teams visiting More ❯
Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: RISAI has an exciting opportunity for a Senior Endpoint Security Engineer to join our Transport & Cybersecurity Services (TCS) team in either Springfield, VA or St. Louis, MO. Our Endpoint Security team is rapidly growing! This is one of several New positions that we have added to … Science or related field) and ten (10) years of technical experience in Cyber Security. Additional experience may be considered in lieu of a degree. • Working knowledge of maintaining Enterprise CyberSecurity Engineering requirements utilizing all or some of the following tools: Tenable Suite that include Security Center, Nessus Scanners, Nessus Manager • Strong working knowledge of administering applications in a Linux More ❯
We have a current opportunity for a Security Engineer on a contract basis. The position will be based in Manchester. For further information about this position please apply. CyberSecurity Engineer I am looking for hands-on Security Engineer to support their overstretched BAU team and take ownership of key security remediation projects. Key Responsibilities: Implement certificate-based authentication to More ❯
We have a current opportunity for a Security Engineer on a contract basis. The position will be based in Manchester. For further information about this position please apply. CyberSecurity Engineer I am looking for hands-on Security Engineer to support their overstretched BAU team and take ownership of key security remediation projects. Key Responsibilities: Implement certificate-based authentication to More ❯
the detection, responses, mitigation, and reporting of cyber threats affecting internal and external clients' networks • Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in the cybersecurity operation center • Develop documentation, reports, briefs, and review SOPs with customer to give an accurate depiction of the current threat landscape and associated risk that is affecting the clients … Direct experience executing Incident Handling and Response activities • Understanding of Security tools and the Security Stack • Working knowledge of Splunk • Basic understanding of network protocols and packet analysis tools • CyberSecurity background • Certification: Splunk Fundamentals I & II and one or more advanced certifications including but not limited to: CISSP, GCIH, GCIA • Clearance Required: Ability to maintain a Public Trust clearance More ❯
version control, CI/CD pipelines and automated testing frameworks. Reduce false positives through tuning, enrichment and contextual awareness. Skills Expertise in detection engineering, threat hunting, or a related CyberSecurity field. Proficiency in Sentinel, KQL, XDR and Splunk is required. Experience with SIEM platforms (e.g. Splunk, Sentinel, Elastic), EDR tools (e.g. CrowdStrike, SentinelOne), and/or cloud-native securityMore ❯
there's nothing we can't achieve Key job responsibilities As a Security Engineer, you'll help to build and manage services that detect and automate the mitigation of cybersecurity threats across Amazon's infrastructure. You'll work with data scientists, software development engineers, and other security engineers across multiple teams to develop innovative security solutions. Our services protect the … PREFERRED QUALIFICATIONS Understanding of the Mitre ATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow) Have awareness and understanding of current cybersecurity threats, actors and their techniques Experience with data science, big data analytics technology stack, analytic development for endpoint and network security, and streaming technologies (e.g., Kafka, Spark Streaming, and More ❯
Increasing revenue from the client portfolio by 20%. Building strong relationships with all customers and get great feedback about you and your business. Being able to articulate the cybersecurity maturity for all assigned customers. Producing and delivering to account plans for assigned customer portfolio. Building strong internal relationships and get great feedback from colleagues. What's included? Competitive More ❯
applications on AWS' multi-tenant infrastructure. Key Job Responsibilities As a Senior Security Engineer, you'll help to build and manage services that detect and automate the mitigation of cybersecurity threats across Amazon's infrastructure. You'll work with data scientists, software development engineers, and other security engineers across multiple teams to develop innovative security solutions. Our services protect the … field. Understanding of the Mitre ATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow). Have awareness and understanding of current cybersecurity threats, actors and their techniques. Experience with data science, big data analytics technology stack, analytic development for endpoint and network security, and streaming technologies (e.g., Kafka, Spark Streaming, and More ❯
interfaces using HTML, CSS, and JavaScript • Integrate classified DoD infrastructure to ensure secure connectivity and data flow across systems • Manage databases and backend logic for high performance, scalability, and cybersecurity compliance • Apply and lead secure coding practices aligned with DoD cybersecurity standards • Lead Selenium-based automated testing, conduct peer code reviews, and mentor junior developers • Collaborate with cybersecurity, systems engineering … HTML, and CSS Building, deploying, and maintaining web applications in DoD or secure classified environments Utilizing GitLab CI/CD, WebLogic, and Nexus Repository for secure code delivery Implementing cybersecurity with Fortify, SonarQube, and DoD software compliance Selenium for automated UI and regression testing • Strong leadership and mentoring ability within Agile/Scrum teams • Proficient in secure SDLC practices, configuration … solutions for the Department of Defense and Intelligence Community. With a footprint across more than a dozen states and OCONUS, our areas of expertise include software engineering, systems integration, cybersecurity, and satellite communications. Why Caribou Thunder? • Mission-Focused Work - Your code supports real-time defense operations and secure communications • Senior-Level Influence - Step into a leadership role on high-impact More ❯
improve digital services. Develop the knowledge required to effectively meet set targets and objectives. Training The role offers the potential opportunity to progress into a permanent position. Apprenticeship Standard Cybersecurity technologist (2021) (level 4) Training Provider FIREBRAND TRAINING LIMITED Working Week 37 hours per week. Days and times to be confirmed. Expected Duration 2 Years Positions Available 1 Closing More ❯
vendors, and we can NOT do 1099-US CITIZENSHIP IS REQUIRED We are seeking a Systems Security Engineer who has experience in the design and development of NSA-certified Cybersecurity devices. CLEARANCE REQUIREMENTS: Department of Defense Secret security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility … for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required. RESPONSIBILITIES: Design and develop specifications for mission-critical NSA-certified Cybersecurity devices Develop real-time multi-threaded Embedded System architecture using Model-based Systems Engineering (MBSE) tools and techniques Collaborate with software and validation engineering teams to deliver high-speed data More ❯
Are you ready to start a cybersecurity career The demand for newly trained and qualified CyberSecurity professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits. Companies across the globe try to protect themselves from an increase in cyber attacks. We help you develop the skills required with four globally recognised qualifications, real-world … guarantee on completion. Newto Training can support you at any stage of your career journey whether you’re new to the industry or looking to exchange your skills, this CyberSecurity course is designed to get you job-ready. Within our CyberSecurity career programme, you will: 100+ hours of live instructor-led online training 4 certifications: Microsoft Azure Fundamentals … if you think you have the soft skills (communication skills, passion) needed then we can help you launch the career you want. Click 'Apply Now’ to begin your new cybersecurity career More ❯
Are you ready to start a cybersecurity career The demand for newly trained and qualified CyberSecurity professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits. Companies across the globe try to protect themselves from an increase in cyber attacks. We help you develop the skills required with four globally recognised qualifications, real-world … guarantee on completion. Newto Training can support you at any stage of your career journey whether you’re new to the industry or looking to exchange your skills, this CyberSecurity course is designed to get you job-ready. Within our CyberSecurity career programme, you will: 100+ hours of live instructor-led online training 4 certifications: Microsoft Azure Fundamentals … if you think you have the soft skills (communication skills, passion) needed then we can help you launch the career you want. Click 'Apply Now’ to begin your new cybersecurity career More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Novacoast Federal
Novacoast Staffing is excited to announce an opportunity for a dynamic Prisma Cloud Platform Security Engineer. In this role, you'll be the cornerstone of our client's security and compliance initiatives in the Public Cloud. This position requires a More ❯
a new journey with big ambitions and strategic goals. To help us achieve those we’re seeking an experienced Cyber PM to help us deliver transformational change within our CyberSecurity Programme. You’ll be working within what is a fast-paced environment, where you’ll work on various projects that deliver technical and business change across our CyberSecurity … Programme. What you’ll be doing Working on a range of Projects that deliver business and technical change within our CyberSecurity programme. Working on projects end to end from discovery and requirements gathering through to implementation. Providing support and coaching to Business Analysts you are working with. Working proactively and collaboratively with those around you, ensuring you provide estimates … abilities and a can-do attitude to keep focussed and be highly organised as you manage your own workload to deliver the right business outcome. Experience/exposure to CyberSecurity Risks, Tools and Processes Successful implementation of CyberSecurity Metrics and Reporting It’s a bonus if you have but not essential Experience of working on a CyberSecurityMore ❯
a new journey with big ambitions and strategic goals. To help us achieve those we’re seeking an experienced Cyber PM to help us deliver transformational change within our CyberSecurity Programme. You’ll be working within what is a fast-paced environment, where you’ll work on various projects that deliver technical and business change across our CyberSecurity … Programme. What you’ll be doing Working on a range of Projects that deliver business and technical change within our CyberSecurity programme. Working on projects end to end from discovery and requirements gathering through to implementation. Providing support and coaching to Business Analysts you are working with. Working proactively and collaboratively with those around you, ensuring you provide estimates … abilities and a can-do attitude to keep focussed and be highly organised as you manage your own workload to deliver the right business outcome. Experience/exposure to CyberSecurity Risks, Tools and Processes Successful implementation of CyberSecurity Metrics and Reporting It’s a bonus if you have but not essential Experience of working on a CyberSecurityMore ❯
a new journey with big ambitions and strategic goals. To help us achieve those we’re seeking an experienced Cyber PM to help us deliver transformational change within our CyberSecurity Programme. You’ll be working within what is a fast-paced environment, where you’ll work on various projects that deliver technical and business change across our CyberSecurity … Programme. What you’ll be doing Working on a range of Projects that deliver business and technical change within our CyberSecurity programme. Working on projects end to end from discovery and requirements gathering through to implementation. Providing support and coaching to Business Analysts you are working with. Working proactively and collaboratively with those around you, ensuring you provide estimates … abilities and a can-do attitude to keep focussed and be highly organised as you manage your own workload to deliver the right business outcome. Experience/exposure to CyberSecurity Risks, Tools and Processes Successful implementation of CyberSecurity Metrics and Reporting It’s a bonus if you have but not essential Experience of working on a CyberSecurityMore ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
QinetiQ Limited
Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Select how often (in days) to receive an alert: Job Title: Principal CyberSecurity Consultant Location: Bristol, England, United Kingdom Role Type: Permanent - Full Time Package: Competitive Salary + Benefits Role ID: SF18210 Are you ready to be part of the future? At … just imagining tomorrow we are creating it. From cutting-edge defence technology to ground breaking innovations our mission is to empower and protect lives. Join us as a Principal CyberSecurity Consultant at our Corsham site, where you will have the opportunity to work with cutting-edge technology in partnership with some of the most brilliant minds. The Role: As … a Principal CyberSecurity Consultant you will join our Information Assurance and Cyber Risk team that provides expert risk assessments, analysis and advice to clients within the Defence Sector. Day-to-day, you'll be a key stakeholder in the Security Risk Management process, working closely with our clients to identify and respond to cyber threats and security risks. Your More ❯
issues based on the analysis of vulnerability and configuration data. Sharing meaningful insights about the context of an organization's threat environment that improve its risk management posture. Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Troubleshooting and diagnosing cyber defense infrastructure anomalies and working through resolution. Performing impact/risk … the analysis of vulnerability and configuration data. Ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture. Ability to cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Tenable Assured Compliance Assessment Solution (ACAS) Trellix Endpoint Security System (ESS), previously known as McAfee … infrastructure anomalies and work through resolution. Skill in performing impact/risk assessments. Skill to develop insights about the context of an organization's threat environment Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Qualifications Required: Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of More ❯
simulations and perform vulnerability research of radio frequency (RF)/network protocols, software, and hardware technology used in customer systems. Candidate will also assist in the development of novel Cybersecurity … and Electro-Magnetic Activities (CEMA) training and simulations systems for military weapon systems. Candidate will work in a team of developers, engineers, and analysts to address growing concerns of cybersecurity in highly networked weapon systems. Primary Responsibilities: Will help the team in working on customer-sponsored research and development projects developing defensive cybersecurity solutions for military weapon systems. … Command and Control (C2) and Radar systems. Vulnerability discovery and exploit development of operating systems, open source and proprietary network protocols, and user space applications. Researching current and future cybersecurity threats against military systems. Minimum Requirements: 10+ years of professional experience with software development is preferred S/W Engineering Development Life Cycle experience Significant programming ability in C++ More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
the future of cybersecurity while developing new capabilities that enhance our operations. About the role: Incident Response and Leadership Lead incident management activities in response to all high priority cyber-security incidents, with the ability to remain calm and focused during crisis situations. Ability to manage conflicting priorities and multiple tasks in a high-pressure environment. Strong leadership skills with … the ability to motivate and manage response teams during high-pressure situations. Co-ordinate resources across the organisation to develop and execute response plans that ensure cyber-security incidents are managed effectively and efficiently and limit or mitigate business impact. Communicate effectively with internal stakeholders, including senior leadership with the ability to provide rapid and concise summaries of complex situations. … Deliver and co-ordinate Post Incident activities which include producing detailed incident reports and conducting Post Incident Reviews. Contribute to and participate in cyber-security incident readiness activities which can include simulations and tabletop exercises. Identify gaps and continuously improve detection and response capabilities by creating and fine-tuning use cases, developing automation and documenting processes and playbooks. Identifying lessons More ❯