Services Top Aerospace/Defense company. In this job you will work with custom Hardware built in-house for our Cyber group, responsible for developing mission critical NSA-certified Cybersecurity devices in a rapidly growing product line. You'll be working at the cutting edge of Cybersecurity and high-speed data. Responsibilities: Contribute to the design and development of mission … critical NSA-certified cybersecurity devices, working with in-house custom hardware in a cross-functional agile team. Translate concepts of operations (CONOPS), specifications, and requirements into software architecture, code, test plans, and debugging strategies. Apply deep knowledge of embedded, real-time, and multi-threaded systems on Linux platforms. Lead or contribute to software lifecycle activities including planning, architecture, development, integration … verification, and maintenance. Use modern software development environments and tools including IDEs, version control, defect tracking, and scripting. Collaborate with hardware, systems, and cybersecurity engineers to develop secure and reliable solutions. Support long-term maintenance and regular technology refreshes of deployed systems. Qualifications: U.S. citizen with active Department of Defense Secret security clearance Bachelor's degree in Software Engineering, or More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Materialise NV
of best practices when using AI for software development Any of the following skills/qualifications would also be seen as advantageous Experience maintaining and building projects using Gradle Cybersecurity certifications, or familiarity cybersecurity best practices Experience as a technical writer, or creating user-facing professional/technical communication Experience as a business analyst, or backlog management based on stakeholder More ❯
Defense incidents within the enterprise • Applying knowledge of the tactics, techniques, and procedures of various criminal, insider, hacktivist, and nation state threat actors to identify and validate threats • Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data • Conducting cursory analysis of log data • Monitoring external … Skills: • U.S. Citizenship • Must have an active TS/SCI clearance • Must be able to obtain DHS Suitability • 2+ years of directly relevant experience in cyber incident management or cybersecurity operations • Knowledge of incident response and handling methodologies • Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident • Knowledge of general attack stages … channel, replay, return- oriented attacks, and malicious code) Required Education: BS Incident Management, Operations Management, Cybersecurity or related degree. HS Diploma with 4-6 years of incident management or cybersecurity experience. Notes: Position; on-site work required. More ❯
upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking a Technical Writer Editor III to develop, edit, and maintain technical documentation, including cybersecurity reports, manuals, and artifacts. The role involves authoring and refining Microsoft Word and PowerPoint presentations to effectively communicate technical information. The candidate will collaborate with engineering and cybersecurity teams to … technical standards, as well as organizing documentation to enhance readability and usability for various audiences. On-site only, no telework. Position Responsibilities: Develop, edit, and maintain technical documentation, including cybersecurity artifacts, reports, and manuals. Author and refine Microsoft Word and PowerPoint presentations to effectively communicate technical information. Collaborate with engineering and cybersecurity teams to accurately document technical processes and solutions. … Associate degree in any discipline Experience: • Five (5) years of full-time professional experience in technical writing and authoring presentations. • Demonstrated experience in the following areas: o Authoring of Cybersecurity artifacts in Microsoft Office tools; and o Translating complex engineering concepts into formats understandable to various non-technical stakeholders. More ❯
Berkhamsted, Hertfordshire, United Kingdom Hybrid / WFH Options
Digital Preservation Coalition
Vacancy for CyberSecurity Engineer at the British Film Institute 21 August 2024 Location: National Archive, Berkhamsted/Hybrid. This role requires 3 days per week in Berkhamsted, with occasional travel to other BFI sites. Type: Full-Time We are seeking a CyberSecurity Engineer to join the BFI's Data & Digital Preservation team. The successful candidate will perform proactive … and reactive cybersecurity tasks to prevent, detect, and remediate cyber threats within the BFI National Archive's operational environment. They will also implement best practices for vulnerability detection and management across the Archive's network, hardware, software, and operational procedures to mitigate cyber risks. Key responsibilities include: Research, recommend, and implement effective cybersecurity measures and policies to mitigate risks and … reduce threats to Archive operations, collections data, and digital assets. Utilize cybersecurity tools to conduct proactive vulnerability scans across the Archive's network, devices, and systems; prioritize and address vulnerabilities; and generate progress reports. Monitor security events using detection and response solutions; respond to, manage, escalate, and report potential security incidents following established Incident Response Procedures. Lead cybersecurity analysis, improvements More ❯
innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is seeking a Journeyman Information Assurance Specialist to support cybersecurity operations for TRADOC G2 at Fort Eustis, VA, ensuring the protection and compliance of mission-critical IT systems. The selected candidate will assist in security assessments, risk mitigation, vulnerability management … and RMF accreditation while supporting incident response, system hardening, and compliance with DoD cybersecurity policies in both classified and unclassified environments. Responsibilities Conduct security assessments and audits of IT systems. Assist in preparing accreditation packages for system authorization. Implement vulnerability management strategies, including patching and updates. Support incident response and mitigation efforts. Maintain security documentation in compliance with DoD standards. … Qualifications: Active DoD Top Secret/SCI clearance required. Bachelor's degree in IT or cybersecurity preferred. 3-8 years' experience. Security+ or equivalent certification required. Experience with RMF and DoD cybersecurity policies. EEO Commitment All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition More ❯
Position Contingent Upon Award Join Synertex and bring your expertise to a mission that matters. We're looking for an Information Assurance Analyst with a background in Air Force cybersecurity policy, RMF processes, and information assurance to support vital defense and IT governance initiatives. If you're passionate about securing information systems and shaping cyber policy and thrive in a … the development of enterprise framework policies for the Wing and local IT operating environment Develop RMF artifacts for each step in the RMF process Support development and transition of cybersecurity policies for cloud environments Assist in the development of Tactics, Techniques, and Procedures that include risk analysis and threat hunting Support the enforcement of a Wing-wide cybersecurity program Assist … system Familiarity with all specified DISA STIGs Information Assurance Technical Level II certified IAW DoDM 8140.03 and DAFMAN 17-1305 Join a mission-driven team advancing U.S. Air Force cybersecurity resilience and cloud modernization. Apply today and become part of Synertex's legacy of innovation, leadership, and excellence. More ❯
Join Us as a SOC Level 3 Analyst! Take Your CyberSecurity Career to New Heights Are you ready to challenge yourself at the forefront of cybersecurity? UK Power Networks is seeking a talented SOC (Security Operations Centre) Level 3 Analyst to join our dynamic Information Systems team based in our Crawley offices. As a key member, you'll … work closely with the CyberSecurity Operations Manager, tackling advanced security threats and supporting critical infrastructure. This is a permanent position offering substantial opportunities for professional growth and blended working arrangements: after a 6-month probation, enjoy the flexibility of 3 days in the office and 2 days remote each week. We value your expertise and reward it. You can … Tax-Efficient Benefits: Cycle to Work, Home & Tech, Green Car Leasing Wellbeing: Occupational Health Support included Don't miss out-apply now to become an integral part of our cybersecurity defence. The closing date for applications is 1st September 2025 . Step into a rewarding future, where your skills make a real impact. For more information and to view More ❯
Crawley, West Sussex, Three Bridges, United Kingdom
UK Power Networks (Operations) Ltd
Join Us as a SOC Level 3 Analyst! Take Your CyberSecurity Career to New Heights Are you ready to challenge yourself at the forefront of cybersecurity? UK Power Networks is seeking a talented SOC (Security Operations Centre) Level 3 Analyst to join our dynamic Information Systems team based in our Crawley offices. As a key member, you'll … work closely with the CyberSecurity Operations Manager, tackling advanced security threats and supporting critical infrastructure. This is a permanent position offering substantial opportunities for professional growth and blended working arrangements: after a 6-month probation, enjoy the flexibility of 3 days in the office and 2 days remote each week. We value your expertise and reward it. You can … Tax-Efficient Benefits: Cycle to Work, Home & Tech, Green Car Leasing Wellbeing: Occupational Health Support included Don't miss out-apply now to become an integral part of our cybersecurity defence. The closing date for applications is 1st September 2025 . Step into a rewarding future, where your skills make a real impact. For more information and to view More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and ahead of cyber threats. The Role We are More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
RSM UK
CyberSecurity Consultant (Penetration Tester) Milton Keynes, Buckinghamshire, United Kingdom We are seeking an experienced CyberSecurity Consultant (Penetration Tester) . Make an Impact at RSM UK At RSM, our consulting team brings together diverse advisory experts to deliver our six core solutions: business transformation, forensic, deal services, restructuring, finance function support, and risk and governance. Our solutions are designed … enhancing our six solutions, expanding our team of expert consultants, embracing a digital-first approach, strengthening our global presence, and building strong client relationships. We are seeking an enthusiastic CyberSecurity Consultant to join our team. Working alongside our experienced team of specialists, you'll deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and … Burp Suite, Nessus, and other industry-standard tools. Industry-recognized certifications such as CompTIA PenTest+, CREST, Offensive Security Certified Professional (OSCP), or working towards them. Relevant experience in a cybersecurity role. Knowledge of current technology trends and cyber threats. What we can offer you: We recognize our people are our greatest asset. Our flexible rewards and benefits package includes: Hybrid More ❯
prepare, and update authorization packages Notify customer when changes occur that might affect authorization accreditation Conduct cybersecurity portion of the self-inspection's checklist Review and provide technical and cybersecurity coordination on all Bodies of Evidence that makeup the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and More ❯
prepare, and update authorization packages Notify customer when changes occur that might affect authorization accreditation Conduct cybersecurity portion of the self-inspection's checklist Review and provide technical and cybersecurity coordination on all Bodies of Evidence that makeup the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and More ❯
prepare, and update authorization packages Notify customer when changes occur that might affect authorization accreditation Conduct cybersecurity portion of the self-inspection's checklist Review and provide technical and cybersecurity coordination on all Bodies of Evidence that makeup the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and More ❯
prepare, and update authorization packages Notify customer when changes occur that might affect authorization accreditation Conduct cybersecurity portion of the self-inspection's checklist Review and provide technical and cybersecurity coordination on all bodies of evidence that makeup the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and More ❯
prepare, and update authorization packages Notify customer when changes occur that might affect authorization accreditation Conduct cybersecurity portion of the self-inspection's checklist Review and provide technical and cybersecurity coordination on all Bodies of Evidence that makeup the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and More ❯
prepare, and update authorization packages Notify customer when changes occur that might affect authorization accreditation Conduct cybersecurity portion of the self-inspection's checklist Review and provide technical and cybersecurity coordination on all Bodies of Evidence that makeup the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and More ❯
prepare, and update authorization packages Notify customer when changes occur that might affect authorization accreditation Conduct cybersecurity portion of the self-inspection's checklist Review and provide technical and cybersecurity coordination on all Bodies of Evidence that makeup the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and More ❯
ROLE TITLE - PRINCIPAL CYBER ARCHITECTROLE PURPOSE: This role reports to the Head of Cyber Architecture, working closely with Tech Delivery Teams, the Cyber Team and the CyberSecurity Office. Act as the company Cyber representative on Cyber Architecture matters, undertakes complex work of a high-risk level, often working on several projects.Accountabilities* Work on projects with high strategic impact, setting More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
solving technical cyber problems and identifying vulnerabilities? As part of our client's expanding National Security division, you'll contribute to high-impact missions across AI/Data Science, Cybersecurity, Cloud, DevOps, and Platform Engineering. We're seeking inquisitive individuals who excel at dissecting technical systems, not just to understand how they work, but to identify weaknesses, assess risks, and … from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Working closely with cybersecurity teams to prioritize vulnerabilities and implement patching strategies. Collaborating in Agile teams to deliver innovative, secure, and robust technical solutions. What We're Looking For Proficiency in one or more … Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverse engineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in Agile environments. Desirable exposure Any exposure of AI, ML, Cloud or Virtualisation would be considered a plus. Clearance required You will already hold an More ❯
solving technical cyber problems and identifying vulnerabilities? As part of our client's expanding National Security division, you'll contribute to high-impact missions across AI/Data Science, Cybersecurity, Cloud, DevOps, and Platform Engineering. We're seeking inquisitive individuals who excel at dissecting technical systems, not just to understand how they work, but to identify weaknesses, assess risks, and … from design to delivery in modern IDEs and languages, using Agile delivery. Creating tested and testable code. Integrating with automated verification systems, CI and CD pipelines. Working closely with cybersecurity teams to prioritize vulnerabilities and implement patching strategies. Collaborating in Agile teams to deliver innovative, secure, and robust technical solutions. What We're Looking For Proficiency in one or more … Bash, Powershell or Groovy. Experience working with IDA Pro or Ghidra for reverse engineering Experience working with Linux or Windows-based systems. Awareness of secure coding practices and modern cybersecurity threats. Knowledge of principles used in Agile environments. Desirable exposure Any exposure of AI, ML, Cloud or Virtualisation would be considered a plus. Clearance required Due to the nature of More ❯
impact in the defense sector. Key Responsibilities: Manage on-premise and cloud storage strategies ensuring security and compliance with government regulations for controlled data. Establish and execute a comprehensive cybersecurity plan to mitigate risks from state-level actors. Lead IT projects focused on cybersecurity, system upgrades, and infrastructure improvements. Act as the site administrator for enterprise software applications, ensuring efficient … years of IT management experience, with a strong focus on IT security and compliance. Proven expertise in managing both on-premise and cloud-based IT environments. Strong understanding of cybersecurity principles and practices. Excellent project management skills with the ability to lead cross-functional teams. Eligibility for US security clearance is required. If you are open to learning more about More ❯
Engineer, working with custom Hardware built in-house, for our Cyber group, you'll be a member of a cross functional team responsible for developing mission critical NSA-certified Cybersecurity devices in a rapidly growing product line. You'll be working at the cutting edge of Cybersecurity and high-speed data. Qualifications: Requires a Bachelor's degree in Software Engineering More ❯
Georgia areas. Grants Analyst2.5 yr Contract Under general supervision, this position is responsible for performing advanced professional grants analytic work of considerable difficulty, specifically for the State and Local Cybersecurity Grant Program (SLCGP The contractor will work with the Federal Emergency Management Agency (FEMA), the Tennessee Emergency Management Agency (TEMA), and Strategic Technology Solutions (STS) to manage a portfolio of … grantees and grant contracts.The contractor will manage approximately 100 grant contracts per federal fiscal year Proposals for approved cybersecurity projects, which may include cybersecurity awareness training (Infosec), CrowdStrike licensing, and direct cost reimbursement. The contractor is also responsible for sub-recipient monitoring.Why Work with UsBenefitsAt Cook Systems, we don't just offer jobs we build futures. Our team is the More ❯
Sorry, applications for this particular Job have now closed. Position Overview Fast growing FinTech seeking a highly motivated and technically capable DevSecO View job & apply Senior CyberSecurity Analyst Location: London Job type: Permanent Financial Service firm seeks a Senior CyberSecurity Analyst to join its Security team. This indi Global financial services firm seeks a Senior Security Engineer (VP More ❯