Job Description - Senior CyberSecurity Specialist () Senior CyberSecurity Specialist - Job Title: Senior CyberSecurity Specialist Location: Barrow-In-Furness. We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role. What you'll be doing: CyberSecurity risk assessment of systems and services Support the definition and design … of secure solutions that meet business needs Assess Architectural designs and identify proportionate CyberSecurity controls aligned with business objectives Assessment of systems, services and CyberSecurity controls, to provide an independent analysis of compliance with BAE Systems Security Policy, standards and external regulatory requirements. Lead Assessment of CyberSecurity controls to ascertain effectiveness in reducing risk, including any vulnerability … security controls with applicable certification, accreditation, and internal policy requirements Manage the delivery of penetration tests and vulnerability analysis in support of risk mitigation strategies Support stakeholders in resolving CyberSecurity issues and act as a subject matter expert regarding assurance activities for the wider organisation Your skills and experiences: Good knowledge of industry standard security policy, standards and good More ❯
SThree are pleased to announce we're recruiting for a talented Lead CyberSecurity Engineer to join & guide our excellent team based in our fantastic office space located in the Cadworks Building, Glasgow. The CyberSecurity Engineering Lead acts as the technical authority across all domains of cloud and endpoint security, taking full ownership of hardening, automation, and threat mitigation. … logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior analysts and engineers; lead by doing. Shape and communicate the security engineering road map in alignment with the CyberSecurity Strategy. What skills and knowledge are we looking for? Deep hands-on knowledge of Microsoft security stack (M365 Defender, Sentinel, Intune, Azure Policy, PIM). Proven experience deploying Cisco More ❯
we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking a Cybersecurity Specialist 3 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates … Responsibilities As part of a multidisciplinary team, you will be responsible for coordinating and implementing technical controls and configuration settings and will work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts responsible for supporting Information System Security Engineering efforts. This is a technical role that requires some familliarity with common RMF Cybersecurity processes and … RMF assessment and authorization process Conduct ICS/SCADA system inventories following DoD guidance Conduct vulnerability scanning, remediation, and documentation of system vulnerabilities Participate in continuous improvement of organizational cybersecurity posture Qualifications Clearance/Citizen Type: Applicants selected will be subject to a government security investigation and must meet eligibility requirements, including U.S. Citizenship, for access to classified information; ACTIVE More ❯
As a Senior CyberSecurity Analyst, you will be a member of the IT Security Engineering team reporting to the IT Security Engineering Manager. The Senior CyberSecurity Analyst provides analysis, support and technology administration activities for the Ace Hardware CyberSecurity infrastructure to protect the Ace Hardware corporate IT environment. What you'll do Build, test, support and improve … business partners by providing IT security engineering, operational support, design services and incident/risk mitigation activities What you need to succeed This position requires functional level knowledge of cybersecurity concepts and network security engineering practices, procedures and infrastructure integration. The incumbent must be capable of effectively articulating IT risk and security solution concepts into statements that are clearly … understood Education Requirements Bachelor's degree or higher in CyberSecurity or related Computer Science program Other IT risk and security certifications are a plus Experience Requirements 2 to 4 years of prior work or comparable experience in IT security administration and solution delivery (research, design, build, deploy, operation and support) practices Technical experience in security architecture and technologies typically More ❯
Position Overview: We are seeking a Journeyman Information Security Analyst to support cybersecurity operations and information assurance activities at Eglin AFB. The ideal candidate will play a key role in maintaining the confidentiality, integrity, and availability of mission-critical systems and ensuring compliance with Department of Defense (DoD) security policies. Key Responsibilities: Monitor and analyze system security logs and alerts … to identify suspicious activities and potential threats. Support vulnerability assessments and risk analysis activities. Implement security controls in accordance with DoD cybersecurity regulations and RMF (Risk Management Framework). Assist with security incident response, containment, investigation, and remediation efforts. Maintain and review documentation for systems accreditation and security posture. Support audits, inspections, and assessments to ensure compliance with applicable security … to resolve security issues. Required Qualifications: Active Top Secret clearance. Current CompTIA Security+ certification (IAT Level II). 2-5 years of hands-on experience in information security or cybersecurity analysis. Familiarity with DoD cybersecurity policies, RMF, STIGs, and NIST frameworks. Experience using security tools such as SIEMs, vulnerability scanners, and endpoint protection platforms. Strong analytical and problem-solving skills. More ❯
Paradyme is seeking experienced Cybersecurity Analyst with EVAP experience for upcoming projects in support of major federal law enforcement and intelligence customers. The people in these positions will work in secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Senior Cybersecurity Analyst - Enterprise Vulnerability … and recommend remediation strategies Ensure assessments cover diverse technologies including OS, databases, applications, and network devices Collaboration and Cross-Team Coordination: Provide technical support during incident response efforts and cybersecurity exercises Ensures scans, reports and environment are set up and run according to the Master Schedule to meet deadlines and objectives Coordinate with Red, Blue, and SOC teams to share … and Policy Implementation: Assist with the development and deliver training on vulnerability scanning tools and best practices Create, maintain and refresh Standard Operation Procedures (SOP) and ensure compliance with cybersecurity policies Reporting and Communication: Produce technical reports and executive presentations detailing vulnerabilities and remediation status. Act as a liaison to communicate risks and recommendations to the CISO and senior leadership More ❯
Sword is a leading provider of business technology solutions within the Energy, Public, and Finance Sectors, driving transformational change for our clients. We leverage proven technology, specialist teams, and domain expertise to build solid technical foundations across platforms, data, and More ❯
on the moon, and even on other planets. We are seeking a diligent and resourceful Information System Security Officer (ISSO) to join our team. If you are a proactive cybersecurity professional with a passion for protecting critical systems and making an impact in national security, this role is for you. A Day in the Life: As an ISSO at L … Garde, you will help secure and protect complex systems in a classified aerospace and defense environment. You will collaborate with leadership, IT, and compliance teams to ensure that cybersecurity controls meet stringent federal requirements. You will drive compliance initiatives, monitor security posture, and actively safeguard the systems that make critical projects a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring … and continuous improvement of cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetration testing, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. •Collaborate with the CFO and IT Manager to ensure compliance with NIST More ❯
and its technology component through purposeful security design. What You'll Be Doing: • Develops and implements security designs ensure that the hardware, operating systems and software applications adequately address cybersecurity requirements and Security Controls Traceability Matrix (SCTM). • Identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Implement, validate Security … performance optimization • Demonstrate writing of your own project in scripting/programming (use of Shell scripting, Python, JavaScript, PowerShell) in a Linux or Windows environment to support the various CyberSecurity tools and applications required • Provide guidance on vulnerability and malware remediation. • Experience analyzing vulnerabilities, establishing cause and impact, and identifying the corrective action needed to eliminate and prevent the More ❯
audit logs for unusual activity, conduct vulnerability assessments, and implement mitigation strategies to protect against potential risks. Shape Security Policy: Use your expertise to apply a comprehensive range of cybersecurity policies, principles, and techniques to maintain the integrity of systems processing classified information. Drive Risk Management: Perform risk analysis for system changes, contribute to the Risk Management Framework process, and More ❯
Falls Church, VA Clearance: Secret Classification: Exempt Responsibilities: • Propose, coordinate, implement and enforce information systems security policies, standards, and methodologies. • Manage large, geographically dispersed, multifaceted team comprised of various cyber-security engineers; team roles include information assurance, security infrastructure engineers, and SOC analysts. • Direct and coordinate actions for incident response, data collection, forensics, cleanup and reporting. Assess threat reports and More ❯
SOC Analyst Location: Washington DC Industry: Dept. of Defense/Cybersecurity Salary: $150k-$190k+ Employment Type: Permanent Placement Clearance: Active Top Secret clearance with SCI Eligibility Required Schedule: Monday to Friday, 8am to 5pm Summary: We are actively searching for a skilled SOC Analyst to join our defense client s team! The successful candidate will play a vital part in … packet analysis, and incident response, while mentoring junior analysts and supporting advanced defense strategies in partnership with federal stakeholders. Requirements: Active Top Secret clearance required Bachelor s degree in Cybersecurity, Information Technology, Computer Science or related engineering field preferred; equivalent military or professional experience may be considered in lieu of degree Minimum 5+ years of hands-on experience in a … EOE/ADA IND123 SRG Government Services is a leading provider of information technology, training, engineering, accounting and intelligence analytical services for agencies in the intelligence, defense, homeland security, cybersecurity, and federal civilian markets. SRG utilizes an innovative approach to identify and qualify talent that is unique to the federal contracting industry, featuring a cutting edge platform that allows More ❯
Employment Status: Salary Full-Time Function: Information Technology Pay Range: ( $116,305.00 - $157,354.00 ) Target Bonus: 20.0% Req ID: 26703 PURPOSE: We are seeking a technically skilled and adaptable cybersecurity professional to lead and support the protection of both our Operational Technology (OT) and core Infrastructure systems. As a Specialist II in Cybersecurity Operations, you will play a critical role … in shaping and executing cybersecurity strategies that safeguard industrial control systems, shop floor technologies, and enterprise network infrastructure. The ideal candidate brings experience with enterprise switching, routing, and firewalls, along with an understanding of OT networking requirements and the operational role of MES platforms. They will work closely with cybersecurity, infrastructure, and plant engineering teams to reduce risk, maintain visibility … strategic and tactical execution, strong communication skills, and a solution-oriented mindset capable of navigating both legacy and modern systems in complex environments. DUTIES AND RESPONSIBILITIES • Develop and implement cybersecurity strategies for infrastructure and OT/MES environments aligned with business goals, corporate security policies, and industry standards (e.g., NIST 800-82). • Support network segmentation strategies to reduce risk More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
opportunities to bring your ideas to life. Are you ready to be part of something transformational at Maersk and join a team that's setting a new standard in cybersecurity? Join a World-Class Cyber Team: Be part of an elite cyber operation at one of the globe's most renowned logistics companies, where your contributions truly make a difference. … hone your skills in a real-world environment. Innovate and Impact: Engage in innovative projects that allow you to bring your ideas to life, help shape the future of cybersecurity while developing new capabilities that enhance our operations. Key responsibilities Cyber Incident Response and event management Contributing to the response efforts for security incidents, managing triage, containment, documentation, and the … and techniques. Qualifications 3+ years of experience in cybersecurity or similar related diciplines, with a minimum of 2 years in a SOC or incident response role, although candidates with CyberSecurity know-how and able to demonstrate essential skills, may be considered. Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA, OSCP) are highly desirable but not essential. Proven More ❯
In this role, a successful candidate will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, business development support, helping to create and deliver presentations at both internal and client engagement meetings, and providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate … NIST SP 800-53 guidance Provide input to and guide implementation and/or verification and validation of an organizational access control policy and plan reflecting PAM and integrated cybersecurity solutions in compliance with risk-levels defined in the National Institute of Standards and Technology (NIST) 800-53, rev 4, Access Control family of controls to include auditing annually, at … clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Lorien
when dealing with sensitive or high-stakes projects. About You Strong background in security architecture , with the ability to read, critique, and improve technical designs. Broad knowledge of the cybersecurity landscape , including both technical and governance aspects. Experience working in agile environments , with a solid grasp of sprint planning and delivery. Comfortable working across cloud platforms , especially AWS (expert-level More ❯
and maturity, identify gaps in design and execution, and communicate issues and recommendations to engagement leads and client senior management. You work with client senior management to develop a cybersecurity improvement strategy and roadmap to enhance maturity and reduce risk. You work with client senior management to assess, design, and implement sustainable solutions, including GRC tools, operating processes, and people … protection, data security and privacy, security operations, and business continuity. You articulate the business risks of technical vulnerabilities and communicate findings to client personnel. You assist clients in developing cybersecurity procedures and processes that align with leading practices. You analyze cybersecurity incident response capabilities, playbooks, and documentation, working with client staff to implement sustainable improvements. You facilitate tabletop exercises and … staff to develop a remediation and improvement plan. Skills & Qualifications: You have a master's degree. You have a minimum of three years of experience in the field of cybersecurity and information risk management. You have working knowledge of leading frameworks such as ISO 27001, NIST Cybersecurity Framework (CSF), NIST 800-53, CIS, and the Cybersecurity Maturity Model. You have More ❯
About DXC Technology DXC Technology is a global IT services leader, providing cutting-edge technology solutions to modernize and secure IT infrastructure. With expertise in cybersecurity, cloud computing, and digital transformation, DXC empowers organizations to achieve operational excellence. Role Overview As a Security Architect, you will be responsible for enhancing the security posture of DXC's client services by ensuring More ❯
deploy, and maintain network environments across commercial cloud platforms. • Configure and maintain modern server and workstation environments with up-to-date patching and security baselines. • Implement and monitor comprehensive cybersecurity protections to defend critical assets. • Develop and maintain system security architectures, policies, procedures, and ATO documentation. • Lead Agile teams and apply Scrum methodologies to deliver high-quality technical solutions. • Organize … reviews, and security integration. Why Join QSS? At Quantum Science Solutions (QSS), we deliver secure, scalable, and mission-aligned technology solutions to support national security objectives. Our cloud and cybersecurity professionals thrive in high-impact environments where innovation and integrity matter. Join us and help shape the future of secure cloud services in support of vital U.S. Government operations. Employee More ❯
analysts and team members to build technical capacity and knowledge. Qualifications: U.S. Citizenship is required per Federal Law Active Secret Clearance is required to start Bachelor's degree in Cybersecurity, Information Technology, or a related field 10+ years of expereince in IT/OT related roles 3+ years of experience in a senior role with CIO … level responsibilities. This is a hybrid position and might require travel Certifications such as CISSP, CISM, CISA, or other relevant certifications are preferred Preferred Qualifications: Master's Degree in CyberSecurity or IT-related field Certifications that demonstrate firsthand Information technology knowledge specific to the Army and OT environments are highly desirable, including: Certified Ethical Hacker (CEH) GIAC Security Essentials More ❯
Architecture (ZTA) and advanced analytics initiatives across large, complex organizations. In this position, you will support our customer in the Alexandria, Virginia area. The ideal candidate will bring deep cybersecurity expertise, strategic insight, and extensive technical leadership to support digital transformation efforts. Mission: As a Subject Matter Expert supporting this government program, you will lead the advancement and implementation of … cutting-edge Zero Trust Architecture and data-driven cybersecurity solutions that protect national security interests. By leveraging deep technical expertise, strategic vision, and emerging technologies such as AI, big data analytics, and cloud platforms, the Zero Trust Data Analytic SME will drive innovation, enhance cyber resilience, and support senior leaders in executing secure, scalable, and mission-critical transformations aligned with … DoD and federal cybersecurity standards. Location: Mark Center, Alexandria, Virginia Clearance: TS/SCI Certifications: Preferred Certifications (One or more required): CompTIA Security+ CISSP CISM CCSP CEH CCSK Requirements: U.S. Citizenship TS/SCI Advanced degree in Computer Science, Cybersecurity, Systems Engineering, or a related technical field. (Additional years of experience and cybersecurity certifications may substitute for an advanced degree. More ❯
Splunk implementations. Implement/create report dashboard designs, automated custom email report notifications, report log data repositories for each environment that are specific to the following audiences: Leadership & Executives; Cybersecurity Staff; and System Administrators Qualifications/Requirements: Splunk Administrator candidate should have a minimum of 3+ years of Splunk products experience. Splunk experience performing administration in a large-scale environment. … IAT) Level II certification to begin on contract: CompTIA Security+ CE (Continuing Education) CompTIA Cybersecurity Analyst (CySA+) CE (Continuing Education) (ISC) Systems Security Certified Practitioner (SSCP) GIAC Global Industrial CyberSecurity Professional (GICSP) GIAC Security Essentials Certification (GSEC) (ISC) Systems Security Certified Practitioner (SSCP) Requires one of the following Computing Environment/Operating System (CE/OS) to begin on More ❯
VMware credentials Why Join Cyber Defense Technologies? At CDT, we offer a collaborative and inclusive work environment where your expertise in System Administration can help shape the future of cybersecurity and engineering solutions. You'll have the autonomy to shape the lab infrastructure while supporting critical engineering workflows in a collaborative, mission-driven environment. Compensation and Benefits: • Competitive salary based More ❯
In order to be suitable for this role you must have demonstrable hands-on expertise with monitoring and securing enterprise class technology estates. You will have proven experience with CyberSecurity best practice including the NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the UK More ❯
Are you currently working for an IT provider but ready to step into the world of dedicated CyberSecurity? We have an exciting opportunity for an Information Security Consultant looking to elevate their career. We're looking for someone with hands-on experience in ISO 27001 implementation and auditing, and expertise in NIST to drive our Compliance Team's service … offerings forward. Work with a innovative, industry-leading CyberSecurity team Play a key role in the development of internal and client security programs Contribute to significant projects that support clients' compliance and risk management goals If you're ready to make an impact in CyberSecurity, this role is for you! Responsibilities: Ensure protection of information assets and technologies More ❯