technologies and recommend solutions that enhance agility, scalability, and resilience. Lead architectural reviews and provide oversight on system design, integration, and modernization initiatives. Ensure alignment of enterprise architecture with cybersecurity policies, compliance standards, and risk management frameworks. Define target-state architectures and guide system development efforts toward long-term enterprise objectives. Document business processes, application portfolios, infrastructure assets, and integration … APIs, ESBs, microservices). Familiarity with security architecture, zero trust principles, and compliance frameworks (e.g., NIST, FedRAMP, FISMA). Knowledge, Skills & Abilities: Knowledge of enterprise IT domains including cloud, cybersecurity, data, application, or infrastructure architecture. Knowledge of federal enterprise architecture standards and mission-aligned IT planning. Skill in producing architectural diagrams, standards, and roadmaps that guide large-scale technical initiatives. More ❯
electronic warfare; and C5ISR systems. HII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely enable us to support sensitive missions for the U.S. military and federal agency partners. Meet HII's Mission Technologies Division Our … and technical security advice, guidance and general security support to Program and HII security offices. Preferred Requirements Background in one or more of the following: system administration, computer security, cybersecurity methodology, IT risk management tools, certification and accreditation through ICD-503, ICD-705 or NIST information system security controls. Possess or being willing to obtain IT certifications that meet DoD More ❯
team, you will use your expertise in Host Based Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and specialized network defense to provide innovative and creative solutions to challenging cybersecurity problems. Manage and administer the tuning of rules, signatures, and custom content for CND applications and systems. Identify potential conflicts with implementation of any CND tools within the enterprise … and damage risk. • Analyze all data sources, including Internet, Intelligence Community (IC) reporting, security events, firewall logs, and other data sources to identify malware, misuse, unauthorized activity or other cybersecurity related concerns. • Track intelligence using open source and classified sources to identify malicious code threats and provide solutions to counteract that threat. • Create, edit, and manage signatures, custom rules … Level 2 - Expert Salary: Up to $180,000.00 per year Core Hours: 9am to 4pm Location: Herndon VA Mandatory Requirements: • 2+ years of experience in Network Defense, Network Operations, Cybersecurity, Network Engineering, Security Engineering, Information Security, Systems Architecture or Data Analysis • Experience writing script in programming languages such as Python, JavaScript, Yara or Snort • Experience using SIEM tools for case More ❯
and experienced Tier 1 & 2 Security Operations Center (SOC) Manager to lead a 24x7x365 SOC team serving VIP customers at the US House of Representatives. This role requires a cybersecurity operations expert who can manage day-to-day operations, coordinate incident responses, and work closely with senior stakeholders to ensure the security and integrity of critical systems. Key Responsibilities: Team … high standards in SOC operations. Ad Hoc Tasking: Address and manage ad hoc tasks as they arise, coordinating with various stakeholders. Cross-Department Interaction: Work with other departments, including CyberSecurity, networking, and systems administration, for troubleshooting and content development. Specific Daily/Weekly Tasks: Review help tickets, cross-train team personnel, refine processes, and mentor Tier 1 & 2 staff. More ❯
and case outcome to SOC Management and the client. Utilize technologies to conduct host forensics, Endpoint Detection & Response, log analysis, and network forensics (full packet capture solution). Provide cybersecurity root-cause analysis and investigative alerts to examine endpoint activity and network-based data. Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response. … Be able to pass Public Trust background investigation. Minimum of a Bachelor's degree or equivalent experience. Minimum 5 years of demonstrated experience in an Intrusion Detection and Response, Cybersecurity Incident Responder/Handler type role. Minimum of one IAT Level 1 security industry specific certifications (8570 Baseline Certifications) i.e. A+, Network+, Security +, CEH, CySA+, GCIH, GCIA, GCFE, GREM More ❯
and programmatic duties. This role will also organize, direct, and coordinate the planning, oversight, and implementation of specific projects and initiatives within the bounds of a program with the Cybersecurity Operations Center (CSOC) Manager and Cybersecurity Engineers. You may be responsible for directing individuals or teams of resources in the execution of project tasks towards the successful completion of deliverables … project execution. Additionally, in this position you will: Provide high-level administrative support to the Program Manager(s). Serve as a liaison between team members, the CSOC Manager, Cybersecurity Engineers, the Program Manager, and Customer project managers. Responsible for the creation and tracking of project deliverables, documentation, and compliance requirements. Responsible for the development of requirements for their project More ❯
development and employment of defensive Cyberspace capabilities. Provide strategic leadership on complex policy issues involving technology such as Artificial Intelligence (AI), Machine Learning (ML), Data Analytics, Autonomous Systems, and Cybersecurity Lead and oversee complex R&D projects and provide guidance on the design, development, and implementation of advanced software and systems Evaluate emerging technologies and recommend innovative solutions to meet … programming of Encryption Algorithms and demonstrated design experience Demonstrated expertise in Interoperability Specifications and best practices; Integration of AI technology and advancements in ML; Software development and systems integration; Cybersecurity and Information Assurance; Data Analytics; and Command and Control (C2) systems Proficiency in programming languages such as Python, Java, C++, or others depending on project needs Demonstrated experience with National … Security Agency Certification process of cryptographic products Demonstrated experience with software development methodologies (e.g., Agile, DevSecOps) Strong knowledge Network protocols and systems, Cybersecurity tools and best practices, Cloud computing and distributed systems, modeling, simulation, and system testing Understanding of DoD acquisition processes and policies Broad knowledge of Blue-space Cyber capabilities and demonstrate understanding of available Cyber infrastructure or platforms More ❯
Server environments Configure and troubleshoot production-grade systems, ensuring high availability and performance in AWS and hybrid environments Implement and monitor cloud-native security controls, ensuring compliance with DoD cybersecurity standards Collaborate with cross-functional teams to support operational tasks, incident response, and system optimizations Manage ticket queues and contribute to documentation and knowledge bases for continuous improvement Communicate complex … solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
in support of A&O Shearmans strategy to lead where global complexity creates opportunity. In addition, you will have the opportunity to share and gain intel from the firms cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incident response programmes. What More ❯
of A&O Shearman's strategy to lead where global complexity creates opportunity. In addition, you will have the opportunity to share and gain intel from the firm's cybersecurity lawyers. The global team have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients' cyber risk management and incident response programmes. What More ❯
the interpersonal things. Other duties as assigned. REQUIRED DEGREE/EDUCATION/CERTIFICATION: Bachelor of Science in Computer Science or related field or 3-5 years' experience in the cybersecurity field. Requires IAT level III OR IAM III, or CSSP Incident Responder. (CASP, CCNP, CISA, CISSP) REQUIRED SKILLS AND EXPERIENCE: In-depth knowledge of systems security engineering, systems security operations More ❯
support engineer, directly responsible to the MFBSA Lead Program Manager, for technical performance of program requirements. This individual will conduct technical documentation and report reviews, ensure design complies with cybersecurity practices and architecture, and contribute day-to-day execution of programs efforts to ensure Time Certain Delivery of capabilities. As a Senior Test Engineer, you will be responsible for supporting … with a keen eye for detail Strong communication, interpersonal, and negotiation skills Ability to work independently, manage multiple tasks, and prioritize effectively Knowledge in information technology, network, RMF and cybersecurity Possess good written and oral communication skills Proficient in Microsoft Office Preferred Education, Experience, & Skills Strong background in systems engineering 3-5 years of experience in software testing, with a More ❯
VA initially and then transition to onsite in Manassas, VA within the first year. Our Customer's Mission: Team Epsilon has been chosen to deliver full-spectrum IT and CyberSecurity support to a critical and enduring multinational organization within the United States Department of Defense. This DoD organization manages the resourcing, development and sustainment of one of our nation … committed to delivering excellence without compromise and who view customer service as a top priority. An average day: As Information Assurance Analyst I, you will be the forefront of cybersecurity, ensuring that information systems maintain a robust posture and continue to meet the highest standards in national security. The Information Assurance Analyst I collaborates with senior team members to ensure … U.S.C. 1324b(a)(2)(C) , Epsilon will not consider candidates for this position who do not meet the aforementioned conditions. Minimum of 1 year of experience in information assurance, cybersecurity, or related discipline. Must hold a current 8570/8140 IAT Level II Certification (Security +, CC, CCND, SSCP) Familiarity with federal security standards, including NIST SP 800-53, RMF More ❯
VA initially and then transition to onsite in Manassas, VA within the first year. Our Customer's Mission: Team Epsilon has been chosen to deliver full-spectrum IT and CyberSecurity support to a critical and enduring multinational organization within the United States Department of Defense. This DoD organization manages the resourcing, development and sustainment of one of our nation … committed to delivering excellence without compromise and who view customer service as a top priority. An average day: As Information Assurance Analyst I, you will be the forefront of cybersecurity, ensuring that information systems maintain a robust posture and continue to meet the highest standards in national security. The Information Assurance Analyst I collaborates with senior team members to ensure … U.S.C. 1324b(a)(2)(C) , Epsilon will not consider candidates for this position who do not meet the aforementioned conditions. Minimum of 1 year of experience in information assurance, cybersecurity, or related discipline. Must hold a current 8570/8140 IAT Level II Certification (Security +, CC, CCND, SSCP) Familiarity with federal security standards, including NIST SP 800-53, RMF More ❯
Rampant Technologies Independent Assessor (IA) is a key resource that is a part of the Rampant team reporting to the Principal Engineer overseeing the IA team to deliver innovative CyberSecurity solutions that are in alignment with the company's goals and customer missions. The IA will be tasked to execute against Contract level programs/projects/sub-projects … Information Security System Engineering, or related discipline. Five (5) years of ISSE experience may be substituted for a bachelor's degree. Minimum of eight (8) years' relevant experience in cybersecurity (or compatible technology concentration) with two (2+) years of direct experience in the same level/grade for like role Should have performed in a project/tasking lead role … in at least three (3) Cybersecurity initiatives. Experience managing direct reports in previous projects and or companies is preferred IA Techno functional knowledge of/experience in: o Demonstrated experience with NIST 800-53A, Rev. 4, NIST 800 SP-37, ICD 503 and common vulnerabilities and exposures, DISA STIGs, strong familiarity with FISMA, RMF, and other information security-related More ❯
Hypervisors, Enterprise networking and firewall systems, Group Policy configuration, WSUS, Bitlocker, SQL Server, Internet Information Service (IIS), Windows Server 2019/2022, and Windows 10/11 Works with Cybersecurity Personnel to establish Disaster Recovery (DR)/Business Continuity Plans Strong ability to produce and maintain varied technical documentation Develop and document system administration standard operating procedures 100% onsite is … months of hire Possess a DoD 8140.03/8570.01 Information Assurance Technical II certification or able to obtain within 6 months of hire: Cisco Certified Network Associate-Security (CCNA-Security), Cybersecurity Analyst Plus (CySA+), Global Industrial CyberSecurity Professional (GICSP), GIAC Security Essentials (GSEC), CompTIA Security+ (Security+), Certified Network Defender (CND), or Systems Security Certified Practitioner (SSCP) Must have the More ❯
Manager is a key figure in the organisation's cyber defence efforts, tasked with identifying, detecting, and responding to information security threats, as well as managing the response to cybersecurity incidents. Working closely with colleagues across IT and the wider organisation, this role ensures the protection of digital and information assets against a range of internal and external threats. The More ❯
Manager is a key figure in the organisation's cyber defence efforts, tasked with identifying, detecting, and responding to information security threats, as well as managing the response to cybersecurity incidents. Working closely with colleagues across IT and the wider organisation, this role ensures the protection of digital and information assets against a range of internal and external threats. The More ❯
by ensuring communications are secure and protected against Cyber threats while provide continuous access for authorized users. As a dynamic systems integrator, SMS offers proven solutions in engineering, operations, cybersecurity, and digital transformation. With expertise in modernizing and optimizing legacy infrastructure and systems, ensuring operational efficiency, and designing, implementing, and managing secure environments, SMS supports business and mission goals with More ❯
Central London. The Information Security Manager will be responsible for day-to-day tasks related to information security management, including implementing and maintaining Information Security Management Systems (ISMS), ensuring cybersecurity and network security, and protecting sensitive information. This is a hybrid role, based in London with the flexibility for some remote work. Qualifications Information Security Management, ISMS, and Cybersecurity skills More ❯
Huntsville, Alabama specializing in missile and aviation systems engineering and logistic services, electronic warfare and electromagnetic effects analysis, UAS system integration and flight operations, full lifecycle C5ISR engineering services, cybersecurity and IT/IA innovative solutions and virtual training, simulation & serious game development and implementation. We have established a broad offering of products and capabilities collectively providing decades of experience More ❯
Job Title: Cybersecurity Engineer - RMF & ATO Compliance Location: Annapolis Junction, Maryland 20701 Type: Part-time/potentially full-time depending on contract requirements Security Clearance: Active Top Secret clearance with CI-POLYGRAPH required D9Tech Resources is seeking Cybersecurity Professionals to serve as senior consultants supporting the security and compliance of cloud-based federal systems, with a focus on AWS cloud … security posture updates to stakeholders Ensure alignment with FedRAMP, NIST 800-series, and RMF guidelines Required Qualifications Active Top Secret clearance with POLYGRAPH Bachelor's degree in Information Technology, Cybersecurity, or related field 6+ years of technical experience in cybersecurity Extensive experience with AWS cloud security tools and best practices Proven success in achieving and maintaining ATOs for federal systems More ❯
Watford, Hertfordshire, United Kingdom Hybrid / WFH Options
Essential Employment
Senior Cybersecurity Risk Analyst (Remote) needed, £28.49ph PAYE - Reference: RQ Role Overview We are looking for a highly skilled and technically proficient Senior Cybersecurity Risk Analyst to join our team on an interim basis. This role is critical in identifying, assessing, and managing information security risks across the organization. The ideal candidate will have a strong technical background, the ability … across systems, applications, and infrastructure. - Identify and evaluate technical and operational risks, vulnerabilities, and control gaps. - Translate complex technical threats into clear, actionable business risks. - Maintain and update the Cybersecurity Risk Register. - Produce detailed risk assessment reports and present findings to stakeholders. - Collaborate with IT, SOC, and business units to ensure risks are understood and mitigated. - Provide technical escalation support … in the absence of a cybersecurity specialist, particularly in coordination with the Security Operations Centre (SOC). - Support compliance with relevant standards (e.g. ISO 27001, NIST, UK GDPR). - Review security aspects of tenders and conduct third-party/vendor risk assessments to ensure alignment with organisational security requirements. - Perform additional security-related tasks as directed by the Head of More ❯
of IT Services, Enterprise Design/Integration/Consolidation, IT Education/Training, IT Program/Project Management, Systems Operations and Maintenance, Network Support, and embedded Information Systems Security, CyberSecurity and Information Assurance to the Program Executive Office Aviation (PEO AVN) Information Technology Support Services. JOB DUTIES AND RESPONSIBILITIES • Under direct supervision, performs general maintenance tasks, troubleshoots, and repairs … Ability, Task) • Knowledge of basic physical computer components and architectures. • Knowledge of systems administration concepts. • Knowledge of the operations and processes for incident, problem, and event management. • Knowledge of cybersecurity principles. • Knowledge of computer networking concepts and protocols, and network security methodologies • Familiarity with Acceptable Use Policies, Standard Operating Procedures, etc. • Familiarity with troubleshooting Hardware issues such as Memory, Battery More ❯
was purpose-built to protect the nation and its allies through innovations in digital transformation, space mission engineering and launch assurance, miniaturized sensors and satellites, advanced modeling and simulation, cybersecurity, and conventional and hypersonic missile support. Headquartered in Chantilly, VA with 16 global offices, Arcfield employs more than 1,500 engineers, analysts, IT specialists, and other professionals with more than More ❯