delivery) to ensure solutions are deliverable, scalable, and aligned to client requirements & their environments The following skills and experience are essential for this role: 14+ years of experience in cybersecurity, with a strong emphasis on network and endpoint security architecture Proven ability to operate in a technical pre-sales or consulting capacity, translating customer requirements into secure solution designs Strong … government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the way in defending digital environments. In this role, you'll deepen your expertise in cutting-edge network and endpoint security, Zero Trust … at the forefront of cloud-native, AI-powered, and data-centric security architectures. Engage with Global Security Thought Leadership : Work alongside some of the industry’s top minds in cybersecurity and architecture. You’ll help shape and refine strategies that address today's most complex security challenges while contributing to thought leadership, innovation hubs, and industry whitepapers. Innovation-Driven Solution More ❯
delivery) to ensure solutions are deliverable, scalable, and aligned to client requirements & their environments The following skills and experience are essential for this role: 14+ years of experience in cybersecurity, with a strong emphasis on network and endpoint security architecture Proven ability to operate in a technical pre-sales or consulting capacity, translating customer requirements into secure solution designs Strong … government Familiarity with DNS-based threat detection, SIEM/SOAR integration, and cloud security access brokers (CASB) Why Join Us at Accenture in This Role? Leadership in Next-Generation Cybersecurity : As a trusted security partner, Accenture leads the way in defending digital environments. In this role, you'll deepen your expertise in cutting-edge network and endpoint security, Zero Trust … at the forefront of cloud-native, AI-powered, and data-centric security architectures. Engage with Global Security Thought Leadership : Work alongside some of the industry’s top minds in cybersecurity and architecture. You’ll help shape and refine strategies that address today's most complex security challenges while contributing to thought leadership, innovation hubs, and industry whitepapers. Innovation-Driven Solution More ❯
None The Opportunity: CACI is seeking a talented Penetration Tester to join our team in Herndon, VA. If the idea of working with and among a team of true cybersecurity engineering experts with world class and unique skills excites you, then this might be the opportunity for you! Be part of a department with an expanding range of programs … forensics, vulnerability research, or web app development/pen testing Career experience working with network technologies such as firewalls, routers, switches Recent experience competing in CTFs or hands-on cybersecurity challenges such as HackTheBox, TryHackMe, CCDC, Sans Netwars, etc. Ongoing training and certifications: OSCP, OSEP, GPEN, GXPEN, GWAPT, etc. Familiarity with various interpreted or compiled programming languages (java, C++ More ❯
infrastructure and virtualization technologies. Support accreditation and authorization (A&A) processes in accordance with the customer's ATO framework. Ensure compliance with NIST 800-series, FISMA, and related federal cybersecurity standards. Evaluate and manage NIST 800-53 control implementations and provide recommendations using GRC tools. Collaborate across teams to develop secure, scalable, and optimized IT environments. Lead system troubleshooting and More ❯
Support Services directorate located in San Antonio, TX. The Military Medical Treatment Facilities (MTFs) IT (Information Technology) division supports the continued management and administration of DHA systems, applications, networks, cybersecurity, and telecommunications services for the PEO MS/J-6 through contractor staff augmentation. The Sr. Systems Administrator is tasked with improving IT practices and mechanisms with consistent support to More ❯
Support Services directorate located in San Antonio, TX. The Military Medical Treatment Facilities (MTFs) IT (Information Technology) division supports the continued management and administration of DHA systems, applications, networks, cybersecurity, and telecommunications services for the PEO MS/J-6 through contractor staff augmentation. The Sr. Systems Engineer is tasked with improving IT practices and mechanisms with consistent support to More ❯
An Active Secret Security clearance with the ability to obtain a Top Secret Ability to be onsite 5 days a week in Washington, DC. 5+ years of experience in cybersecurity engineering, cloud security, or IT security, with a focus on Google Workspace (G Suite), AWS or Azure. Strong expertise in Google Admin Console, Security Center, Google Vault, and Cloud Identity More ❯
highly desirable). Certifications (Preferred): Cloud Certifications: AWS Certified Solutions Architect, Microsoft Azure Solutions Architect, Google Professional Cloud Architect, or equivalent. Security Certifications: CISSP, CCSP, Security+, or other relevant cybersecurity certifications. Skills & Competencies: Deep knowledge of cloud platforms (AWS, Azure, Google Cloud) and cloud security best practices. Strong understanding of DoD cloud security frameworks, including Zero Trust Architecture (ZTA) and More ❯
control assurance. Experience creating queries and reports using RSA Archer and Service-Now. Familiarity with Kanban boards and Jira. Desired Competencies: Big 4 accounting experience preferred. Strong knowledge of cybersecurity principles and organisational requirements relevant to confidentiality, integrity, availability, authentication, and non-repudiation. Ability to apply security governance, risk, and control principles. Proficiency in automation and data analytics tools (e.g. More ❯
join our team in providing critical support for the integration of risk management activities into the system life cycle process. This role is pivotal in supporting the government's cybersecurity mission efforts by managing and mitigating risks across information systems, including security, enclave, and organizational risks. The selected candidate will be responsible for driving the development and execution of risk … maintained, and decommissioned with a robust security posture, while staying within budget and deadlines. This position offers the opportunity to directly contribute to the success of the government's cybersecurity objectives, playing an essential role in safeguarding critical systems and information. Responsibilities: The successful candidate will be responsible for coordinating and executing tasks related to the implementation of Risk Management More ❯
Mileage Reimbursement Annual bonus based on performance and eligibility Requirements: Bachelor's degree in Computer Science , Information Security, or a related field. Minimum of 3 years of experience in cyber-security, with a focus on application security. Strong knowledge of security frameworks and standards such as OWASP, NIST, and ISO. Experience with security tools and technologies, such as Snyk , Cove More ❯
policies, collaborate with key stakeholders to develop strategy and roadmap to comply, identifying and tracking risks and challenges for implementation Align services and processes to ITIL4 and the NIST CyberSecurity Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements. More ❯
support requirements. The DevOps team is responsible for the security governance, risk management, and compliance of a system while it is being engineered for our customers. • Working knowledge of Cybersecurity technologies, NIST standards, and RMF governance across multiple phases of a Medium to large program • General understanding for Database design and implementation • Hands on experience with Python and/or … PowerShell scripting • Some experience with general Cybersecurity activities such as secure configuration/hardening of DoD Information Systems, system audit configuration, capture, analysis, cybersecurity configurations such as Firmware updates/upgrades and STIGs to a baselined system, and risk reduction The selected candidate should thrive in a fast-paced work environment with high expectations, significantly diverse assignments, collaborative/team More ❯
but are not limited to: Review and analyze current program operations, processes data and systems and identification of improvement opportunities Align services and processes to ITIL4 and the NIST CyberSecurity Framework Collaborating with cross-functional teams and project stakeholders to analyze and define business processes, develop cost/benefit analyses, and collaborate with stakeholders to define and document requirements More ❯
processes and experience in enterprise software development would be an added advantage. Industry recognized system administration certification Additional Requirements BA/BS Degree is required. Ideally in Computer Science, CyberSecurity, Information Security, Engineering, Information Technology. MA/MS Preferred. Top Secret Clearance with Polygraph Note: The job description is meant to be a guideline. It is not exhaustive, and More ❯
clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies, along with assisting users as More ❯
DC, Maryland, and Virginia (Northern) DMV area . The NOSC Senior IT Technical Writer leads the creation and management of all technical documentation, including SOPs, TTPs, work instructions, and cybersecurity guidelines. They work closely with cross-functional teams to ensure content is clear, accurate , and aligned with DHS policies, while enhancing knowledge sharing and supporting mission-critical IT and securityMore ❯
development and maintenance of Windows Virtual Desktop (WVD) and associated cloud-based infrastructure • Implement system patches, updates, and upgrades in line with DoD security standards • Collaborate with senior engineers, cybersecurity professionals, and program stakeholders to ensure successful system integration • Monitor, maintain, and troubleshoot VDI performance and availability across multiple environments • Document system configurations, procedures, and architecture for continuity and compliance More ❯
the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports. Assist in analyzing technical risk, upon request, of emerging cybersecurity tools and processes. Work as part of a security incident response team as needed. Working technical competency in one or more of the following supported platforms: Microsoft Windows Server, Red More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
NEST Corporation
requirement for hands-on process operation for internally managed controls such as access reviews, and some investigations such as subject access requests or insider threats.This role will support the ‘cybersecurity’ theme within the Corporate Technology IT Strategy 2030. The minimum criteria for this role are: Practical experience of operating information security controls under a certified ISMS using ISO More ❯
insights and recommendations for improvement as well as data analysis and provide recommendations based on analysis, develop and brief metrics. Align services and processes to ITIL4 and the NIST CyberSecurity Framework. Collaborate closely with cross-functional Agile teams and project stakeholders to understand performance requirements, establish measurement frameworks, ensure data accuracy and integrity, analyze and define business processes, develop More ❯
Experience working with Department of Defense clients, particularly the Navy or NIWC. Strong knowledge of enterprise architecture frameworks (DoDAF, TOGAF, etc.). Familiarity with cloud platforms (AWS, Azure, etc.), cybersecurity standards (RMF, NIST), and modern DevSecOps practices. Excellent communication skills with the ability to brief senior leadership and technical teams. Qualifications Desired: Demonstrated experience implementing project management principles; and managing More ❯
degree in computer science, Software Engineering, Information Technology, or a related field and 2-6 years of relevant experience is a plus but not always required. A degree in Cybersecurity and/or IT Management is a plus but not required. 2-5 years of experience in software testing, system administration, or IT operations. Experience in an enterprise IT environment More ❯
with cloud platforms (AWS, Azure, Google Cloud). Strong scripting and automation skills (PowerShell, Bash, Python). Experience with Active Directory, Group Policy, and identity management solutions. Understanding of cybersecurity best practices and compliance standards. Strong troubleshooting and problem-solving abilities. Excellent communication and teamwork skills.Preferred Qualifications: Industry certifications such as CompTIA Security+, Microsoft Certified: Azure Administrator, AWS Certified SysOps More ❯