Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
opportunities to bring your ideas to life. Are you ready to be part of something transformational at Maersk and join a team that's setting a new standard in cybersecurity? Join a World-Class Cyber Team: Be part of an elite cyber operation at one of the globe's most renowned logistics companies, where your contributions truly make a difference. … hone your skills in a real-world environment. Innovate and Impact: Engage in innovative projects that allow you to bring your ideas to life, help shape the future of cybersecurity while developing new capabilities that enhance our operations. Key responsibilities Cyber Incident Response and event management Contributing to the response efforts for security incidents, managing triage, containment, documentation, and the … and techniques. Qualifications 3+ years of experience in cybersecurity or similar related diciplines, with a minimum of 2 years in a SOC or incident response role, although candidates with CyberSecurity know-how and able to demonstrate essential skills, may be considered. Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA, OSCP) are highly desirable but not essential. Proven More ❯
Our Partner provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based and cloud-based cybersecurity analysis capabilities. Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking Cyber Information Technologies Requirements Manager to … U.S. Citizenship Active DoD Secret Clearance, TS/SCI is preferred Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability BS Systems Engineering, Computer Science, CyberSecurity, Computer Engineering, or related degree; or HS Diploma & 10 years of network investigations experience. 8+ years of direct relevant experience in cyber systems engineering Knowledge in various IT fields … SASM, RTE, POPM, SPD, ASE, or SPC) About Us NewGen is a technology consulting services company solving some of the public and private sectors' toughest challenges across Enterprise Management, CyberSecurity and DevOps. While we are vendor agnostic, many of our consultants offer expertise in IBM products an-d services. We know that to find and hire the best fit More ❯
In this role, a successful candidate will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, business development support, helping to create and deliver presentations at both internal and client engagement meetings, and providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate … NIST SP 800-53 guidance Provide input to and guide implementation and/or verification and validation of an organizational access control policy and plan reflecting PAM and integrated cybersecurity solutions in compliance with risk-levels defined in the National Institute of Standards and Technology (NIST) 800-53, rev 4, Access Control family of controls to include auditing annually, at … clients' missions throughout the United States. Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, CyberSecurity, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring we meet and exceed our More ❯
Overview Abacus Technology is seeking an Information Assurance Specialist to support security and information assurance activities for the Aberdeen Proving Ground. This is a full-time position. Responsibilities Provide cybersecurity services to protect information and information systems from unauthorized access and to protect the data within systems. Validate technical standards and security policy for LAN topologies and components; identify and … Provide reports and documentation in support of the submission (and continuous monitoring) for the RMF. Assist with preparation for DISA CCRIs and other DoD or Department of the Army Cybersecurity related inspections/evaluations. Provide support for the DoD PKI service. Request, receive, install, and maintain accountability of system (server) PKI certificates and providing technical support for PKI. Provide DoD … for enterprise managed assets and workstations. Determine abnormalities, attacks, damages, and unauthorized modifications in the network via mechanisms such as intrusion detection devices. Qualifications 4+ years experience in a cybersecurity role including at least a year of experience with ACAS, HBSS, and RMF. Bachelor's degree in a related field desired. Must hold at least one of the following More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Lorien
when dealing with sensitive or high-stakes projects. About You Strong background in security architecture , with the ability to read, critique, and improve technical designs. Broad knowledge of the cybersecurity landscape , including both technical and governance aspects. Experience working in agile environments , with a solid grasp of sprint planning and delivery. Comfortable working across cloud platforms , especially AWS (expert-level More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
team of DevSecOps and Cloud Infrastructure practitioners supporting the U.S. Air Force's Unified Platform mission sets. Based in San Antonio, Unified Platform brings together cross-functional teams of cybersecurity and software engineering professionals to deliver mission-critical capabilities. In this role, you'll contribute to automation and infrastructure, security implementation, technical compliance, incident response, CI/CD pipeline enhancement … part of a hybrid schedule. In this position, you can expect to: Design and implement automated build, test, and deployment processes leveraging DevSecOps best practices that align with DoD cybersecurity objectives. Manage containerization technologies such as Kubernetes and Docker to support cyber defense platforms. Perform security hardening and performance tuning for EKS clusters in compliance with DoD and COSC guidelines. More ❯
Nationwide IT Services, Inc. (NIS) Position Summary Nationwide IT Services (NIS) is seeking a highly experienced Incident Responder/Incident Response Coordinator to support our DOD customer and mitigate cybersecurity incidents that impact critical DoD infrastructure. The successful candidate will apply deep technical knowledge and leadership skills to ensure a timely, accurate response and remediation in line with DoD cybersecurity … investigation, escalation, containment, and resolution. Interface with stakeholders, including technical teams, management, and external entities, to ensure clear communication and coordinated response efforts. Ensure compliance with all applicable DoD cybersecurity regulations, standards, and best practices. Provide post-incident analysis and contribute to the improvement of existing security controls and incident response procedures. Collaborate with risk management and security architecture teams … cyber incidents and threats. 5 years of experience managing and overseeing the flow of incident data, coordinating response activities, and ensuring proper remediation. Bachelor's degree in information technology, Cybersecurity, or a related field from an accredited institution. Active DoD Secret clearance required. Preferred Skills and Certifications Strong understanding of DoD Cybersecurity policies, frameworks (e.g., NIST 800-53, RMF), and More ❯
out the job description below! What you'll do: You will collaborate with a cross-functional team to design and implement a Security Operations Center, and integrate and maintain Cybersecurity tools and solutions. You will mentor and provide technical guidance to a team of cyber engineers and analysts, reviewing their work, and helping them solve complex technical challenges. You will … stay current on evolving cyber technologies, SOC, and compliance standards. What you'll need to succeed: An active TS SCI clearance At least 10 years of experience as a cybersecurity engineer with a specialization in SOCs, Cross Domain Solutions, and designing and building implementations of required security controls; and implementing continuous monitoring and auditing solutions for compliance with security controls. More ❯
San Antonio, Texas, United States Hybrid / WFH Options
BridgePhase, LLC
patching, and recovery, to reduce manual effort and increase uptime. Monitor system performance and lead root cause analysis and incident response for infrastructure-related issues. Collaborate with development and cybersecurity teams to ensure deployments are secure, compliant, and aligned with COSC and DoD requirements. Apply system hardening techniques and continuously evaluate system health, threat posture, and availability. Manage containerized workloads … cyber defense tools and event monitoring systems aligned with COSC mission operations. Assist in load testing, chaos engineering, and fault injection to validate platform resiliency. Maintain compliance with DoD cybersecurity controls including DISA STIGs, NIST SP 800-53, and the DoD DevSecOps Reference Design. As with any technical environment, the exact role responsibilities will evolve with the changing needs of … Familiarity with secure CI/CD pipelines and automation practices in compliance with DoD standards. Strong scripting skills in Bash or Python for automation and monitoring. Experience implementing DoD cybersecurity controls and supporting cyber operations or SOC environments. Exceptional communication skills and desire to work in a 'badgeless' collaborative team environment consisting of Government clients, other Contractors, and Stakeholders. Strong More ❯
About DXC Technology DXC Technology is a global IT services leader, providing cutting-edge technology solutions to modernize and secure IT infrastructure. With expertise in cybersecurity, cloud computing, and digital transformation, DXC empowers organizations to achieve operational excellence. Role Overview As a Security Architect, you will be responsible for enhancing the security posture of DXC's client services by ensuring More ❯
ensure swift response to zero-day threats. Collaborating on Security Risk Management strategies, aligning to a 3 lines of defence model and enforcing alignment of risk taxonomy to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions. Leadership Leads by Example: Demonstrates the technical and professional skills expected across the global team through personal action. … solutions. Committed to professional development: with a personal appetite to grow and contribute further to the organization over time. Knowledge, Skills, and abilities Bachelor's degree in computer science, Cybersecurity, Information Technology, or related field. Master's degree preferred. CRISC, CISM, CISA, CDPSE, or similar advanced security certifications. Advantageous to have experience in Artificial Intelligence, post quantum computing and cyber … risk quantification. Considerable experience in cybersecurity, with notable experience in a senior or managerial role focused on security policy, standards, controls testing, governance, and compliance. Mastery experience of how security controls are implemented, their effectiveness, and alignment with security policy, standards and NIST best practice guidelines. Strong ability to consult with control owners on their security remediation implementations and provide More ❯
Threat Hunt/Analysis teams Drive strategy, staffing, workflow optimization, and process improvement within the SOC Oversee incident response activities in alignment with all five functions of the NIST Cybersecurity Framework Maintain readiness for hybrid environments (on-premises and cloud infrastructure) Coordinate escalations, shift transitions, and analytic coverage across rotating teams Communicate with senior government leadership, external mission partners, and … experience, including 5+ years managing hybrid (on-prem/cloud) SOCs 10+ years of experience in incident response across enterprise-scale environments (50,000+ endpoints) Deep familiarity with NIST Cybersecurity Framework and federal incident response protocols Demonstrated success influencing practices and communicating with senior stakeholders Experience leading large, distributed teams in a mission-critical setting DESIRED QUALIFICATIONS: Experience supporting Department More ❯
and applications per agency guidelines. Apply advanced analytic techniques to IT system logs to detect threats, APTs, and cyber intrusions. REQUIRED QUALIFICATIONS: Bachelor's degree in Computer Science, Engineering, Cybersecurity, or related field (Master's preferred). 8+ years of experience in systems engineering/architecture, with a focus on security and large-scale enterprise environments. Expertise in insider threat More ❯
deploy, and maintain network environments across commercial cloud platforms. • Configure and maintain modern server and workstation environments with up-to-date patching and security baselines. • Implement and monitor comprehensive cybersecurity protections to defend critical assets. • Develop and maintain system security architectures, policies, procedures, and ATO documentation. • Lead Agile teams and apply Scrum methodologies to deliver high-quality technical solutions. • Organize … reviews, and security integration. Why Join QSS? At Quantum Science Solutions (QSS), we deliver secure, scalable, and mission-aligned technology solutions to support national security objectives. Our cloud and cybersecurity professionals thrive in high-impact environments where innovation and integrity matter. Join us and help shape the future of secure cloud services in support of vital U.S. Government operations. Employee More ❯
analysts and team members to build technical capacity and knowledge. Qualifications: U.S. Citizenship is required per Federal Law Active Secret Clearance is required to start Bachelor's degree in Cybersecurity, Information Technology, or a related field 10+ years of expereince in IT/OT related roles 3+ years of experience in a senior role with CIO … level responsibilities. This is a hybrid position and might require travel Certifications such as CISSP, CISM, CISA, or other relevant certifications are preferred Preferred Qualifications: Master's Degree in CyberSecurity or IT-related field Certifications that demonstrate firsthand Information technology knowledge specific to the Army and OT environments are highly desirable, including: Certified Ethical Hacker (CEH) GIAC Security Essentials More ❯
all facets of a continuous 24/7 Global Network Operations and Security Center Execute network, system, and cloud systems monitoring/surveillance, environmental monitoring, incident management and MDA Cybersecurity Support and service maintenance activities to include Change Management coordination during the assigned shift day/time Be responsible for all aspects of IT incident management and escalation, ensuring that … other 24x7x365 IT Operations environment. Have knowledge of IT Network Operations and connectivity devices that inter-relate with Public Key Infrastructure authentication and Information Security practices. Have knowledge of Cybersecurity principles and how to execute system/network security analysis. Have a working knowledge of Tier III Information Assurance practices, IT security governance, security administration, project management, logistics, and CybersecurityMore ❯
Architecture (ZTA) and advanced analytics initiatives across large, complex organizations. In this position, you will support our customer in the Alexandria, Virginia area. The ideal candidate will bring deep cybersecurity expertise, strategic insight, and extensive technical leadership to support digital transformation efforts. Mission: As a Subject Matter Expert supporting this government program, you will lead the advancement and implementation of … cutting-edge Zero Trust Architecture and data-driven cybersecurity solutions that protect national security interests. By leveraging deep technical expertise, strategic vision, and emerging technologies such as AI, big data analytics, and cloud platforms, the Zero Trust Data Analytic SME will drive innovation, enhance cyber resilience, and support senior leaders in executing secure, scalable, and mission-critical transformations aligned with … DoD and federal cybersecurity standards. Location: Mark Center, Alexandria, Virginia Clearance: TS/SCI Certifications: Preferred Certifications (One or more required): CompTIA Security+ CISSP CISM CCSP CEH CCSK Requirements: U.S. Citizenship TS/SCI Advanced degree in Computer Science, Cybersecurity, Systems Engineering, or a related technical field. (Additional years of experience and cybersecurity certifications may substitute for an advanced degree. More ❯
Splunk implementations. Implement/create report dashboard designs, automated custom email report notifications, report log data repositories for each environment that are specific to the following audiences: Leadership & Executives; Cybersecurity Staff; and System Administrators Qualifications/Requirements: Splunk Administrator candidate should have a minimum of 3+ years of Splunk products experience. Splunk experience performing administration in a large-scale environment. … IAT) Level II certification to begin on contract: CompTIA Security+ CE (Continuing Education) CompTIA Cybersecurity Analyst (CySA+) CE (Continuing Education) (ISC) Systems Security Certified Practitioner (SSCP) GIAC Global Industrial CyberSecurity Professional (GICSP) GIAC Security Essentials Certification (GSEC) (ISC) Systems Security Certified Practitioner (SSCP) Requires one of the following Computing Environment/Operating System (CE/OS) to begin on More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Optiv+ClearShark
provide our clients and sellers with consistent security expertise on all sales opportunities. In partnership with domain specialist and experts, the Senior SE will drive thought leadership and inspired cybersecurity solutions powered by our ecosystem of people, products, and partners. How you'll make an impact: Drive the generation services and technologies business to meet or exceed quarterly and … s security environment, business operations, security needs, and risk appetite. Identify their security concerns and how they correlate to Optiv's strategic solutions across the assigned domain and holistic cybersecurity programs. Identify cross-sell and upsell opportunities across clients and Optiv's partner relationships. Qualify lead and partner with internal colleagues to determine scope, proposal management, and follow through … knowledge and continuously expands their expertise in other domains across the portfolio. Vendor specific certification(s) focused primarily on specialty. CISSP, GIAC, CISA, CISM, CCSP or other relevant professional cybersecurity certifications preferred. What you can expect from Optiv Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. "Optiv Chips More ❯
Columbia, Maryland, United States Hybrid / WFH Options
Optiv+ClearShark
provide our clients and sellers with consistent security expertise on all sales opportunities. In partnership with domain specialist and experts, the Senior SE will drive thought leadership and inspired cybersecurity solutions powered by our ecosystem of people, products, and partners. How you'll make an impact: Drive the generation services and technologies business to meet or exceed quarterly and … s security environment, business operations, security needs, and risk appetite. Identify their security concerns and how they correlate to Optiv's strategic solutions across the assigned domain and holistic cybersecurity programs. Identify cross-sell and upsell opportunities across clients and Optiv's partner relationships. Qualify lead and partner with internal colleagues to determine scope, proposal management, and follow through … knowledge and continuously expands their expertise in other domains across the portfolio. Vendor specific certification(s) focused primarily on specialty. CISSP, GIAC, CISA, CISM, CCSP or other relevant professional cybersecurity certifications preferred. What you can expect from Optiv Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. "Optiv Chips More ❯
and adoption. Incident Responders must be able to perform the tasks and meet the skills, knowledge and abilities as described in NIST Special Publication 800-181 National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework for the role of Cyber Defense Incident Responder Required: 6 years of security intrusion detection examination experience involving a range of security technologies that product … is a trusted leader in IT services and solutions, delivering mission-focused digital transformation that drives measurable success. Our expertise spans four core technology domains-Network Modernization, Hybrid Cloud, Cybersecurity, and Enterprise IT-empowering our clients with cutting-edge solutions tailored to their evolving needs. With over 50 years of experience, Tyto Athene proudly support Defense, Intelligence, Space, National SecurityMore ❯
Who we are: ShorePoint is a fast-growing, industry recognized, and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. ShorePoint subscribes to a "work hard, play hard" mentality and celebrates individual and company successes. We are passionate about our … continuously expand your skill set as the company evolves. This is a unique opportunity to play a key role in a fast-growing company at the forefront of the cybersecurity market. What you'll be doing: Collaborate with the Integration and Architecture teams to design, document, build, secure, and maintain Elasticsearch, Logstash, Kibana (and X-Pack) enterprise solutions in both … tools (e.g., Maven, Jenkins), and configuration tools (e.g., SVN). Understanding of secure coding practices, including encryption (e.g., certificates, TLS connections). Must have's: Bachelor's degree in Cybersecurity, Computer Science, Information Systems, Mathematics, Engineering or a related field or relevant experience in lieu of degree. 2+ years of relevant experience. Proven ability to analyze complex requirements and translate More ❯
gaps and provide evaluation and treatment options, consultation on remediation approaches to address gaps and continue ongoing monitoring of remediation, re-assess until reduced to an acceptable level. Supporting Cybersecurity Risk Management strategies based on security findings and observations. Including informing improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all security functions Profile and assign … ensuring compliance with internal and external requirements. Provide assurance to stakeholders through detailed reporting and metrics. What we're looking for: Minimum of 5 years' experience in Information and CyberSecurity, with minimum of 2 years' experience in a security risk team. Highly organised with experience of planning and reporting data, information and updates. Ability to collaborate effectively with others More ❯
prepare, and update authorization packages. Notify customer when changes occur that might affect authorization accreditation. Conduct cybersecurity portion of the self-inspection's checklist. Review and provide technical and cybersecurity coordination on all Bodies of Evidence that make-up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained More ❯
prepare, and update authorization packages. Notify customer when changes occur that might affect authorization accreditation. Conduct cybersecurity portion of the self-inspection's checklist. Review and provide technical and cybersecurity coordination on all Bodies of Evidence that make-up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained More ❯