to perform self-sustaining and work with little to no oversight Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes Manage COTS & GOTS products to collect, display and remediate a variety … Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports Execute cybersecurity operations procedures for day to day network management, operations and maintenance Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk Assist in analyzing technical … risk, upon request, of emerging cybersecurity tools and processes Work as part of a security incident response team as needed Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels Advanced technical competency in one or more of the following supported platforms More ❯
to perform self-sustaining and work with little to no oversight Lead IT ops team on day to day management and operations of Networks and implement capabilities vetted through Cybersecurity, ISSE and higher headquarters to maintain JSIG/RMF Authority to Operate and maintain Continuous Monitoring tools and processes Manage COTS & GOTS products to collect, display and remediate a variety … Manage and operate monitoring tools/capabilities with the enterprise security information and event management (SIEM) and create/tailor complex event alarms/rules and summary reports Execute cybersecurity operations procedures for day to day network management, operations and maintenance Monitor/analyze output of cybersecurity related tools for reportable security incidents and residual risk Assist in analyzing technical … risk, upon request, of emerging cybersecurity tools and processes Work as part of a security incident response team as needed Assist ISSM/ISSO/ISSE with the Integration/Development new techniques to improve Confidentiality, Integrity, and Availability for networks/systems operating at various classification levels Advanced technical competency in one or more of the following supported platforms More ❯
network engineers, fostering a culture of technical excellence. • Monitor network performance, proactively identifying and resolving bottlenecks and security risks. • Stay up to date on emerging networking technologies and DoD cybersecurity policies to enhance the network infrastructure. Required Qualifications: • Active DoD TS/SCI security clearance with the ability to maintain it in valid status. • Bachelor's degree in Computer Science … SDN) solutions. • Understanding of DoD security frameworks, including STIGs, RMF, and NIST guidelines. • Experience with network automation and scripting (Python, Ansible, etc.). Preferred Qualifications: • Master's degree in Cybersecurity, IT, or related field. • Experience working in government or defense environments. • Familiarity with firewalls, IDS/IPS, VPNs, and network segmentation strategies. • Experience with cloud networking architectures (AWS, Azure, GovCloud More ❯
Familiarity with identity and access management (IAM) concepts and tools. • Experience with encryption techniques and cryptographic protocols. • Understanding of containerization technologies like Docker and Kubernetes. • In-depth understanding of cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
global consultancy is looking for an experienced Security Architecht to lead the design and governance of secure solutions across a major programme of work. You will act as primary cybersecurity SME, delivering Microsoft-focused architecture and risk management. Key responsibilities: Deliver end-to-end solution designs aligned with Microsoft security capabilities Conduct capability assesments across Microsoft security tools (i.e Defender More ❯
be a U.S. Citizen Minimum 5 years of experience working with NIST security controls and information assurance Minimum 2 years of experience directly supporting Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA) and HVA PMO 4+ years of experience working and supporting HVAs as part of the NIST Risk Management Framework (RMF) process Experience in development of … Federal and Agency level HVA Program documentation, including guidance and outreach communications Security+ certification or equivalent cybersecurity certification Understanding of information assurance, cybersecurity, and privacy policies disciplines and methodologies Knowledge of Federal Information Security Modernization Act 2014 (FISMA) Understanding of NIST Risk Management Framework (RMF) Understanding of NIST Cybersecurity Framework (CSF) Understanding of High Value Assets and their Assessment Evaluation More ❯
our office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and CyberSecurity and Risk posture. This role is key in building and improving Primark's CyberSecurity posture. Duties & Responsibilities Actively progress and improve Primark's cybersecurity posture with the … Finding ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cybersecurity delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. Have … existing markets Deliver more memorable in-store experiences every day Further deliver on our Primark Cares sustainability strategy Create operational excellence to support and empower our customer-facing teams CyberSecurity &Technology will be at the heart of this growth and transformation agenda We want to use the latest technologies to do things smarter, better and faster to continue to More ❯
Manager (CISM), Certified Information Systems Security Professional (CISSP) or Associate, GIAC Security Leadership Certification (GSLC) or Higher-level certification. Education, Background, and Years of Experience Bachelor's Degree in Cybersecurity, Computer Science, Engineering or Math At least five years of DoD and/or DoN Information Technology and Cybersecurity experience with at least five years of experience managing information security … personnel. ADDITIONAL SKILLS & QUALIFICATIONS Required Skills At least three years of experience with Risk Management, Cybersecurity Management, Security Models and Access Controls, Network Protocols, Cybersecurity Architecture, Software Development Security and Database Security for DoD or DoN programs. WORKING CONDITIONS Environmental Conditions Contractor site with 0%-10% travel possible. General office environment. Work is generally sedentary in nature but may require More ❯
analysis across all data collected, develop dashboards and data visualizations to show compliance trends and identify data anomalies. The successful candidate will possess a background in data analytics and cybersecurity with knowledge of FISMA Scorecard requirements and FISMA metrics. The candidate must have previous experience compiling data, building reports, developing dashboards and other data visualizations, performing data analysis and communicating … stakeholders at varying levels across the organization. Responsibilities: Extract and integrate data from various data sources to support the creation of dashboards and visualizations that track FISMA metrics and cybersecurity performance indicators. Perform data analysis, build reports, develop dashboards. Lead data gathering efforts across a large and diverse stakeholder group in response to data calls. Build and develop presentations and … OMB requirements. Generate quarterly and annual performance trend reports to support OMB requirements. Develop compliance dashboards using centralized security authorization data. Conduct exploratory data analysis on large datasets for cybersecurity insights . Provide responses for cybersecurity-related audits based on requests for information received. Coordinate with SMEs to gather, validate, and finalize cybersecurity reports. Prepare executive summaries, talking points, and More ❯
Norwich, Norfolk, United Kingdom Hybrid / WFH Options
DHL Germany
entrepreneurial actions and commitment to society and the environment, we make a positive contribution to the world. The Group CISO Architecture team provides a group-wide architecture framework for cybersecurity which includes technical and organizational requirements as well as guidelines for cybersecurity for IT and OT. They are seeking a highly skilled and visionary Senior Cloud Security Architect (m/…/f/d) Bonn Full-time Permanent Your responsibilities Develop enterprise-level security architecture including requirement collection, technology selection, target state, gap analysis, roadmap steering and planning. Define cybersecurity technical standards, logical security architecture, security requirements as well as configuration baselines for IaaS/PaaS/SaaS (Azure, GCP and M365). Be a subject matter expert (SME) on More ❯
ability to see the bigger picture Excellent communication skills with the ability to influence multiple stakeholders Willingness to learn and adapt to new technologies coupled with a passion for cybersecurity Ability to self-motivate and define priorities to meet deadlines Good team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles More ❯
effectively to non-technical stakeholders. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 4+ Years of experience in networking administration. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). Knowledge of network protocols, firewalls More ❯
Capgemini Government Solutions (CGS) LLC is seeking a highly experienced Senior IT Project Managerto lead and manage complex IT and cybersecurity programs, with a focus on Independent Verification and Validation (IV&V) assessments. The ideal candidate will have a strong background in federal cybersecurity policy, risk management, and team leadership, and will be responsible for delivering high-impact projects on … time and within budget. Job Responsibilities: As a Senior IT Project Manager, you will: Lead and manage IT and cybersecurity projects, ensuring alignment with organizational goals and federal compliance requirements. Oversee teams conducting IV&V assessments, ensuring quality, accuracy, and actionable outcomes. Develop and maintain detailed project plans, schedules, and budgets. Communicate effectively with stakeholders, including federal clients, technical teams … Insider Threat programs. Provide regular status reports and briefings to stakeholders and leadership. Required Qualifications: Minimum 5 years of experience in program and project management within an IT or cybersecurity environment. Proven experience managing teams that perform assessment and IV&V activities. Demonstrated ability to: Lead cross-functional teams and manage multiple projects simultaneously. Analyze complex problems and develop effective More ❯
administrators, and security professionals. Communicate technical information effectively to non-technical stakeholders. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). Knowledge of network protocols, firewalls More ❯
Sentar is dedicated to developing the critical talent that the connected world demands to create solutions to address the convergence of cybersecurity, intelligence, analytics, and systems engineering. We invite you to join the small business team where you can build, innovate, and secure your career. Sentar is seeking a CRCS Program Manager in Huntsville! Role Description: The CRCS Program Manager … Responsibilities Strategic Alignment Work closely with the Chief Information Security Officer (CISO) and Technical Director to align the CRCS programs delivery with the organizations broader sales, services, quality and cybersecurity strategies Regularly update the CISO and Technical Director on service area performance, risks, opportunities, and needs providing data driven insights to inform decision making Participate in strategic planning sessions with … Support Participate in the composition of basis of estimate for pricing input during the proposal development process to secure new contracts and engagements. Team Management Direct a team of cybersecurity professionals, including assessors and ICS engineers, ensuring that they are equipped with the necessary skills and resources to complete engagements and projects Oversee the allocation of resources across multiple efforts More ❯
None The Opportunity: CACI is seeking a talented Penetration Tester to join our team in Herndon, VA. If the idea of working with and among a team of true cybersecurity engineering experts with world class and unique skills excites you, then this might be the opportunity for you! Be part of a department with an expanding range of programs … forensics, vulnerability research, or web app development/pen testing • Career experience working with network technologies such as firewalls, routers, switches • Recent experience competing in CTFs or hands-on cybersecurity challenges such as HackTheBox, TryHackMe, CCDC, Sans Netwars, etc. • Ongoing training and certifications: OSCP, OSEP, GPEN, GXPEN, GWAPT, etc. • Familiarity with various interpreted or compiled programming languages (java, C++ More ❯
D efforts with higher echelon modernization goals Provide strategic leadership on complex policy issues involving technology such as Artificial Intelligence (AI), Machine Learning (ML), Data Analytics, Autonomous Systems, and Cybersecurity Lead continual assessment of command cryptographic systems for vulnerabilities, inefficiencies, or obsolescence Guide gap analysis between current cryptographic capabilities and modern security requirements to ensure alignment with Department of Defense … to SCI and a Counterintelligence (CI) polygraph or ability to obtain CI polygraph by contract start Bachelor's degree in field related to Cryptographic Modernization such as Computer Science, Cybersecurity, Mathematics, or more focused study within Quantum Computing and Quantum Cryptography, Secure Hardware Design, or Artificial Intelligence in Cryptography 12 + yrs. demonstrated work experience within field of Cryptographic Modernization … and implementation of DoD and Army plans, policies, standards, and methods aimed at the acquisition and support of military systems 10+ years' experience in areas of Information Assurance and Cybersecurity (can be concurrent with work within Cryptographic Modernization) Demonstrated ability to provide guidance and recommendations for resolution of Information Security and Cryptographic Modernization technical problems Demonstrated experience with development architecture More ❯
inspire teams to prioritise information security in an ever-evolving digital landscape? The Role: Oxfam GB is seeking a Head of Information Security and Data Protection to lead the Cybersecurity, Data Protection, and Information Governance teams. This role involves managing risks across these areas, ensuring compliance with relevant regulations and control frameworks, and coordinating information security efforts across the wider More ❯
Agile, Scrum, SAFe or other modern software development methods/practices. • Experience supporting USAF or USA software development projects. • Knowledge of DESMF. • (ISC)2 CISSP, CompTIA CASP, or other cybersecurity certification preferred. Clearance: • U.S. Citizen with Active TS/SCI security clearance. More ❯
software development lifecycle. Strong experience in securing DevSecOps and container platforms against accreditation requirements in classified environments. Strong experience in system engineering and collaboration with infrastructure service providers and cybersecurity stakeholders to architect and implement enterprise solutions. Strong experience architecting, designing, and building DevSecOps solutions at scale, in the cloud or on-premise, across multiple classification domains (IL5 to IL6+ More ❯
development and tracking database is a plus. Strong written and verbal communication skills CompTia Security+ certification Windows Operating System certification (within 90 days) Desired Qualifications: Working knowledge of government CyberSecurity policies and procedures including system scans, remediation, and documentation Experience and understanding of Risk Management Framework (RMF), security controls and policies, and implementation of STIGs Experience scripting for automation More ❯
their integration into information systems and its technology component through purposeful security design. Develops and implements security designs ensure that the hardware, operating systems and software applications adequately address cybersecurity requirements and Security Controls Traceability Matrix (SCTM). Identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Implement, validate Security … performance optimization Demonstrate writing of your own project in scripting/programming (use of Shell scripting, Python, Javascript, Powershell) in a Linux or Windows environment to support the various CyberSecurity tools and applications required Provide guidance on vulnerability and malware remediation. Experience analyzing vulnerabilities, establishing cause and impact, and identifying the corrective action needed to eliminate and prevent the More ❯
to correct deficiencies and maintain more effective data handling, conversion, input/output requirements, and storage. We are seeking a skilled Palo Alto XSOAR Automation Engineer to join our cybersecurity team. The ideal candidate will have strong expertise in scripting, programming, and hands-on experience with Palo Alto Cortex XDR and SOAR platforms. Candidate will be responsible for designing, developing … and maintaining xSOAR playbooks, automating security workflows, and administering the xSOAR environment to enhance our threat detection and response capabilities. Required: Bachelor's degree in computer science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in cybersecurity, with a focus on automation and orchestration. Proven experience with Palo Alto XSOAR administration and playbook development. Hands … and programming skills in Python, PowerShell, or JavaScript. Familiarity with integrating XSOAR with APIs and third-party security tools (e.g., SIEM, ticketing systems, threat intelligence platforms). Understanding of cybersecurity concepts, including incident response, threat hunting, and security operations. Excellent problem-solving skills and ability to work in a fast-paced environment. Strong communication skills to collaborate with technical and More ❯
temporary assignment (up to 6 months) to support the information system security and VTC requirements ensuring AMC- wide SCIFs meet Defense Intelligence Agency (DIA) regulations and policies regarding IA, Cybersecurity and Incident Response. The information security support personnel assists in the management, scheduling, verifying and monitoring of JWICS VTCs and IT equipment. The VTC support involves de-conflicting teleconference schedules … new user accounts and installing printers and network drives. • Provide weekly and monthly briefings or reports containing status of tasks and performance metrics. • Establish, maintain and collect, the Command Cybersecurity Standard Operating Procedures (SOPs) and • Tactics, Techniques, and Procedures (TTPs), and update annually. • Establish and continuously maintain content management for the command Cybersecurity portal site where all key Cybersecurity products … correctly and effectively, validating corrective action and/or mitigating factors. • Establish, maintain and collect, and update annually, Techniques and Procedures (TTPs), and corresponding artifacts. • Collaborate with the GISA Cybersecurity team to identify, fix, and provide information regarding resolving vulnerabilities, and computer incidents. • Perform content and document management activities to include configuring & managing document check-in/out, version history More ❯
About the role: Shape the Future of CyberSecurity at Holland & Barrett At Holland & Barrett, we're not just a leading health and wellness retailer—we're a digital-first business that places customer trust at the heart of everything we do. We're looking for a Senior Security Operations Engineer to join our growing CyberSecurity team and help More ❯