and help you think like the attacker to improve operational success. You must like solving complex challenges, developing threat detection processes based on analytic findings and researching the latest cybersecurity solutions in a rapidly changing environment. REQUIRED SKILLS: • Experience in planning or executing cyber operations. • Proficient in data exploitation and data analysis. • Proficient in analyzing log files from web More ❯
law enforcement or a core area of technological interest for an advanced degree • 5-10 years of work experience in a field such as data security, information technology and cybersecurity operations, or data science and analysis • Widely recognized certifications such as CISSP may substitute for 2-5 years of work experience, depending on their level and relevance. • Demonstrated ability to More ❯
craft, while still being ever-changing and ever-adapting; we hope you are too. Who is CTP? Service-Disabled Veteran, Woman Owned Small Business; Leading a team on multiple cyber-security, networks, and engineering efforts in the federal government contracting realm. We put our people first and have since 2007. We're passionate about the cause, we're dedicated to More ❯
Corsham, England, United Kingdom Hybrid / WFH Options
Paradigm Tech
Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared Senior CyberSecurity Consultant required for a leading CyberSecurity Consultancy with a specialism in the Defence & Central Government sectors. This is a full-time, permanent position based from home with 1 day a week on-site with clients located in the South of the Country … able to achieve this. They'e paying between £65,000 - £85,000 + bonus and benefits. Please apply and I - Ben Griffiths - will be in touch to discuss. Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared More ❯
adequately addressed in all aspects of enterprise architecture, including reference models, segment and cloud solution architectures, and the resulting systems supporting those missions and business processes. • Serves as a cybersecurity SME for cybersecurity architecture policies and procedures. • Provides cybersecurity management support to Program Management Offices for emerging information systems through the acquisition lifecycle and, where applicable, into sustainment. • Provides technical … support and guidance to facilitate the identification and integration of cybersecurity controls at the onset of the acquisition lifecycle for emerging cloud capabilities. • Serves as a principal liaison for enterprise-level boundary defense initiatives to ensure consistent and sufficient identification and implementation of applicable cybersecurity controls in concert with the agency cybersecurity and cloud architecture and NIST security guidelines. • Provides … oversight for the design and implementation of enterprise-level cybersecurity solutions providing standards for access control capabilities across the enterprise. • Develops technical solutions to complex problems. Minimum Qualifications: • Knowledge of cloud-native software development. • Expertise of how to conduct cloud operations in AWS or Azure. • Formal general security certification (e.g., CompTIA Security+, Cloud Security Alliance - Certificate of Cloud Security Knowledge More ❯
CyberSecurity Analyst Location: Brentwood Are you ready to take your cybersecurity career to the next level? We're seeking a talented and motivated CyberSecurity Analyst to join our clients Operations team in Brentwood. If you thrive in a fast-paced environment and want to be at the forefront of defending critical systems and data, we’d love … parties for security risk Support incident response including forensic data gathering and documentation Collaborate across internal and external teams to align on compliance and risk Develop and support employee cybersecurity awareness initiatives Stay ahead of emerging threats and ensure defences evolve accordingly What We're Looking For: Previous experience in a cybersecurity or similar role in a regulated More ❯
HMRC Security are part of HMRCs Chief Digital Information office (CDIO) and support HMRC to assess business and reputational risks in one of the largest IT estates in Europe.? CyberSecurity Technical Services (CSTS) are integral part of HMRC Security. We are responsible for ensuring everyone has capability to fulfil their security responsibilities and develop individual capability to detect, prevent … and respond to security risks and threats.? Our vision is to be recognised as a centre of expertise, working collaboratively across government to deliver holistic, customer centric cybersecurity services and consultancy support that continually evolves to emerging technologies and the ever-changing threat and risk landscape to support HMRC/HMG business needs. This is an exciting time to … be part of our active and encouraging cybersecurity community, working within HMRC and across HMG. Job description As a Principal CyberSecurity Professional, you will play a leading role in securing HMRCs services, to ensure the best possible technical security risk-based advice is given to our customers. As the ideal candidate you will work in partnership with key More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
HMRC Security are part of HMRCs Chief Digital Information office (CDIO) and support HMRC to assess business and reputational risks in one of the largest IT estates in Europe.? CyberSecurity Technical Services (CSTS) are integral part of HMRC Security. We are responsible for ensuring everyone has capability to fulfil their security responsibilities and develop individual capability to detect, prevent … and respond to security risks and threats.? Our vision is to be recognised as a centre of expertise, working collaboratively across government to deliver holistic, customer centric cybersecurity services and consultancy support that continually evolves to emerging technologies and the ever-changing threat and risk landscape to support HMRC/HMG business needs. This is an exciting time to … be part of our active and encouraging cybersecurity community, working within HMRC and across HMG. Job description As a Principal CyberSecurity Professional, you will play a leading role in securing HMRCs services, to ensure the best possible technical security risk-based advice is given to our customers. As the ideal candidate you will work in partnership with key More ❯
and deep learning models. Support decision-making on medium/high-risk projects via governance escalation. Collaborate with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (e.g., OWASP AI Top 10). Must be based in the UK to meet regulatory More ❯
and compiled languages (Python, C, C++, Java) for tool development Support DoD and mission-aligned stakeholders with technical implementation and guidance Required Qualifications: Bachelor's degree in Software Engineering, Cybersecurity, Computer Science, or related field Minimum of 1 years of experience in software development Proficient in Python, C, C++, Java Familiarity with secure coding practices, reverse engineering, and x86 assembly More ❯
Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
Salary: 125K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
processes to include system security authorization agreements. Excellent written and verbal communication skills. Certifications: I AT Level II required Education: Possess a Bachelor of Science in computer networks and cybersecurity or a related technical discipline with coursework in the areas of: evaluating, installing, configuring, maintaining, and troubleshooting computer and network hardware components and operating systems. In lieu of a degree More ❯
150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks More ❯
150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks More ❯
FMS) or direct commercial sales (DCS) defense programs. Familiarity with Kingdom of Saudi Arabia (KSA) defense sector, SANGCOM, or MNG environments. INCOSE ASEP or CSEP certification. Prior exposure to cybersecurity and information assurance principles in system engineering. Arabic language proficiency is a plus but not required. Why Join HgP? HgP is a trusted U.S.-based defense and technology firm operating More ❯
that is clearly related to the position. Degree must be in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, CyberSecurity, Information Technology, Information Assurance, and Information Security). Relevant experience must be in vulnerability analysis, penetration testing, and/or computer forensics. In addition, may include computer of information More ❯
task execution Ability to work effectively as part of a team in a fast-paced environment What Desired Skills You'll Bring: Experience using Kafka Background or experience in cybersecurity Knowledge of testing frameworks including Playwright Familiarity with Go is a plus Knowledge of Agile and SAFe methodologies More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking an Engineer 2 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a More ❯
120K- 126K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
Slough, Berkshire, United Kingdom Hybrid / WFH Options
Michael Page
processes, ensuring compliance and excellence in standards. This role requires a professional with expertise in technology-related accreditation to lead initiatives and maintain quality benchmarks. Client Details An international CyberSecurity certification body focusing on advancing standards and certifications. It plays a pivotal role in fostering trust and quality within its field, offering a collaborative and mission-driven environment. Description More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Tech Specialist 2 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to networks More ❯