Peterlee, County Durham, United Kingdom Hybrid / WFH Options
Everflow Limited
design of secure cloud solutions working alongside our Enterprise and Solution Architects becoming the steward of our cloud infrastructure. • Be a leader in relation to Information Security, especially in cybersecurity and DevSecOps, providing advice and support to colleagues around the business. • Take a lead in continual delivery following an automation-first approach, including how we deploy software by designing More ❯
context Proficiency in event-driven architecture and its application in digital solutions Proven ability to collaborate closely with delivery teams to ensure successful implementation of digital solutions Certifications in cybersecurity practices (e.g. Certified Information Systems Security Professional (CISSP) or equivalent) Software development and scripting experience to build proof-of-concepts ahead of passing designs to delivery teams Strong knowledge of More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
context Proficiency in event-driven architecture and its application in digital solutions Proven ability to collaborate closely with delivery teams to ensure successful implementation of digital solutions Certifications in cybersecurity practices (e.g. Certified Information Systems Security Professional (CISSP) or equivalent) Software development and scripting experience to build proof-of-concepts ahead of passing designs to delivery teams Strong knowledge of More ❯
proficiency in managing and troubleshooting network devices and configurations, including VLANs, DNS, DHCP, and VPNs. • System administration - experience with Active Directory, Group Policy and Azure AD. • Security - familiarity with cybersecurity principles and tools, such as firewalls, antivirus and patch management. • Customer service - excellent communication and customer service skills to interact with clients and internal stakeholders in a clear, supportive manner. More ❯
Taunton, Somerset, United Kingdom Hybrid / WFH Options
Clear IT Recruitment Limited
proficiency in managing and troubleshooting network devices and configurations, including VLANs, DNS, DHCP, and VPNs. • System administration - experience with Active Directory, Group Policy and Azure AD. • Security - familiarity with cybersecurity principles and tools, such as firewalls, antivirus and patch management. • Customer service - excellent communication and customer service skills to interact with clients and internal stakeholders in a clear, supportive manner. More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Clear IT Recruitment Limited
proficiency in managing and troubleshooting network devices and configurations, including VLANs, DNS, DHCP, and VPNs. • System administration - experience with Active Directory, Group Policy and Azure AD. • Security - familiarity with cybersecurity principles and tools, such as firewalls, antivirus and patch management. • Customer service - excellent communication and customer service skills to interact with clients and internal stakeholders in a clear, supportive manner. More ❯
to interact with customers defining, producing and maintaining an optimal Solution Design based on customer needs and products capabilities. Manage involvement of other SMEs (e.g. business analysts, IT/Cybersecurity experts) and make sure their design contributions meet system architecture functional and non-functional requirements. Drive excellence in execution through continuous improvement in their segment or domain (best practices and More ❯
plans and other related benefits. Our salary ranges are determined by role, level, and location. These factors and individual capabilities will also determine the individual pay offered. DEI Statement Cybersecurity is a community effort. That's why we're committed to building an inclusive, diverse community that celebrates and welcomes everyone - unless they're a cybercriminal, of course. We're More ❯
Role The OCM Lead Consultant will serve as a key driver on complex consulting projects, delivering strategic change across areas such as ERP, data, AI, cloud, managed IT services, cybersecurity, and the digital workplace. Reporting to the UK&I OCM Director, this position plays a critical role in aligning people, processes, and technology to ensure the success of major transformation More ❯
clusters and virtualization (Nutanix, Hyper-V, VMWare).- Proven experience with Azure and Microsoft 365 administration (Azure AD and local AD, Azure virtualization, InTune, Exchange, Teams, SharePoint, OneDrive).- Cybersecurity fundamentals (virus/malware mitigation, authentication, data protection, Purdue Model).- Ensuring the integrity of enterprise Backup systems.- Network administration a strong asset (firewall configuration, routing, VLANs, VPN, high-availability More ❯
ERP) and digital twin environments. Governance & Compliance • Establish architecture governance frameworks to ensure consistency, scalability, and compliance. • Define data models, metadata standards, and content lifecycle policies. • Ensure adherence to cybersecurity, regulatory, and quality standards in aerospace. Stakeholder Engagement & Leadership • Collaborate with engineering, product, IT, and documentation teams to gather requirements and align architecture goals. • Present future state architecture vision to More ❯
Rockville, Maryland, United States Hybrid / WFH Options
ALTA IT Services
Cybersecurity Program Manager Rockville, MD - mostly remote (must come for onsite meetings twice a month) Direct Hire $225-240K plus benefits ALTA IT Services is seeking a Cybersecurity Program Manager to provide support to a client in the Maryland/Washington DC Metro area. The Cybersecurity Program Manager will serve as the senior leader responsible for overseeing the successful … execution of a comprehensive, mission-critical cybersecurity contract supporting a national-level agency in the health and scientific research sector. This executive will lead delivery of enterprise-scale cybersecurity programs and professional services, ensuring alignment with agency priorities, federal mandates, and evolving threat landscapes. As a seasoned "triple-threat," the role demands expertise in managing complex cybersecurity operations, nurturing high … Monitoring and Alert Triage, Incident Response, Digital Forensics, Malware Analysis, Vulnerability Management, Data Protection, Secure Configuration Management, Security Engineering, and Continuous Diagnostics and Mitigation (CDM). They will ensure cybersecurity workflows, staff performance, and mission outcomes are consistently optimized for effectiveness, efficiency, and innovation. Success in this role requires deep technical fluency, exceptional leadership, and the ability to drive outcomes More ❯
Minorities/Females/Disabled/Veterans employer, is an established Service-Disabled Veteran-Owned Small Business (SDVOSB) Department of Defense, government contractor with core competencies in Information Assurance, CyberSecurity and Systems Engineering. With offices on both the East and West coasts and an inviting culture, opportunity abounds for the right individual! Software/Container Security Engineer More ❯
Analyst, you will: Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed exploitation and operations plans. Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
VMware credentials Why Join Cyber Defense Technologies? At CDT, we offer a collaborative and inclusive work environment where your expertise in System Administration can help shape the future of cybersecurity and engineering solutions. You'll have the autonomy to shape the lab infrastructure while supporting critical engineering workflows in a collaborative, mission-driven environment. Compensation and Benefits: • Competitive salary based More ❯
In order to be suitable for this role you must have demonstrable hands-on expertise with monitoring and securing enterprise class technology estates. You will have proven experience with CyberSecurity best practice including the NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the UK More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Network Engineer 1 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
Albuquerque, New Mexico, United States Hybrid / WFH Options
TEKsystems c/o Allegis Group
activities, configuration, and data load work on the client site. Will relocate the right candidate. Responsibilities: - Support a government AWS cloud instance of Siemens' Teamcenter application - Work closely with Cybersecurity professionals to ensure all elements of the infrastructure and application remain hardened against cyber-attacks - Maintenance patching, and upgrades to the core Siemens Teamcenter application - Configure interfaces/integrations of More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking a Network Engineer 5 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
Hybrid working) Employment Type: Full-time, Mid-Senior level Clearance Required: Active SC Clearance (must currently hold) About the Opportunity Sanderson is working in partnership with a fast-scaling cybersecurity consultancy that’s making a real impact across both the public and private sectors. Known for their deep technical expertise and delivery excellence, they support some of the UK More ❯
Familiarity with identity and access management (IAM) concepts and tools. • Experience with encryption techniques and cryptographic protocols. • Understanding of containerization technologies like Docker and Kubernetes. • In-depth understanding of cybersecurity principles, best practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments More ❯
ability to see the bigger picture Excellent communication skills with the ability to influence multiple stakeholders Willingness to learn and adapt to new technologies coupled with a passion for cybersecurity Ability to self-motivate and define priorities to meet deadlines Good team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles More ❯
effectively to non-technical stakeholders. Qualifications: Bachelor's degree in Computer Science, Information Technology, or a related field. 4+ Years of experience in networking administration. Security+ certification or equivalent cybersecurity certification. Proven experience in Linux and Windows system administration. Strong scripting skills in Bash, Python, or PowerShell. Familiarity with virtualization technologies (VMware, Hyper-V). Knowledge of network protocols, firewalls More ❯
automation systems and software products Design Integration: Collaborate with development teams to embed security into product architecture and design Team Enablement: Provide training and guidance on secure coding and cybersecurity protocols Incident Response: Monitor and respond to security incidents related to software and automation systems Compliance: Work with external auditors and regulatory bodies to ensure adherence to security standards Research More ❯
all requirements under this Task Order. Responsibilities: • Serve as the lead technical Contractor representative and counterpart to the government. • Support the PM in delivering enterprise IT services to include Cybersecurity, NetOps, End User Support, Infrastructure Support and Applications Maintenance • Lead the implementation of strategic initiatives while bridging the gap between strategy, O&M, and project implementation. • Collaborate on cultural More ❯