Marathon TS is looking for a Cybersecurity Analyst to support our efforts at DISA. Key Responsibilities: Detection/Monitoring : Continuously monitor and analyze systems for unusual activity and potential threats. Vulnerability Assessments : Conduct regular vulnerability assessments and penetration testing to identify and address security weaknesses. Incident Response : Investigate security breaches and other cybersecurity incidents, providing timely and effective responses. Security … enhance security protocols and ensure compliance with industry standards. Reporting : Prepare detailed reports on security incidents, mitigation strategies, and overall security posture. Threat Intelligence : Stay updated on the latest cybersecurity trends, threats, and technologies to proactively address potential risks. Minimum Requirements: Candidates must have an active Top Secret/SCI clearance. Bachelor's degree in Computer Science, Information Technology, Cybersecurity … or a related field. 4 years of relevant work experience may be considered in lieu of the degree requirement. 8 years of experience in cybersecurity or a related field. 2 years of experience displaying proficiency in network security technologies and tools. 2 years of experience displaying strong knowledge of operating systems (e.g., Windows, Linux). Strong knowledge of cybersecurity principles More ❯
and help solve IT issues. We bring the innovation, passion, and agility of the commercial sector to meet the unique challenges of this competitive space. Karthik Consulting is seeking Cybersecurity Specialist with the below skillset. Cybersecurity Specialist Fulltime with Karthik Consulting Location: National Capital Region (Local Area telework 1 or 2 days in the office) Clearance: TS/SCI Clearance … Position Description Cybersecurity Specialist Purpose: The Air Force ISR Digital Infrastructure Transformation paves the way for intelligence analysts to securely harness the latest technological advancements. It is orchestrated through Data and Analytics, Sense Making/Automation, Augmentation and AI (AAA), Networks, Hybrid and Multi-Cloud, Enterprise Services, and cybersecurity capabilities. This structure allows integration, synchronization, and coordination with the Intelligence … larger ISR Digital Transformation Strategy encompassing all aspects of the ISR enterprise. Scope: A qualified candidate will deliver professional management, system analysis, and technical assistance support services for daily cybersecurity and zero trust operations at Headquarters, Air Force (HAF). This includes, but is not limited to, activities related to governance, strategic planning, enterprise architecture, capability portfolio management, solutions analysis More ❯
include installation, configuration, maintenance, patching, and back- up/restore. • Provides Tier 2/3 maintenance and engineering support for deployed technologies. • Supports Assessment and Authorization activities related to cybersecurity technologies, where applicable. • Identifies potential conflicts with implementation of any cybersecurity tools within the enterprise and develops recommendations to remediate these conflicts. • Provides ideas for automating repetitive project tasks and … tasking skills with attention to detail. • Must have or be willing to obtain IAT Level II or higher certification within 6 months of hire. Preferred Qualifications: • Understanding of federal CyberSecurity Guidance such as NIST SP 800-37 - Guide for Applying the Risk Management Framework (RMF) to Federal Information Systems and NIST 800-137 - Information Security Continuous Monitoring (ISCM) for More ❯
FinTech seeking a highly motivated and technically capable DevSecO View job & apply SOC Manager Location: Fully Remote Job type: Contract Position Overview: Rapidly growing FinTech company seeking an accomplished Cybersecurity Operations View job & apply Location: Greater London Job type: Permanent Financial Service firm seeks an Incident Response Manager to join their CIRT team. This role plays View job & apply Location … governance and access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement CyberSecurity Vulnerability Management Analyst CyberSecurity Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading tools More ❯
Description We are looking for a Lead CyberSecurity Engineer - Threat Simulation to be an integral part of our Offensive Security organization and contribute towards improving CME Group's security posture. This role will be responsible for participating in the execution of Red Team cyber exercises of internal and internet facing information systems and infrastructure to identify misconfigurations and cyber … to help the Blue Team improve their detection capabilities. This is a perfect opportunity for the right person to become a key part of a team of highly skilled cybersecurity professionals who execute a pivotal role in protecting and defending national critical infrastructure. Principal Responsibilities Lead red team exercises against a hybrid environment using threat intelligence and the MITRE ATT … industry certifications such as, but not limited to, GPEN, GXPN, GREM, eCPTX, eCPPT, OSCP, OSWE, CISSP, CPSA, CRT, etc. Knowledgeable in Industry Security standards (i.e.: TIBER-EU, CBEST, NIST CyberSecurity Framework, ISO27002, etc.). Knowledgeable in Agile project management. Company Benefits Bonus Programme Equity Programme Employee Stock Purchase Plan (ESPP) Private Medical and Dental coverage Mental Health Benefit Programme More ❯
Your Profile. Experience: 3-5 years of hands-on experience in an information security role, with 3 years of experience in NIS 2 & ISO27001. Technical Expertise: Strong understanding of cybersecurity concepts, network security protocols, cloud security principles, and common attack vectors. Certifications (Strongly Preferred): Relevant certifications such as CompTIA Security+, CySA+, CEH, or equivalent. ISO 27001 Lead Implementer/Auditor More ❯
in computer science/information technology, or other related degree fields (master's degree is preferred or at least 10 years of related experience) At least 10+ years of cybersecurity experience including a senior technical or management role, project or program management experience At least 1 IAT/IAM or equivalent security certifications ex. CISSP, CCSP, CISM, CISA, or CASP … Experience working with OSD leadership or Military component or branch Expert understanding of NIST 800 series guidelines, DoDI 8500.01, DoD 8140.03, rISO 27001, COBIT, DoD RMF, OVL, and current cybersecurity best practices Excellent communication/presentation skills briefing senior military and government civilian leadership Experienced with writing policies, guides, procedures Experience in hands on with eMASS, Xacta and/or More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
Senior CyberSecurity Engineer opportunity working within an established fintech firm in Liverpool Attractive benefits package Up to £60,000 per annum depending on experience Full Time - Permanent role - Hybrid working available Sector: Finance Benefits Competitive Salary - £55,000 - £60,000 per annum Generous Annual Leave Paid Sick days Company Pension A comprehensive in-house training Continued training and development … Friendly and supportive working culture About the Role: Lead on technical cybersecurity initiatives within the Security Operations team Ensure the implementation of robust security controls and best practices Provide specialist security support to IT teams, including infrastructure, development, and database teams Work with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS … cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerability management, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cybersecurity role Strong knowledge of security frameworks (NIST, NCSC, CIS, MITRE ATT&CK) Hands-on experience with security tools: SIEM, IDS/IPS, firewalls, endpoint protection Expertise in Azure securityMore ❯
information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cybersecurity domain. Equivalent Education and/or Experience May have an equivalent combination of education and experience to substitute for both the education and the experience requirements. Certification/Registration … to consume threat feeds and track adversaries. 4. Develop alerting and detection strategies to investigate any unusual behavior. 5. Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties. 6. Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and More ❯
information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cybersecurity domain. Equivalent Education and/or Experience May have an equivalent combination of education and experience to substitute for both the education and the experience requirements. Certification/Registration … to consume threat feeds and track adversaries. 4. Develop alerting and detection strategies to investigate any unusual behavior. 5. Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties. 6. Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and More ❯
information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cybersecurity domain. Equivalent Education and/or Experience May have an equivalent combination of education and experience to substitute for both the education and the experience requirements. Certification/Registration … to consume threat feeds and track adversaries. 4. Develop alerting and detection strategies to investigate any unusual behavior. 5. Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties. 6. Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and More ❯
information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cybersecurity domain. Equivalent Education and/or Experience May have an equivalent combination of education and experience to substitute for both the education and the experience requirements. Certification/Registration … to consume threat feeds and track adversaries. 4. Develop alerting and detection strategies to investigate any unusual behavior. 5. Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties. 6. Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and More ❯
information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cybersecurity domain. Equivalent Education and/or Experience May have an equivalent combination of education and experience to substitute for both the education and the experience requirements. Certification/Registration … to consume threat feeds and track adversaries. 4. Develop alerting and detection strategies to investigate any unusual behavior. 5. Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties. 6. Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and More ❯
information systems security domain with a background in mobile device security, endpoint protection, wireless protection, vulnerability management, incident response and mitigation, threat research and cyber intelligence analysis or other cybersecurity domain. Equivalent Education and/or Experience May have an equivalent combination of education and experience to substitute for both the education and the experience requirements. Certification/Registration … to consume threat feeds and track adversaries. 4. Develop alerting and detection strategies to investigate any unusual behavior. 5. Conduct various network security scans and penetration tests to detect cybersecurity threats and identify weaknesses that may be exploited by malicious parties. 6. Solely performs implementation analysis and technical risk assessments on systems to ensure conformity to current security standards and More ❯
client to either increase efficiency, effectiveness, or innovation. •Master position tasks within 60 days and exceed requirements within 90 days. Responsibilities: The Sr. Information Systems Security Officer (ISSO) supports cybersecurity and Information Assurance (IA) related processes for the Secretary of the Air Force - Security, Special Program Oversight, and Information Protection Directorate (SAF/AAZ), to include support to the AAZ … ISSM). Per sections 1.3.4.1 and 1.3.9.1, specific responsibilities and tasks include but are not limited to: Specific responsibilities include but are not limited to: •Assist with coordination of cybersecurity related processes and activities for AAZ Information Systems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life … Processes (e.g. Engineering Change and Configuration Management), Vulnerability Management, Malware Protection, Security Assessments/Evaluations/Reviews, Continuous Monitoring, Department of Defense Informaton Network (DODIN) Connection Approval Process, and Cybersecurity Service Provider (CSSP). •Coordinate, oversee, and track DoD IT systems network establishment used within SAF/AAZ, procurement, installation, and maintenance at several office locations within the NCR. This More ❯
CyberSecurity Consultant Location: Remote in the United Kingdom Purpose, objectives, and requirements of the role: BlueVoyant CyberSecurity Consultants work within the Professional Services team advising, supporting, and managing clients with multiple activities, including but not limited to: Technical & organizational security controls Cyber and digital transformation activities Remediation workstreams and roadmaps Policy & process implementation Information Security Maturity Audits/… their behalf. Consultants must be proactive, and able to lead, manage, and problem-solve on multiple workstreams across varied client sectors by contributing to, managing, overseeing, or supporting complex cyber-security and technology transformation programs, with limited oversight. There is a base requirement to demonstrate understanding of and find ways to integrate activity with BlueVoyant colleagues across the globe, specifically … wider BlueVoyant service offerings when appropriate, to produce threat-aware products, services and outputs that are impactful, efficient, cohesive, and are enhanced with intelligence and automation. BlueVoyant are trusted cyber-security partners and advisors to some of the most high-profile organizations, entities, and governments in the world. Deep and wide-ranging expertise & experience, credibility, and quick understanding of key More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
Job summary Join our dynamic Digital, Data and Technology (DDaT) team at NHSBSA as a CyberSecurity Operations Team Lead. You'll lead a team of specialists, manage security operations, and support various projects and initiatives. Your role involves ensuring compliance with security standards, managing incidents, and collaborating with internal and external stakeholders. Key Responsibilities : Lead and manage the Cyber … team leadership experience.Strong knowledge of security technologies (firewalls, IDS/IPS, SIEM).Relevant qualifications (CISSP, CISM, etc.). Apply now to make a significant impact on NHS BSA's cybersecurity strategy! What do we offer ?o 27 days leave (increasing with length of service) plus 8 bank holidayso Flexible working (we are happy to discuss options such as compressed … resource for advice. Efficiently manage the workload of personnel, ensuring timely completion of tasks and continuous improvement. Ensure continued compliance with NCSC, DHSC Cyber Assessment Framework, and HM Government Cybersecurity strategy. Develop, maintain, and promote security procedures and standards in line with NHSBSA requirements. Implement, monitor, and report on agreed service levels, KPIs, and standards within security operations. Oversee More ❯
Lead Security Engineer Department: Cybersecurity Location: Washington, DC - Onsite Role Type: Contract Clearance: Public Trust About Our Client Our client supports the cybersecurity mission of a major government agency responsible for managing and maintaining United States critical infrastructure including highways, bridges, roads, and airports. The cybersecurity team is dedicated to collaborating, cooperating, and facilitating the maintenance and enhancement of the … security posture of government information systems and underlying infrastructure that support critical national operations. Job Description As a Lead Security Engineer, you will assist the government agency's cybersecurity mission by supporting the implementation of IPv6 networking capabilities. You will join a dedicated team of cybersecurity professionals focused on maintaining and enhancing the security posture of critical information systems and … standards, and procedures to ensure compliance with industry's best practices and regulatory requirements. • Maintain detailed documentation of IPv6 network security configurations, incident reports, and security procedures. • Work IPv6 cybersecurity related security operations ITSM (ServiceNow) assigned tickets to completion. • Participate in relevant Cybersecurity and Security Operations (SecOps) meetings. • Collaborate on and provide feedback on cybersecurity solutions that enhance the agency More ❯
security and compliance of all technical assets across the department. The Senior Security Engineer will work closely with various stakeholders, both internal and external, to implement best practices for cybersecurity, IT risk management, and ensure the department's alignment with federal cybersecurity regulations and frameworks. This position is on-site in Washington D.C. The position is contingent on the award. … to deliver cutting edge solutions from small mobile applications to large, complex enterprise applications. Our professionals specialize in multiple disciplines including program management, system integration, system design, system development, cybersecurity, infrastructure and data analytics. Responsibilities: Support the client in the development and oversight of cybersecurity governance across all applicable programs. Provide cybersecurity engineering subject matter expertise to client staff. Participate … review boards and program planning sessions, contributing to enterprise architecture decisions and security control implementation. Develop and deliver technical guidance via PowerPoint presentations, formal documentation, and written communications on cybersecurity capabilities, vulnerabilities, risks, and mitigation strategies. Engineer, configure, and sustain the Continuous Diagnostics and Mitigation (CDM) and Zero Trust Architecture (ZTA) toolsets, to include Tenable Nessus, HCL BigFix, SailPoint, Okta More ❯
Position Summary: As an Information Security Systems Officer (ISSO) supporting Kitty Hawk Technologies Department of Defense (DoD) contracts, you will be responsible for maintaining the cybersecurity posture of classified and unclassified information systems. You will ensure compliance with DoD cybersecurity policies and standards, including the Risk Management Framework (RMF), NIST Special Publications, and DoD Instructions (e.g., DoDI 8500.01 and 8510.01 … Ensure proper handling, marking, and safeguarding of Controlled Unclassified Information (CUI) and classified information. • Support Continuous Monitoring (ConMon) activities and system patching initiatives. Required Qualifications: • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related discipline. • 3+ years of experience in DoD cybersecurity, including RMF and NIST 800-53 compliance. • Active DoD Secret security clearance or higher. • Familiarity with … communication skills to interface with government customers, engineers, and auditors. • Ability to manage multiple priorities and deadlines in a high-security environment. • Team player with a proactive attitude toward cybersecurity risk management. Work Environment and Additional Requirements: • On-site support is required. • Must be a U.S. Citizen due to DoD contract requirements. Equal Opportunity Statement: Kitty Hawk Technologies is an More ❯
in computer science/information technology, or other related degree fields (master's degree is preferred or at least 10 years of related experience) At least 10+ years of cybersecurity experience including a senior technical or management role, project or program management experience At least 1 IAT/IAM or equivalent security certifications ex. CISSP, CCSP, CISM, CISA, or CASP … Experience working with OSD leadership or military component or branch Expert understanding of NIST 800 series guidelines, DoDI 8500.01, DoD 8140.03, rISO 27001, COBIT, DoD RMF, OVL, and current cybersecurity best practices Excellent communication/presentation skills briefing senior military and government civilian leadership Experienced with writing policies, guides, procedures Experience in hands on with eMASS, Xacta and/or More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
to partner with cross-functional teams and stakeholders. One or more of the following certifications are desired: Certified Cloud Security Professional (CCSP) , GIAC Security Essentials Certification (GSEC), or CompTIA Cybersecurity Analyst (CySA+) Preferred Qualifications: Familiarity with Apache Spark or comparable distributed data processing frameworks, preferably for large-scale data transformations and analytics. Working knowledge of data governance platforms (e.g., Collibra More ❯
for security operations, using and managing security systems, identifying and managing risks and threats, and developing and following operating procedures. The ideal candidate will have a deep understanding of cybersecurity risks and threats, incident handling, and will possess excellent analytical, communication, and leadership skills. About the Opportunity The role of Information Security Engineer will be responsible for identifying, investigating … for security operations, using and managing security systems, identifying and managing risks and threats, and developing and following operating procedures. The ideal candidate will have a deep understanding of cybersecurity risks and threats, incident handling, and will possess excellent analytical, communication, and leadership skills. Responsibilities Strong collaboration, teamwork and relationship building skills across multiple levels and functions in the … SIEM solution. Strong knowledge in Security Cloud support for AWS, OCI, and Azure. Develop and maintain incident response playbooks and procedures. Candidate Profile Bachelor's degree in Computer Science, CyberSecurity, or a related field At least 3-5 years of experience in cybersecurity operations or a related field 3- 5 years Experience working in a security operations center More ❯
Senior IT Engineer (Cybersecurity) Added 24/4/2025 We are currently seeking an experienced Senior IT Engineer (Cybersecurity). Job Type: Full Time/Permanent Competitive Salary: £40,000 to £45,000 per annum - dependent on experience Location: Head Office, Coventry Road, Exhall, Coventry, CV7 9FT As a Senior IT Engineer with a strong emphasis on Cybersecurity, you … will work closely with the Group IT support Engineers, provide expert guidance on complex IT and security issues, and be a key player in ensuring the organisation's overall cybersecurity posture remains strong. You will also be involved in proactive security measures, incident response, and disaster recovery planning. This role is office-based at our Coventry site, with travel to … short notice. Occasional on-call support for urgent issues is also expected. This position is crucial for ensuring the robustness, efficiency, and security of the organisation's IT and cybersecurity systems, protecting sensitive data and fostering a security-conscious culture. Responsibilities Provide expert-level support for escalated IT issues from first-line Engineers, ensuring timely resolution. Troubleshoot hardware, software, and More ❯
days in the office and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of the team supporting the IT & CyberSecurity Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in … Understanding of cloud technologies such as Azure/Amazon Web Services and Oracle Cloud Infra is essential. Key Skills/Experience: Essential: Bachelor’s degree, preferably in Computer Science, CyberSecurity or CyberSecurity Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM/CISSP More ❯