Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Apacheix
administration and user experience. Expertise or interest in designing and deploying cloud-based infrastructure (Azure, AWS etc). Solid scripting capabilities using PowerShell, VB, or Bash. Good knowledge of cybersecurity best practices. Experience implementing hardware integration projects. Skills covering Problem analysis and resolution in a secure environment. Excellent verbal and written communication skills. Willingness to work out of hours on More ❯
Knowledge of application packaging tools: Chocolatey, App-V, MSIX, etc. Experience designing and delivering infrastructure solutions from the ground up Familiarity with VMware or equivalent virtualization technologies Understanding of Cybersecurity, system resilience, and security best practices Solid grasp of networking principles and protocols Contract Details: Day Rate: £600PD - £675PD Location: Green Park/Hybrid Contract-only: Yes IR35 Determination: Outside More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Leidos
Us Different: Purpose: you can use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to do your job is one More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
Us Different: Purpose: you can use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to do your job is one More ❯
Huntingdon, England, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
Us Different: Purpose: you can use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to do your job is one More ❯
Our Mission At Palo Alto Networks everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation of challenging and disrupting the way things are done, and … we're looking for innovators who are as committed to shaping the future of cybersecurity as we are. Who We Are We take our mission of protecting the digital way of life seriously. We are relentless in protecting our customers and we believe that the unique ideas of every member of our team contributes to our collective success. Our values … scaling quickly to new threats, get fulfillment from resolving new problems, and think about things just plain differently. Our Commitment We're problem solvers that take risks and challenge cybersecurity's status quo. It's simple: we can't accomplish our mission without diverse teams innovating, together. We are committed to providing reasonable accommodations for all qualified individuals with a More ❯
to a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
to a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
to a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
Newcastle Upon Tyne, Tyne And Wear, United Kingdom Hybrid / WFH Options
Capgemini
to a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
Our client, a professional services organization is currently recruiting for an Information Security Officer & CyberSecurity Lead to join their organization. The Information Security Officer & CyberSecurity Lead will have knowledge of ISO27001 & Cyber Essentials as well as hands-on technical knowledge of SIEM and incident response. Key Responsibilities for the Information Security Officer & CyberSecurity Serve as a subject … projects, client bids, and technology initiatives. Partner with the Risk & Compliance team to develop and evolve policies, procedures, and working practices to improve the firm's security posture. Manage cybersecurity tooling including SIEM, EDR, and mail filtering systems to ensure effective threat detection and response. Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams … and third-party providers. Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. Key Experience for the Information Security Officer & CyberSecurity Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). Hands-on experience with cybersecurity tools. Ability to advise non-technical stakeholders on More ❯
Brighton, East Sussex, The City of Brighton and Hove, United Kingdom
Clearwater People Solutions
Our client, a professional services organization is currently recruiting for an Information Security Officer & CyberSecurity Lead to join their organization. The Information Security Officer & CyberSecurity Lead will have knowledge of ISO27001 & Cyber Essentials as well as hands-on technical knowledge of SIEM and incident response. Key Responsibilities for the Information Security Officer & CyberSecurity Serve as a subject … projects, client bids, and technology initiatives. Partner with the Risk & Compliance team to develop and evolve policies, procedures, and working practices to improve the firm's security posture. Manage cybersecurity tooling including SIEM, EDR, and mail filtering systems to ensure effective threat detection and response. Monitor, investigate, and respond to alerts and incidents, coordinating with internal teams … and third-party providers. Maintain the internal compliance programme for information security and data protection, including ISO27001, GDPR and Cyber Essentials requirements. Key Experience for the Information Security Officer & CyberSecurity Strong understanding of information security principles, risk management, and compliance (ISO 27001, GDPR, Cyber Essentials). Hands-on experience with cybersecurity tools. Ability to advise non-technical stakeholders on More ❯
We're Hiring: Data CyberSecurity Consultant (SIEM Analyst) Location: Belgium (Hybrid - 1 day/week on-site) Start Date: ASAP Sector: Cybersecurity/SOC/Incident Response Are you passionate about cybersecurity and driven by data? We're looking for a Data CyberSecurity Consultant to join a dynamic and centralized CyberSecurity Incident Response Team (CSIRT) supporting critical More ❯
in securing our nation’s infrastructure. You’ll be at the forefront of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability … the maintenance and development of the OT Security Operations Centre technology stack. Deliver technical assurance across the OT security ecosystem. Essential Skills & Experience: Strong understanding of OT/ICS cybersecurity or relevant control systems (SCADA/PLC) – training provided where required. Experience with network security, threat detection, and incident response. Knowledge of security frameworks and regulations including NIST, IEC, NIS More ❯
Position Title: Cyber Engineer Location: Patuxent River, MD Clearance: Active Top Secret (Required) Salary Range: $115,000-$150,000 About the Role: Are you eager to contribute to cybersecurity efforts that protect national security in a dynamic and mission-critical environment? As a Cyber Engineer, you will work on developing and implementing advanced cyber defense technologies, securing sensitive systems, and … supporting risk management processes. You will ensure compliance with cybersecurity frameworks, lead cyber testing initiatives, and contribute to obtaining and maintaining Authority to Operate (ATO) within secure systems. What You'll Do: • Cyber Artifacts Management: Manage and assess cyber artifacts to ensure proper documentation and readiness for cyber assessments. • Cyber Testing: Develop, execute, and analyze cyber testing efforts including penetration … tests, vulnerability assessments, and cybersecurity audits. • Risk Management Framework (RMF) Implementation: Guide and support the implementation of the RMF process, including categorizing information systems, selecting security controls, and managing security control assessments. • STIG Compliance: Ensure systems are compliant with Security Technical Implementation Guides (STIGs) and maintain up-to-date security configurations. • Obtain ATO: Coordinate efforts across teams to prepare systems More ❯
TMC Technologies is in search of a senior level Cybersecurity Analyst to join the FBI's ESOC Cyber Threat Intelligence (CTI) Team. TheCTI Teamis responsible for monitoring and analyzing external cyber threat data to provide insights and actionable intelligence about potential cyber threats. The candidate must be a US citizen and possess a minimum of an active Top Secret clearance … eligibility to start due to federal contract requirements. This position is in support of a newly awarded contract with an expected start date in mid-July 2025. The CTI Cybersecurity Analyst - Senior will have the following responsibilities: - Responsible for monitoring computer networks for security issues. - Investigating security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they More ❯
Title: Cloud Cyber Defense Analyst Client: U.S. Army Location: Fort Belvoir, VA Responsibilities: • Primarily responsible for finding vulnerabilities, delivering analyses, crafting mitigations, developing cybersecurity products, and educating our customers to prevent and eradicate the cyber threats to U.S. Army's own cloud information systems and networks assets. • Applies technical expertise to provide computer network defense capabilities, continuous monitoring, technical analysis … data in the Army. • Applies knowledge of DoD and Joint Service computer network and communications regulations, services, and instructions to ensure computer systems and telecommunications services comply with applicable cybersecurity regulations and instructions. • Monitors cloud systems for potential security breaches • Conducts risk assessments and vulnerability testing Minimum Qualifications: • Five years of experience performing CND or a master's degree in More ❯
/SDN devices Research and propose modeling for features like ACLs, VRF, VPNs, NAT, and routing Collaborate with developers to implement network device plugins Provide Tier 3 support for cybersecurity systems and applications Perform system admin tasks: install, configure, patch, and backup Assist with A&A processes and compliance documentation Qualifications of the Cyber Network Engineer: • 5+ years of related … of Windows/Linux systems • Experience with TCP/IP, OS security practices, and cloud platforms (especially AWS) Must hold or obtain IAT Level II+ certification Understanding of federal cybersecurity frameworks (e.g., NIST RMF, ISCM) Experience with programming languages like Python, Go, Java, JavaScript, Node.js Experience with RedSeal, Forward Networks, and other cybersecurity tools (SIEM) Bachelor's Degree in related More ❯
have an active DoD SECRET security clearance and must be able to maintain one. Ability to work independently in a fast-paced environment with competing priorities. Technical IT and cybersecurity background. Excellent written skills since the validator develops and/or updates written system authorization supporting artifacts Excellent verbal skills since the validator works directly with the program offices … procedures and/or NIST 800-53, DoDI 8500.01, and DoDI 8510.01. A high school degree, or a GED, and more than twenty (20) years of relevant experience in cybersecurity, information system management, software development, design or authorization OR A bachelor's degree in a relevant field and fifteen (15) years of relevant experience in cybersecurity, information system … management, software development, design or authorization OR A master's degree in a relevant field and ten (10) years of relevant experience in cybersecurity, information system management, software development, design or authorization. At least one or more of the following is preferred: o A+ o Sec+ o CAP o IAM o CISSP o CEH Desired: Certification: DoD 8570 (IAT More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of CyberSecurity and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and … metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description The Cyber Trainer provides support to the customer in the area of Cybersecurity policy, process, and tool training. Daily tasks include, but are not limited to: Works with the training team to provide IA training as directed by the Government Coordinates and facilitates training session planning … DAOR) Desired: Bachelors of Science Degree in Science, Technology, Engineering or Mathematics (STEM) or an advanced IA certification (i.e. CISSP or CASP) Experience supporting IC or DoD in the CyberSecurity Domain with acquisition and project management Experience with Service Now, and Splunk Cloud experience (certification preferred) Travel Security Clearance Top Secret/SCI/CI Poly More ❯
your career as a Cybersecurity Engineer III at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cybersecurity at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow. At GDIT, people are our differentiator. As a Cybersecurity Engineer … of physical and software components. May supervise other engineers or technicians on assigned work. WHAT YOU'LL NEED TO SUCCEED Education: Bachelor of Arts/Bachelor of Science in CyberSecurity, Information Technology, Computer Science, or a related field. Degree may be substituted for by 4 years of additional experience in related field. Required Experience: With Degree: 5+ years of … experience in cybersecurity or related field required; 7+ years preferred. Without Degree: 9+ years of experience in cybersecurity or related field required; 11+ years preferred. Required Technical Skills: Splunk Enterprise, Security, SOAR, UBA, AA, ARI, SOC, ITSI, and/or AD Implementation and maintenance of Splunk infrastructure specifically in an multi-tenancy architecture. Interoperability and maintenance of Splunk More ❯
TMC Technologies is in search of a mid-level Cybersecurity Analyst to join the FBI's ESOC Watch Floor Operations Team, playing a crucial role in the FBI's cybersecurity defense strategy. Operating around the clock, 24/7, 365 days a year, this dynamic team ensures the timely detection and resolution of potential security incidents, thereby minimizing the impact … of cyber threats on the organization. The watch floor team is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats. The candidate must be a US citizen and possess a minimum of an active Top Secret clearance with Sensitive Compartmented Information (SCI) eligibility to start due to federal contract requirements. This position is in … support of a newly awarded contract with an expected start date in mid-July 2025. The Watch Floor Cybersecurity Analyst - Mid will have the following responsibilities: - Responsible for monitoring computer networks for security issues. - Investigating security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover More ❯
TMC Technologies is in search of a junior level Cybersecurity Analyst to join the FBI's ESOC Watch Floor Operations Team, playing a crucial role in the FBI's cybersecurity defense strategy. Operating around the clock, 24/7, 365 days a year, this dynamic team ensures the timely detection and resolution of potential security incidents, thereby minimizing the impact … of cyber threats on the organization. The watch floor team is responsible for actively detecting, monitoring, preventing, and analyzing real-time cybersecurity information, events, and threats. The candidate must be a US citizen and possess a minimum of an active Top Secret clearance with Sensitive Compartmented Information (SCI) eligibility to start due to federal contract requirements. This position is in … support of a newly awarded contract with an expected start date in mid-July 2025. The Watch Floor Cybersecurity Analyst - Jr will have the following responsibilities: - Responsible for monitoring computer networks for security issues. - Investigating security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
ECS Resource Group Ltd
Cybersecurity Infrastructure Engineer Location: Milton Keynes or Birmingham (Hybrid Working) Role: Permanent Salary: Competitive based on experience An exciting opportunity has arisen to join one of the UK's leading electrical and digital infrastructure distribution groups, supporting their internal IT operations as a Cybersecurity Infrastructure Engineer. Working as part of a wider IT team, you will be responsible for designing … to protect systems against cyber threats. Assist in planning and deploying group-wide security initiatives. Respond to and coordinate actions for security incidents raised by local IT, the Group CyberSecurity Team, and the Security Operations Centre (SOC). Identify and mitigate vulnerabilities, including those related to physical security. Maintain and enhance the security posture of servers for both existing … Security Steering Group and other relevant group-level meetings. Maintain and report on security-related items within the risk register. To Be Considered for This Role, You Will Need: Cybersecurity Experience: Demonstrated experience in implementing and managing security controls across hybrid environments. Familiarity with endpoint protection, threat detection, and vulnerability management tools. Incident Response & Problem Solving: Ability to respond swiftly More ❯
Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. This role focuses on executing cyber threat emulation (CTE) and supporting Defensive Cyber Operations (DCO) and CyberSecurity Service Provider (CSSP) tasks, while also contributing to cybersecurity training, incident response, and enterprise-wide cyber risk assessments. Key Responsibilities: The candidate will: Perform Defensive Cyber Operations (DCO)/… CyberSecurity Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM). Perform cybersecurity duties on customer networks (proactively and reactively) to improve enterprise-wide security posture. Analyze correlated assets, threat, and vulnerability data against known adversary exploits and techniques to determine impact and improve network defensive posture. Support the development, establishment, review and update of DCO procedures, processes … of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration test in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year experience in management or leadership in a team More ❯