Livingston, West Lothian, Scotland, United Kingdom
FPSG Connect
FPSG have some urgent permanent, SC Cleared opportunities to present on behalf of our Client, who are hiring for CyberSecurity Analysts for roles which provide a 24/7 shift pattern cover for their customers. A generous shift allowance is paid on top of the basic salary, making up a very good reward package and path to DV Cleared … for sole British Citizens, who do not hold Dual-Nationality. i.e. You must ONLY hold British Citizenship to be suitable for the nature of this requirement. The Tier 2 CyberSecurity Analyst role will involve you being responsible for advancing the initial work conducted by Tier 1 Analysts and providing more in-depth analysis of potential threats to the organization. … and knowledge-sharing activities, providing feedback on areas for growth and contributing to a supportive learning environment within the SOC. Knowledge and Skills required to be a Tier 2 CyberSecurity Analyst: * Understands advanced networking concepts, including IP addressing, basic network protocols, and how traffic flows within a network. * Advanced knowledge of Windows and Linux operating environments, including standard commands More ❯
we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking a Cybersecurity Engineer 6 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates … process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide system security engineering services and/or products to ensure secure reliable and uninterrupted availability of the Sponsor's developed and deployed systems and networks. Provide core security … Citizenship, for access to classified information; ACTIVE TS/SCI w/POLY REQUIRED Education: 9+ Years of Experience with a Master's Degree in Information Technology, Risk Management, Cybersecurity 12+ Years of Experience with a Bachelor's Degree in Information Technology, Risk Management, Cybersecurity 15+ Years of Experience with an Associate's Degree in Information Technology, Risk Management, CybersecurityMore ❯
As a Cybersecurity Analyst/Information Systems Security Officer (ISSO), you will assess and strengthen a Army's security posture by conducting STIG-based configuration reviews and leveraging ACAS and SCAP vulnerability scans on new or modified systems. You will apply cybersecurity engineering principles-aligned with NIST/RMF-to evaluate system requirements, define hardware and software security characteristics, and … Equivalent 6-9 years of experience Professional Certification (Preferred): GSLC, CISM, or CISA certification. IAT Level I or IAT Level II Working experience and knowledge of Army/DoD Cybersecurity (CS) policies and requirements. Ability to assess project security posture from artifacts pertaining to, but not limited to VoIP, Video and Voice transmission; underlying OS Windows, Red Hat Enterprise Linux More ❯
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity More ❯
most daunting challenges facing our customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview About The Role Peraton is hiring a Cybersecurity Engineer to support work in Huntsville, AL. The contractor will be expected to work with the government customer Program Management Office, Aircraft Survivability Equipment. What you'll do: Creation and More ❯
Cybersecurity Implementation Engineer Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: None Type of Travel: None The Opportunity: CACI is the winner of a long-term contract with the National Geospatial-Intelligence Agency (NGA) for Transport & Cybersecurity Services (TCS) contract. The functional capabilities are to provide … IT) infrastructure services required to deliver timely, relevant, and accurate support of national security. TCS will provide innovative design, engineering, procurement, implementation, operations, sustainment, and disposal of transport and cybersecurity IT services on multiple networks and security domains, at multiple locations worldwide to support the NGA mission. Responsibilities : Build, deploy, configure, and maintain on-premises and cloud-based cybersecurity infrastructure … and applications running on Windows and Linux operating systems Engineer and implement cybersecurity solutions leveraging cloud services such as EC2, EBS, ELB, S3, and RDS. Provision AMIs, perform software installations, troubleshooting and maintenance. Assist with research and implementation of enterprise-wide cybersecurity solutions/capabilities/enhancements to support customer business/mission goals and objectives. Evaluate and recommend changes More ❯
as the overall integrator in a Cloud Environment. The selected candidate will be responsible for providing Joint Intelligence Community Government project leads with the planning, organizing and management of cybersecurity implementation on systems related to satellite ground processing capabilities. Responsibilities: Overall support and oversight of an Information Assurance project/program Integration, Development, Coordination and Implementation of Information Assurance More ❯
adequately addressed in all aspects of enterprise architecture, including reference models, segment and cloud solution architectures, and the resulting systems supporting those missions and business processes. Serves as a cybersecurity SME for cybersecurity architecture policies and procedures. Provides cybersecurity management support to Program Management Offices for emerging information systems through the acquisition lifecycle and, where applicable, into sustainment. Provides technical … support and guidance to facilitate the identification and integration of cybersecurity controls at the onset of the acquisition lifecycle for emerging cloud capabilities. Serves as a principal liaison for enterprise-level boundary defense initiatives to ensure consistent and sufficient identification and implementation of applicable cybersecurity controls in concert with the agency cybersecurity and cloud architecture and NIST security guidelines. Provides … oversight for the design and implementation of enterprise-level cybersecurity solutions providing standards for access control capabilities across the enterprise. Develops technical solutions to complex problems. Minimum Qualifications: Knowledge of cloud-native software development. Expertise of how to conduct cloud operations in AWS or Azure. Formal general security certification (e.g., CompTIA Security, Cloud Security Alliance - Certificate of Cloud Security Knowledge More ❯
Evolver Federal is seeking a ServiceNow Cybersecurity Risk Management Analyst experience to support its Federal client in Springfield, VA in building and maintaining workflows and supporting its business processes using ServiceNow and lead the automation of workflows supporting cybersecurity governance, risk, and compliance processes. The Analyst will also support the client in processing FISMA inventory change requests using ServiceNow and … identify process improvements to help drive further efficiencies. The successful candidate will possess general knowledge of cybersecurity and have previous experience developing solutions within the ServiceNow platform including workflows, implementing business rules/logic, developing scheduled jobs and developing and running scripts. Responsibilities Applying knowledge of cybersecurity, design and implement workflows, business rules, scheduled Jobs, and scripts. Lead automation of More ❯
assessments of the existing technology landscape to identify any gaps that may exist and provide recommendations on remediation. Ensure proposed solutions are compliant with the UKPN Architecture principles and Cybersecurity standards. Evaluate and recommend technology solutions that align with UKPN strategic goals and roadmap. Develop and maintain technical documentation, including architecture diagrams and specifications. Collaborate with partners, scrum masters … the capability to lead with vision to achieve this objective and create long-term value. Knowledge of the Cloud, Digital front end, back-end applications and Middleware Knowledge of Cyber-security architecture, System Integration, Access and Identity management Expertise in complex systems integration and Data architecture and analytics Expertise of API standards and protocols for building and integrating complex systems … repository. Expertise of API standards and protocols for building and integrating complex systems and architecture. Knowledge of the Cloud, Digital front end, back-end applications and Middleware. Knowledge of Cyber-security architecture, System Integration, Access and Identity management. Experience developing, syndicating and communicating architectures, designs and proposals for action. Experience working with business solution vendors, technology vendors and products within More ❯
Position Title : Information Systems Security Officer (ISSO)/Information Systems Security Manager (ISSM) Location : Arlington, VA (Remote) Clearance Level : Secret Responsibilities will include, but are not limited to : Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff (CoS) application's security posture … in accordance with the Risk Management Framework (RMF). Ensure cybersecurity is integrated in all phases of the lifecycle sustainment and proactively support the Government's efforts to maintain, update and continuously monitor Chief of Staff (CoS) application's security posture, in accordance with the Risk Management Framework (RMF). Identify and mitigate code vulnerabilities as measured by government provided More ❯
Paradyme is seeking experienced Cybersecurity Analyst with EVAP experience for upcoming projects in support of major federal law enforcement and intelligence customers. The people in these positions will work in secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV. A current TOP SECRET clearance is required to be considered. We are seeking a Mid-level Cybersecurity Analyst - Enterprise … ensure accuracy and effectiveness Continue to stay current with emerging tools, technologies, and threat landscapes to refine methodologies Use Standard Operation Procedures (SOP) to ensure tasks are performed within Cybersecurity policies Operational Oversight Performs daily operations of EVAP allowing EVAP, Red and Blue Teams to perform timely and effective vulnerability assessments Provide hands-on support for complex scans, troubleshooting, and … strategies Ensure assessments cover diverse technologies including operating systems, databases, applications, and network devices Collaboration and Cross-Team Coordination Assist with providing technical support during incident response efforts and Cybersecurity exercises Ensures scans, reports and environment are set up and run according to the Master Schedule to meet deadlines and objectives Assist with the coordination with Red, Blue, and SOC More ❯
Piper Companies is seeking an experienced Information Security Engineer to take a holistic, system-of-systems approach to enhancing and aligning cybersecurity, information assurance, and information management efforts across PEO C3N. T his role is fully onsite located in Aberdeen, Maryland . Requirements of the Information Security Engineer: Cybersecurity Engineering Development and System Support: Deliver systems engineering and analytical support … AR 25-2 and related Department of the Army guidance to maintain the security and reliability of Mission Command and Communications systems. Conduct specialized C5ISR engineering assessments focused on cybersecurity integration, providing expert advice to government stakeholders on technical risks that could impact digital force objectives. Support may include engineering and development for communications security, as well as contributions to … Qualifications of the Information Security Engineer: 10+ years of experience in TCP/IP networking, information security, and managing security for Windows and Linux environments. Strong understanding of government cybersecurity policies and familiarity with tools such as endpoint protection, SIEM systems, PKI, and auditing technologies used in DoD networks. Proven ability to conduct security engineering assessments across various systems and More ❯
/CD pipelines. Utilize tools such as PRTG for network monitoring and performance management. Document security policies, procedures, and incident reports for compliance purposes. Stay updated on the latest cybersecurity trends, threats, and technologies. Requirements Active Secret Clearance Bachelors Degree with 5 years experience 2+ years experience in cybersecurity or information assurance in a DoD environment Active CISSP or similar More ❯
TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: If you are looking for a position that is different from your normal network/cybersecurity position, please keep reading. We are looking for Network Security Engineers who are familiar with both network defense and offensive techniques to support ongoing operations and secure our customers … management and familiarity with network penetration testing and offensive security. Candidates should have a minimum of 7+ years of experience as a Network Engineer, System Engineer or in the CyberSecurity field as a hands-on penetration tester. Candidates with fewer years of experience will be considered on a case-by-case basis, depending on technical skill level. JOB SUMMARY … include performing network packet inspection, traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of information security practices. • Experience using virtual infrastructure (e.g., vSphere). • Experience in a cyber-security role such as network defense, penetration testing and network forensics. • Experience in either the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure. • Proven ability More ❯
Government/Military Clearance Required: TS/SCI with Polygraph Full-Time Fully Funded $130,000-$150,000 (Depending on Experience) Overview: Helm Point Solutions is a woman-owned cybersecurity and physical security firm supporting the nation's most critical systems and infrastructure. We're seeking experienced Information Systems Security Engineers (ISSEs) to support vital intelligence operations that directly impact … national security. You'll join a skilled cybersecurity team responsible for strengthening the systems that protect the country's most sensitive missions-delivering standardized, scalable security solutions across multiple teams and environments. What You'll Do: • Conduct security assessments to identify vulnerabilities and ensure IA compliance. • Define, verify, and validate system security requirements and contribute to the design of security … architectures. • Implement and integrate IA and cybersecurity solutions across complex technical environments. • Support architects and developers in applying security policies and enterprise security solutions. • Identify, assess, and mitigate risks throughout the program lifecycle. • Apply advanced knowledge in risk management, incident handling, intrusion detection, and security engineering. • Support certification and accreditation activities within NSA/CSS NISCAP, DoD RMF, and NIST More ❯
States Space Force (USSF). This role offers a unique opportunity to contribute directly to mission success and the advancement of space operations. In this position, you will perform cybersecurity tasks for classified networks, supporting the development and deployment of advanced test and training capabilities vital to maintaining space superiority. We're looking for someone with strong knowledge of Department … in a fast-paced, mission-focused environment. Skills/Experience Required Information Systems Security Engineer L2 Skills and Experience: Active Top Secret/SCI clearance Over 5 years of cybersecurity experience, supporting DoD and/or Intelligence Community (IC) information assurance (IA) activities in alignment with the Risk Management Framework (RMF) for mission-critical defense programs Proven expertise in applying … skills, with experience evaluating hardware and software designs to deliver technical recommendations that enhance system and network security Effective leadership and communication abilities, including the development and presentation of cybersecurity documentation and briefings to government stakeholders and cross-functional teams Extensive experience in vulnerability management, including documentation and tracking through POA&Ms, Security Controls Traceability Matrices, and communication with AOs More ❯
to solve challenging business problems Self-directed professionals Hunger to continually learn and grow Responsibilities: Perform the supporting technical role and actions necessary to support and participate in the Cybersecurity authorization of classified networks and systems Support the vulnerability programs-VMS/IAVAs/SCAP HBSS/ACAS/VDP/ISCM Interpret and remediate scan results in the context … network/computer security, consistent with mission requirements Evaluate and validate technical processes used to support A&A activities necessary to assure that classified systems meet the organization's Cybersecurity requirements Provide support to Security Controls Assessors and Validators to ensure authorization information, documentation, and related tasks are provided in accordance with authorization schedules and approved formats Perform actions as … RMF POC and shall assist in managing DoD Cybersecurity risk assessment requirements for classified information systems, including standalone and Government Cloud (AWS/Azure) information systems Ensure all classified technical data is controlled in accordance with the appropriate classification level cited for information products Assist in the cleanup of unclassified & classified spillage data when information is spilled onto media that More ❯
/CD), continuous feedback, and continuous operations cycle May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline 3 and 10 years More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
role encompasses software maintenance and development, IT support, systems integration, enterprise application development, and comprehensive information systems security. As an ISSO, you will collaborate with a team of elite cybersecurity professionals to develop and implement strategies that detect and mitigate threats, protect critical data, and ensure compliance with federal security standards. Application Process: Interested candidates should submit their resume detailing … day security operations of complex systems. High level of initiative, problem-solving skills, and a collaborative team mindset. Excellent interpersonal and communication skills. Preferred Qualifications: Bachelor's degree in Cybersecurity, Computer Science, or a related field. 12+ years of relevant experience in ISSO roles on large software development and integration programs. DoD 8570 IAT Level II or higher certification. DoD More ❯
an active contract for the Department of Justice. The AWS Security Engineeris responsible for designing, implementing, and maintaining secure cloud architectures in AWS while ensuring continuous compliance with federal cybersecurity policies and frameworks. This hybrid role includes supporting cloud security engineering as well fulfilling the duties of an Information System Security Officer (ISSO) to support Authorization to Operate (ATO) activities … specific policies. Monitor cloud environments for anomalous activity, enforce access control policies, and support incident response efforts, including secure CI/CD pipelines Required Qualifications: Bachelor's Degree in Cybersecurity, Computer Science, or related field 7+ years of cybersecurity experience, including at least 3+ years in cloud environments Hands-on experience implementing and assessing NIST 800-53 controls in a More ❯
of an ISSO, you will play a key role in ensuring the ongoing security and compliance of critical information systems and support the broader organization's information assurance and cybersecurity goals. Qualifications: Required: Current Active TS/SCI with POLY Eight (8) years of combined work-related experience in the fields of IT, cybersecurity or security authorization is required. Experience … incident management, and PKI and authorization services. Bachelor's degree in Computer Science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems) is required. In lieu of a Bachelor's degree, four (4) additional years of work-related experience may be substituted. DoD More ❯
the "Land of the Free" every day, at work, or at play. RESPONSIBILITIES Serve as Information System Security Officer (ISSO) for a designated NAVAIR program. Manage day-to-day cybersecurity activities, including the oversight of less senior staff and their assigned responsibilities. Perform duties of the Risk Management Framework (RMF) ISSO role, including: Develop platform RMF authorization packages. Prepare/… Update RMF documentation. Prepare IATTs and Use Case MFRs as required to support development and testing. Prepare for CyberSafe authorization in parallel with the system authorizations. Establish Cybersecurity policies IAW security control implementations. Implement a Cybersecurity Plan. Perform asset and vulnerability management via VRAM reporting. Perform vulnerability assessments and system authorization activities through collaboration with SMEs (System Administrators, Network Admins … report software IAW DITPR/DADMS requirements. REQUIREMENTS 10 years of experience in Information Systems Security. Experience as an ISSO in the following areas: Risk Management Framework (RMF) processes. Cybersecurity/A&A tools (i.e., eMASS, eMASSter, STIG Viewer, SCAP Compliance Checker (SCC), VRAM, and Visio). IT Systems and Subsystems. Project Management. Written & Verbal Communications. Teamwork & Collaboration. Working on More ❯
need to succeed: Active TS/SCI Clearance with CI poly. Bachelor's degree in Computer Science, Information Security, or a related field. 7+ years of experience as a cybersecurity engineer with a specialization in designing and building implementations of required security controls; and implementing continuous monitoring and auditing of solutions for compliance with security controls. Strong skills in specifying More ❯
Engineer, you'll play a pivotal role in safeguarding our organization's digital assets and sensitive information. The ideal candidate is a dedicated professional with a strong background in cybersecurity, a deep understanding of current threats and vulnerabilities, and can implement robust security measures. You'll contribute to the design, implementation, and maintenance of our cybersecurity infrastructure while staying abreast … need to succeed: Active TS/SCI Clearance with CI poly. Bachelor's degree in Computer Science, Information Security, or a related field. 7+ years of experience as a cybersecurity engineer with a specialization in designing and building implementations of required security controls; and implementing continuous monitoring and auditing of solutions for compliance with security controls. Strong skills in specifying More ❯