Principal Security Engineer The Role: Synoptix are expanding their CyberSecurity capability by applying it to Systems Thinking, allowing for delivery of CyberSecurity Solutions to both defence and commercial clients. We're looking for a technically strong, client-focused Principal Security Engineer to support the development, implementation, and assurance of secure system architectures and solutions. This role sits within … security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver CyberSecurity work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be responsible for the technical content of client … Support the Sales and Business Development team in winning work through the generation of proposals and support to client meetings. Represent Synoptix at conferences, symposia, and trade shows. Lead Cybersecurity related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering Key Management in accordance with agreed management plans. More ❯
Principal Security Engineer The Role: Synoptix are expanding their CyberSecurity capability by applying it to Systems Thinking, allowing for delivery of CyberSecurity Solutions to both defence and commercial clients. We're looking for a technically strong, client-focused Principal Security Engineer to support the development, implementation, and assurance of secure system architectures and solutions. This role sits within … security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key Responsibilities: Lead and Deliver CyberSecurity work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be responsible for the technical content of client … Support the Sales and Business Development team in winning work through the generation of proposals and support to client meetings. Represent Synoptix at conferences, symposia, and trade shows. Lead Cybersecurity related research programmes with Academia. Represent the client and Synoptix at both internal and external customer facing security working groups. Delivering Key Management in accordance with agreed management plans. More ❯
This role will lead the technical delivery of cybersecurity artefacts aligned to EASA, UK CAA and associated airworthiness regulations. You will support developing and refining our client's Airworthiness Security Process (AWSP) and oversee the creation of core artefacts to support certification. This client-facing role ideally suits someone with deep experience in aerospace system security, airworthiness security assurance, and … regulatory alignment. You will be a trusted advisor to engineering teams and Expleo cybersecurity consultants, ensuring best-practice alignment, efficient delivery, and high-quality outputs across the certification lifecycle. Responsibilities Act as the technical lead for cybersecurity delivery to aerospace clients, ensuring alignment with the development roadmap and certification programme. Provide subject matter expertise on airworthiness security, system security engineering … and certification artefact production aligned to EASA and UK CAA expectations. Lead the development and review of cybersecurity documentation, including the PSecAC (Airworthiness Security Process Plan), PASRA (Preliminary Aircraft Security Risk Assessment), ASAM (Aircraft Security Architecture Model), and Security Verification Methods. Provide input into the AWSP frameworks, including the tailoring of compliance checklists, activity outcomes, and document templates. Ensure traceability More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. Responsibilities Executes various technical tasks and responsibilities within field operations. Performs on-site installations, maintenance, troubleshooting, and repairs of equipment and systems. Ensures the functionality and reliability of various More ❯
Cloud and DevSecOps. These factories deliver AI/ML Applications, Data Science Platforms, Blockchain and Microservices for DoD, Healthcare and Civilian Agencies Position Overview: This role serves as a Cybersecurity subject matter expert responsible for advising the government on the development and execution of the strategic and tactical cybersecurity program with a focus on the coordination and development of system … resolution. Key Responsibilities: Support the implementation of technical capabilities that satisfy Intelligence Community Directive-503 (ICD-503) and security requirements. Assist in the identification, development, and testing of automated cybersecurity capabilities. Receive, identify, and provide cybersecurity requirements and translate those requirements into secure technical solutions that can be understood by customers, adopters, implementers, and developers. Required Skills: Bachelor's degree … and Engineer Level 1, or Information Assurance Technician (IAT I) certification, or Technical Level III Certification (as outlined by the DoDD 8140.01) Demonstrated experience engineering, acquiring, using and decommissioning cybersecurity tools in large enterprise projects and programs. Demonstrated experience and certification securing virtual systems, cloud computing/hybrid environments and data infrastructure in large enterprise environments. Experience implementing processes, standards More ❯
mitigate cyber threats, and automate tasks. Contribute to the planning, implementation, and management of the security operations tooling roadmap. Collaborate on the engineering, implementation, management, monitoring, and upgrades of cybersecurity infrastructure and technologies. Create and maintain detection rules and logic to identify suspicious activity and potential security threats. Participate in the creation, implementation, and optimisation of SIEM event correlation … SAST, Identity Access Management, SIEM & SOAR, log management. Preferable experience in Azure, AWS, Defender, Darktrace. Experience and technical knowledge in multiple areas of cyber defence operations. Experience as a CyberSecurity Engineer; previous experience as a Network or Server Engineer could be beneficial. Experience in working internationally and multi-culturally; Comfortable with proactive communication and interaction with staff at different More ❯
Documenting risks, findings, and recommendations in clear, actionable reports. Managing workload across multiple concurrent projects, meeting deadlines in a fast-paced portfolio environment. Essential Skills & Experience Strong understanding of cybersecurity and IT control frameworks (SOX, FFIEC, ISO27001, NIST, Cloud Security Alliance, PCI-DSS). Proven experience as an IT auditor, security auditor, or GRC analyst in a complex environment. Hands … and influence effectively. Demonstrated ability to prioritise and deliver across multiple projects. Excellent reporting, documentation, and presentation skills. Preferred Skills Experience in project management . Previous assurance experience for cybersecurity policies, standards, and procedures. Understanding of global IT risk management frameworks . Exposure to senior stakeholder management and management-level reporting. Due to the volume of applications received for positions More ❯
Action & Milestones (POAMs) and documenting all related work within the A&A systems. Provide proactive guidance on information security policies, regulations, and technical implementations, demonstrating a strong understanding of cybersecurity operations and the clients A&A processes. Actively participate in and lead technical exchange meetings and application review boards to verify and validate system security controls. Document all action items … Degree: equivalent to 3 years of experience Relevant Masters/Doctoral Degree: equivalent to 2 years of experience Relevant Certifications: equivalent to 3 months of experience Deep understanding of cybersecurity policies, guidance, research, evaluation, and policy development. Proven ability to secure cloud-based systems and applications, including risk mitigation strategies. Extensive experience with system configuration, development, and design, particularly within More ❯
achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering … controls, and perform and analyze the security risk assessment, risk analysis, risk management process, security control assessments, and awareness activities for systems and networking operations. Provide assistance to ensure Cybersecurity functions are included in the configuration management process. Interact with customers, Information Technology (IT) staff, and high-level corporate officers in defining and achieving required Cybersecurity objectives for the organization. … Contribute to building security architecture. Assist with the integration of legacy systems. Contribute to the acquisition/RDT&E environment and building Cybersecurity into systems deployed in operational environments. Prepare security authorization documentation. The Level 3 Delegated Authorizing Official Representative shall possess the following capabilities: Perform security planning, security assessment, risk analysis, risk assessment, and risk management support activities Perform More ❯
Until End of Year Location: Hybrid (as and when requirement) IR35 Status: TBC Overview: We are seeking two experienced Security supporting Analysts to support our client in delivering robust cybersecurity governance, operational oversight, and framework alignment. This contract role offers the opportunity to work within a high-performing team, contributing to the successful delivery of critical security initiatives through the More ❯
domain. Produces security focused design policies, principles and criteria covering connectivity, interfacing, resilience, recovery and access. Provides definitive and expert advice in the specialist area of engineering into other cybersecurity activities, such as incident response. Develops secure architecture patterns for emerging technologies within the engineering domain, in line with safety, integrity and availability requirements. Acts as a single point … of contact for senior stakeholders and influencers for cybersecurity architecture activities within the engineering space. Initiates procedures to manage security risk in accordance with business security risk appetite, recommending designs and security architectural changes that aid in risk mitigation to senior stakeholders. Maintains a broad understanding of the external security environment and applies this within the role. Coordinates the … accordance with regulatory requirements and changes in the threat landscape. Takes responsibility for major aspects of security specification and design within the engineering domain. Reports on, and analyses the cybersecurity metrics and KPIs gathered across the engineering domain. Develops plans, policies and processes and looks for continued service improvement opportunities through regular reviews of existing material within engineering. Maintains More ❯
Desired skills: Galway. Medical Devices, CyberSecurity Head of Information Security Galway (Hybrid, Ireland-based) Permanent Full-time A rapidly growing medical technology company is seeking a Head of Information Security to lead its global security and compliance function. This senior leadership role offers the opportunity to shape and scale a modern, cloud-native security program in a regulated, high More ❯
Full Scope Polygraph Company: Quantum Science Solutions (QSS) Compensation: Open Rate Position Overview Quantum Science Solutions (QSS) is seeking an experienced Systems Engineer to join a highly visible federal cybersecurity contract in Chantilly, VA. This role will play a mission critical part in the sustainment and modernization of legacy cybersecurity systems, as well as the design and deployment of new More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Prism, Inc
leadership role Capable of performing trend and analysis of vulnerability scan data and preparation of weekly metrics for presentation to leadership Experience in Information Technology/Vulnerability Management/Cybersecurity Demonstrate deep technical knowledge in the management and configuration of operating systems, networks, and software including knowledge of OS authentication mechanisms, permissions, and a solid understanding of networking Demonstrate depth More ❯
electronic and mechanical engineers, to define end-to-end system requirements. Lead the migration of Legacy systems into scalable, modern DevOps environments. Build specialist test networks that balance resilience, cybersecurity, and performance. Ensure designs align with the Client IT and cybersecurity standards. The skills you'll need: Proven experience in system design, integration, and testing in high-data and regulated … environments (aerospace, defence, finance, or similar). Strong knowledge of Cisco networking, VMware, and Active Directory. Experience integrating OT and IT systems in complex environments. Background in cybersecurity frameworks and data resilience strategies. Hands-on experience with DevOps, Agile, and modernisation of Legacy platforms. SC Clearance or eligible. Next steps We will only accept workers operating via an Umbrella or More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Security Architect Location: Hybrid - 2 days/week at client sites (UK wide) Salary: £70k - £83k DOEClearance: MOD SC or DV Role details: We're partnering with a specialist CyberSecurity services provider with exciting growth plans. They are looking for a Security Architect with recent MOD experience to define and implement security architectures and solutions. Requirements: 5+ year's More ❯
achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this mission-critical contract providing Cybersecurity Expertise and Risk Management Services! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering … testing using established test protocols and methods Bachelor's degree in computer science or a related field (e.g. General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems). In lieu of a bachelor's degree, 4 additional years of Penetration Testing experience maybe substituted. Certifications Required: DoD … and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
documentation, systems design and specifications, and project status reporting. Possessing knowledge of the DoD Risk Management Framework (RMF) which, describes the DoD process for identifying, implementing, assessing, and managing cybersecurity capabilities and services, expressed as security controls, and authorizing the operation of Information Systems (IS) and Platform Information Technology (PIT) systems. RMF brings a risk-based approach to the implementation … of cybersecurity, supports cybersecurity integration early and throughout the system lifecycle, promotes reciprocity to the maximum extent possible and stresses continuous monitoring. RMF replaces the DoD Information Assurance Certification and Accreditation Process (DIACAP). Familiarity with the National Institute of Standards and Technology (NIST) for DoD information assurance systems accreditation is helpful. Basic Minimum Requirements for Skills, Experience, Education and More ❯
Manager knowledge/experience into the team Define and implement security baselines and compliance policies for M365 workloads Lead investigations and incident response leveraging Microsoft security tools Collaborate with cybersecurity, infrastructure and architecture teams to ensure alignment with overall cloud strategy Required Skills & Experience: Proven expertise in Microsoft 365 security technologies (Defender suite, Purview, Entra ID, Intune) Azure Policy More ❯
of mission-critical databases in classified and unclassified environments. This role involves database design, implementation, maintenance, and optimization, ensuring data integrity, backup, and disaster recovery protocols align with DoD cybersecurity standards. The selected candidate will support database administration tasks, performance tuning, access control management, and troubleshooting, enabling efficient data storage, retrieval, and analysis to support TRADOC intelligence and operational requirements. … triggers, and automation scripts to enhance data processing efficiency. Ensure compliance with TRADOC G2 data governance policies by enforcing database integrity, consistency, and version control. Collaborate with network administrators, cybersecurity teams, and system engineers to integrate databases with TRADOC IT infrastructure. Support migration and modernization efforts for transitioning legacy databases to cloud-based or hybrid architectures. Provide technical documentation, training … of five (5) years of experience in database administration, preferably in a DoD or government setting. Proficiency in SQL Server, Oracle, PostgreSQL, or MySQL database administration. Experience implementing DoD cybersecurity frameworks, including RMF and DISA STIG compliance. Strong knowledge of database optimization, query performance tuning, and troubleshooting techniques. Experience with data replication, clustering, and high-availability configurations. Familiarity with database More ❯
Description As the Category Manager for the Cloud & InfoSec categories, you will be responsible for supporting WTW across the business for all procurement aligned to cybersecurity and Cloud operations. You will collaborate with business stakeholders to develop sourcing strategies related to end user & collaboration services. Knowledge of how global software and licensing works, and experience/background specifically in … for high-profile sourcing initiatives as required. Qualifications The Requirements: Strong work experience in technology procurement Knowledge and experience in Cloud computing procurement Knowledge and experience in procurement of cybersecurity software and related products Experience in supplier negotiations Strong relationship-building skills and ability to communicate complex ideas Excellent communication and interpersonal skills Creativity in seeking and encouraging non More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 within a medium/large sized public sector organisation Solid stakeholder management and mentoring skills Information Security,CyberSecurity, Assurance and vulnerability management would be ideal Comprehensive knowledge of Information Security Management Systems with the ability to scope, design, and implement such systems Strong ICT infrastructure, application, and More ❯
San Diego, California, United States Hybrid / WFH Options
TEKsystems c/o Allegis Group
maintain schedules; candidates should provide a written example of doing so in past roles. 2. Technical Project Leadership Manage projects involving Cisco and Aruba networking equipment (wired and wireless), cybersecurity solutions (including Fortinet and Cisco ASA), and Aruba ClearPass/Cisco ISE. Oversee installations of outside plant (OSP) and inside plant (ISP) fiber, network servers, firewalls, security cameras, and related … Cisco ISE, Fortinet, and Cisco ASA. Project Types: Demonstrated experience in federal projects involving OSP/ISP fiber installations, network core and edge equipment installation, network server deployment, and cybersecurity implementations. Skills & Competencies Project Management Proficiency: Strong skills in project budgeting, scheduling, scope management, and risk mitigation. Technical Knowledge: Expertise in IT wireless/networking, network infrastructure, cybersecurity protocols, and More ❯
Burke, Virginia, United States Hybrid / WFH Options
ALTA IT Services
LiveAction's network performance monitoring and analytics (NPM/APM) tools to provide real-time visibility into complex, multi-domain government networks. The ideal candidate will work closely with cybersecurity, network, and system engineering teams to ensure operational resilience and mission continuity. Key Responsibilities: • Deploy and configure LiveNX appliances across diverse environments (cloud, on-premise, hybrid). • Maintain and optimize … grade networking solutions. • Strong understanding of LAN/WAN architectures, VPNs, and cloud networking (AWS, Azure Gov, etc.). • Experience working in government-regulated environments with an understanding of cybersecurity frameworks. Preferred Qualifications: • LiveAction product certifications (e.g., LiveAction Certified Professional). • Experience integrating LiveAction with Splunk, Elastic, or other SIEMs. • Familiarity with packet-level analysis tools like Wireshark or Riverbed. More ❯
solving complex problems in the areas of DevOps, Cloud and Cyber domains. In addition to offering Cloud based solutions that span Azure, AWS, and Google platforms, GoldenTech also provides cybersecurity solutions to help our customers from threats. We also provide full stack development on the .NET, J2EE platforms, and harness the synergy between DevSecOps and Agile to deliver solutions More ❯