determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
right designs. Generate manufacturing files (Gerbers/ODB , pick-and-place, BOMs) with clear build notes, and document design decisions, test results, and revision history. Collaborate closely with electronics, firmware, mechanical, and manufacturing teams to define requirements, review designs, and integrate PCBs into complete products. Bonus: Oversee fabrication and assembly vendors, develop test plans, bring up prototypes, and debug issues More ❯
checks; work with physical‐design teams on ECOs. Enable post‐silicon bring‐up by generating test vectors, configuring scan/DFT hooks, and supporting FPGA/emulation platforms for firmware and software teams. Mentor junior engineers on verification methodology, code reviews, and best practices; champion continuous‐integration flows, regressions and results dashboards. Track industry advances in formal verification, emulation, coverage More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
checks; work with physical‐design teams on ECOs. Enable post‐silicon bring‐up by generating test vectors, configuring scan/DFT hooks, and supporting FPGA/emulation platforms for firmware and software teams. Mentor junior engineers on verification methodology, code reviews, and best practices; champion continuous‐integration flows, regressions and results dashboards. Track industry advances in formal verification, emulation, coverage More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
At BlueHalo, an AV Company our analysts provide actionable intelligence. We quickly convert customer requirements into real hardware, software, firmware, and mechanical solutions in weeks, not years. With an organizational structure and design processes tailored to quick reaction, our process identifies risks that would prevent delivery and implements mitigation strategies to meet goals at mission speed. Our team is expanding More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
granted access to the IT, according to AFMAN 17-1301 Maintains all authorized user access control documentation IAW the applicable AF Records Information Management System Ensures software, hardware, and firmware comply with appropriate security configuration guidelines (e.g., security technical implementation guides/security requirement guides). Required Skills: System administration experience, preferably with USAF NIPR and SIPR VMWare Switch experience More ❯
major incidents or repeated failures. Maintain and develop technical documentation, fault-finding guides, and repair procedures. Liaise with inverter and equipment manufacturers for escalated technical support cases, RMAs, and firmware updates. Collaborate with the field teams to identify common failure modes and propose mitigation strategies. Assist with commissioning and performance validation for new sites or retrofit works. Site attendance for More ❯
to seek diverse perspectives, learn and be curious, and earn trust. BASIC QUALIFICATIONS - Experience troubleshooting and debugging technical systems - Experience working with device technologies under development, familiarity with flashing firmware, basic device debugging and familiarity with reading/pulling device logs - Experience troubleshooting & maintaining hardware & software RAID PREFERRED QUALIFICATIONS - Experience scripting in one or more language (e.g. Bash, Python, Perl More ❯
Out in Science, Technology, Engineering, and Mathematics
and senior leadership to execute strategic initiatives successfully. Ability to interface with operational and senior management within the organization. Experience gained designing and programming automation applications. May include both firmware and software development. Preferred Skills If you have the following characteristics, it would be a plus: MEng/MSc in a Science or Engineering related discipline such as Automation, Control More ❯
Senior Product Manager - Firmware Location: London (Hybrid 3 days a week onsite) Salary: £100,000 - £120,000 (plus benefits and bonus) We are excited to partner with a fast-growing SME in the clean-tech space who are looking to hire a Senior Product Manager - Firmware. The company are transforming the energy space with their modern technology and have launched … global scale with their V2G application, following an ambitious roadmap ahead to stay at the forefront of the market. As Senior Product Manager, you will own, and lead their firmware and software product development initiatives, bridging the gap between technical capabilities and market needs, to help drive the evolution of their product portfolio and innovation across the business. Senior Product … Manager Responsibilities: Lead the product development lifecycle for the firmware and software products from concept to launch. Collaborate with internal teams and key stakeholders to ensure smooth integration between software, hardware, and product offerings. Develop and maintain product roadmaps aligned with company strategy and market demands. Collaborate with internal teams and key stakeholders to ensure smooth integration between software, hardware More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Ozone Talent
Senior Product Manager - Firmware Location: London (Hybrid 3 days a week onsite) Salary: £100,000 - £120,000 (plus benefits and bonus) We are excited to partner with a fast-growing SME in the clean-tech space who are looking to hire a Senior Product Manager - Firmware. The company are transforming the energy space with their modern technology and have launched … global scale with their V2G application, following an ambitious roadmap ahead to stay at the forefront of the market. As Senior Product Manager, you will own, and lead their firmware and software product development initiatives, bridging the gap between technical capabilities and market needs, to help drive the evolution of their product portfolio and innovation across the business. Senior Product … Manager Responsibilities: Lead the product development lifecycle for the firmware and software products from concept to launch. Collaborate with internal teams and key stakeholders to ensure smooth integration between software, hardware, and product offerings. Develop and maintain product roadmaps aligned with company strategy and market demands. Collaborate with internal teams and key stakeholders to ensure smooth integration between software, hardware More ❯