determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
At BlueHalo, an AV Company our analysts provide actionable intelligence. We quickly convert customer requirements into real hardware, software, firmware, and mechanical solutions in weeks, not years. With an organizational structure and design processes tailored to quick reaction, our process identifies risks that would prevent delivery and implements mitigation strategies to meet goals at mission speed. Our team is expanding More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
Stevenage, Hertfordshire, England, United Kingdom Hybrid / WFH Options
MBDA
equipment delivery. Technical management: successfully leading the systems design and technical trade studies. What we're looking for from you: Strong systems engineering experience (ideally in a complex hardware, firmware and software system) Experience of Model-Based Systems Engineering/SysML and use of Systems Engineering Tools such as IBM DOORS and Rhapsody. A desire to develop and grow your More ❯
implement security solutions meeting stringent requirements for classified information processing • Perform continuous vulnerability and risk assessments supporting ongoing authorization activities • Manage configuration control for security-relevant hardware, software, and firmware • Assess security impacts of system changes and coordinate remediation efforts Technical Security Management • Administer user identification and authentication mechanisms across diverse platforms • Maintain detailed records on security infrastructure including workstations More ❯
Newark, Nottinghamshire, East Midlands, United Kingdom
Professional Technical Ltd
standards and export the products worldwide. This is an opportunity to join their market-leading R&D team and lead the design, development, and implementation of embedded software and firmware for cutting-edge electronic HMI products. Key Responsibilities for this Senior Embedded Software Engineer: Lead end-to-end software development: specification, design, implementation, testing, and documentation. Engineer firmware for embedded … production engineering-trialling and troubleshooting new developments. Provide technical leadership and mentorship to senior engineers and cross-functional colleagues. Support proposals with technical estimates, timelines, and cost information. Manage firmware lifecycle and change controls. Assist in new process creation and technical risk management. Qualifications & Experience Required for this Senior Embedded Software Engineer: BSc or MSc in Computer/Electronic Engineering … within electronics or manufacturing. Experience in additional programming languages (e.g C++) Familiarity with Microsoft Visual Audio Proficient with Git or similar version control systems. Demonstrated experience with bare-metal firmware development, layered architectures, and embedded testing (unit/automated). Exposure to task and issue tracking tools like Jira, and familiarity with IDE/toolchains and release management practices. Familiarity More ❯
Principal Firmware Engineer Luton Paying up to £80p/h (Umbrella) Responsibilities : Artificial Intelligence, including machine learning and genetic algorithms Auto-generated code using model driven engineering using MATLAB and Simulink tools Design tools such as Xilinx, TCL, Verilog, System Verilog and UVM Derivation of detailed Firmware requirements and architecture from system requirements A structured approach to firmware design (RTCA More ❯
Coventry, Warwickshire, United Kingdom Hybrid / WFH Options
Infused Solutions Ltd
Develop hardware verification plans and test procedures Contribute to compliance activities (e.g. EMC, environmental testing) Perform circuit-level analysis (e.g. power, tolerance, reliability) Collaborate with cross-functional teams including firmware and mechanical engineers Essential Skills: Proven experience in digital circuit design for microcontroller-based systems Practical knowledge of embedded firmware (C programming) Oversight of PCB layout and review Understanding of More ❯
Coventry, West Midlands, United Kingdom Hybrid / WFH Options
INFUSED SOLUTIONS LIMITED
Develop hardware verification plans and test procedures Contribute to compliance activities (e.g. EMC, environmental testing) Perform circuit-level analysis (e.g. power, tolerance, reliability) Collaborate with cross-functional teams including firmware and mechanical engineers Essential Skills: Proven experience in digital circuit design for microcontroller-based systems Practical knowledge of embedded firmware (C programming) Oversight of PCB layout and review Understanding of More ❯
a focus on fielding a product Ability to work with others to meet established goals and program schedules Ability to communicate effectively, both verbally and in writing Responsibilities: The Firmware Developer will write firmware to run on specified microcontrollers to achieve desired functionality. This functionality can range from making a device more robust to adding user desired functionality to adding … etc.). Updating or writing tools to be able to configure newly updated devices is also expected. Coding embedded microcontrollers Develop embedded software for new and existing systems Write firmware to run on specified microcontrollers to achieve desired functionality This functionality can range from making a device more robust to adding user desired functionality to adding support for a new More ❯
Overview Senior Firmware Engineer - Remote, Ireland! €70,000 - €90,000 + Stock Options + Full Health & Dental Cover An exciting new opportunity has emerged for an experienced Senior Firmware Engineer to join one of Ireland's most innovative and well-backed technology companies. With €20 million raised in 2024 alone, this company is scaling fast and you'll be at … the heart of a major growth phase. This role offers the rare chance to join a greenfield project as the first firmware hire in Ireland. You'll have complete ownership of the firmware function, including architecture, development processes, and technical strategy. Working directly with the CTO, you'll influence key decisions and help shape the future of the product and … into a technical leadership path , with the opportunity to build and lead a team locally as the company grows. Your Mission Take the lead in building and scaling the firmware function from the ground up in Ireland Drive the design and architecture of the next generation of their in-house product Transition firmware and hardware capabilities in-house, establishing and More ❯