determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
customers get the most out of the technology in their homes. The Alexa Connect Kit team is a team within Alexa Smart Home. We offer managed services (cloud services, firmware, devices) for enabling device makers to build smart home appliances. We work across verticals that Alexa Smart Home supports, partnering with manufacturers to bring to market everything from Christmas trees More ❯
various types of hardware and media Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly More ❯
or similar platforms. Proven ability to lead full lifecycle, customer-facing programs-managing delivery, stakeholder engagement, and alignment throughout. Exposure to delivering projects spanning software, cloud and hardware or firmware would be highly advantageous. Solid financial acumen with experience managing program budgets, forecasts, and overall spend. Salary Up to £70,000 with package which includes private healthcare, enhanced pension contribution More ❯
focus on Access Control and CCTV) Identify and resolve issues with security equipment promptly to minimise downtime and maintain overall security of the client premises. Keep security software and firmware up to date to address vulnerabilities and ensure systems are protected against the latest threats. Work closely with other relevant departments to organise ordering of spare or replacement equipment, and More ❯
right designs. Generate manufacturing files (Gerbers/ODB , pick-and-place, BOMs) with clear build notes, and document design decisions, test results, and revision history. Collaborate closely with electronics, firmware, mechanical, and manufacturing teams to define requirements, review designs, and integrate PCBs into complete products. Bonus: Oversee fabrication and assembly vendors, develop test plans, bring up prototypes, and debug issues More ❯
Pentagon and external SVTC, DVTC, and TS VoIP systems (hardware and software across all classification enclaves) ensuring uninterrupted functionality for OUSD(I&S) by troubleshooting, fault isolation, repair, replacement, firmware updates, and system programming code loading. Provide day-to-day break-fix support for Studio VTCs, DVTCs, and TS VoIPs, including system upgrades, end-user training, license transfers, port activation More ❯
At BlueHalo, an AV Company our analysts provide actionable intelligence. We quickly convert customer requirements into real hardware, software, firmware, and mechanical solutions in weeks, not years. With an organizational structure and design processes tailored to quick reaction, our process identifies risks that would prevent delivery and implements mitigation strategies to meet goals at mission speed. Our team is expanding More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯
systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility More ❯