services for the full spectrum of operations. The services required by this contract will assist providing the NRO with a secure mission environment. The contractor shall provide realistic, innovative informationsecurity solutions to accomplish the requirements in addition to program management. The services obtained under this contract shall provide expertise to support information systems security, security control assessments, information assurance engineering, and security control assessments test engineering. AT&T has an opening for a Security Control Assessor (SCA) Mid Level to support AT&T Federal Solutions . Job Duties/Responsibilities: Practical experience performing information systems A&A as defined in applicable ICDs and guidance. Practical experience developing and implementing security related directives and guidance for IA/IT/IM. Practical experience utilizing risk management strategies for information technology solutions. Understanding of emerging technologies and their implementation within Government system and network environments. Knowledge of information technology concepts used in the evaluation of security performance and integrity of state-of-the-art applications, communications systems, hardware More ❯
re looking for. Job Description: Parsons is looking for a talentedSecurity Control Assessor (SCA) to join our growing team! In support of this mission critical effort you will provide informationsecurity Assessment and Authorization (A&A) support to Contractor and Government facilities processing information. You will enhance the Information System (IS) security awareness of Directorates' & Offices … staffs, ensure implementation of appropriately applied proper IS security resources and act as an IS liaison between the Directorates and various Offices. What You'll Be Doing : Develop and implement procedures for product testing. Review and evaluates test results and recommends production or design changes to ensure compliance with qualify and performance standards Develop and implements procedures for product … testing. Design and develops engineering standards and tests to evaluate the functionality of products and systems. Perform information systems assessment and authorization (A&A) as defined in applicable ICDs and guidance. Perform, develop, and implement security related directives and guidance for IA/IT/IM. Utilize risk management strategies for information technology solutions. Coordinate A&A More ❯
Security Specialist IV Full Time, Ft. Belvoir, VA Secret clearance required This position is contingent upon contract award Overview: Semper Valens Solutions is seeking an experienced Security Specialist to support our organization in the Ft. Belvoir, VA area. Responsibilities: Provides the highest level of technical expertise related to a DoD client's security and program protection operations … team and responsibility Supports the client by providing security expertise and hands on experience within one or more security disciplines, including personnel, physical, anti terrorism (AT), industrial, operations security, classification management, informationsecurity, and foreign disclosure. Applies analytical principles and practices, research, and technical support in the development and production of security products and … activities. Analyzes and implements organizational security policies and procedures that ensure the physical safety of sensitive information and facilities, and assists with the oversight and maintenance of the organization's daily physical security operations. Provide support in clearance processing, COMSEC program, visit certifications, document control and security briefings, in accordance with NISPOM, ICD's and other More ❯
Join JRC's Missiles & Space Team! Are you ready to take on a dynamic role that encompasses a wide range of security disciplines? As a Multi-Discipline Security Specialist , you will leverage your extensive experience in Risk Management, Physical Security, Operational Security, InformationSecurity, and Antiterrorism Risk Management. Your expertise will be crucial in … detecting and assessing potential intrusions, mitigating insider threats, and identifying weaknesses and deficiencies in our response force capabilities. As the Multi-Discipline Security Specialist, you will Conduct assessments of identified assets and supporting infrastructure to determine vulnerabilities that could lead to risk to mission. Provide recommendations to reduce the overall risk by preventing or mitigating damage to or destruction … of mission-critical systems should a plausible threat be carried out. Evaluate and enhance the overall physical security posture, including security operations, physical security systems, lock and key systems, access control procedures, and electronic security systems. What you bring to the table A Bachelor's (BA/BS) degree in a related field 5+ years of More ❯
Job Title: Acquisition Lifecycle Security Specialist L3 -5979 Job Location: Kirtland AFB, NM, 87117 Job Salary: $115,000 - $125,000 Job Summary Galapagos Federal Systems LLC is seeking a skilled and motivated Acquisition Lifecycle Security Specialist - Level 3 to support our U.S. Space Force (USSF) customer. This role offers the opportunity to work with a dedicated team supporting … national security objectives. As a key member of the program security team, you will manage and support Collateral, SCI, and SAP security programs, overseeing personnel, physical, industrial, and informationsecurity requirements. You will coordinate personnel security actions using DISS and JADE, conduct indoctrinations, and manage in/out-processing for military, civilian, and contractor … Procedures (SOPs) and present recommendations to government stakeholders. This is a great opportunity to apply your expertise in a high-impact, mission-focused environment. Skills/Experience Acquisition Lifecycle Security Specialist L3 Skills and Experience: Active Top-Secret clearance with SCI eligibility (TS/SCI) Must maintain clearance as a condition of employment and be willing to submit to More ❯
Description The Program Security Representative (PSR) requires a fundamental knowledge of the basics of program protection, classification architectures, Operations Security (OPSEC), Communications Security (COMSEC), sensitive test planning, intelligence & counterintelligence threat support requirements, secure information transmission, secure hardware transportation, and the principles governing controls on fundamental research activities. Qualifying relevant experience includes demonstrated recent experience in successfully … performing as a program security representative (or similar title) for one or more programs on a contract or in an organization that provides security support to a federal entity or private corporation in a classified environment Duties shall include, but are not limited to the following: Develop and support security architectures for new technology programs across the … technology/capability status. In developing a new program, the PSR must be able to analyze the program, national policy, existing, related programs (as applicable), and intelligently craft a security classification architecture for the program that facilitates the secure execution of the program with minimal impact to cost and schedule. Additionally, the program's life cycle must be considered More ❯
Washington, Washington DC, United States Hybrid / WFH Options
RAND Corporation
Overview RAND's Meselson Center , part of the Global and Emerging Risks (GER) division , is seeking mission-driven cybersecurity experts to address critical challenges at the intersection of AI, informationsecurity, and national security. As a Visiting AI Security Resident, you'll manage and lead projects that directly impact AI and cybersecurity policy at the highest levels … of government and industry, contributing to the security and integrity of powerful AI systems. Your work will address key questions related to securing AI systems, understanding their cyber capabilities, and examining their policy implications. You will be responsible for leading complex projects that span technical research, policy analysis, and infrastructure development. For example, you might lead projects to develop … AI-specific threat models, build software tools for AI cyber capability evaluations, or identify critical areas for new security R&D. Your work will shape recommendations for the White House, regulatory agencies, the intelligence community, other national governments, and industry leaders. You will communicate the results of your work to both technical and non-technical audiences through quick-turnaround More ❯
collection of problem solvers, thought leaders, and innovators. Join us and take your place in space. Job Summary The individual selected will serve as a Contractor Special Access Program Security Officer (CSSO), to oversee security operations for various Special Access Programs (SAPs) spanning multiple contractor facilities. In this capacity, they will provide on-site support for security … CSSO will act as a liaison between multiple customers, maintaining a large portfolio of program cleared individuals, primarily interfacing with Aerospace Program Management and government agencies/customers regarding security matters and requirements. Their responsibilities include supporting the Aerospace SAP team in ensuring compliance with program requirements. Additionally, they will be tasked with developing security plans, applying guidelines … and establishing procedures across various security domains such as Personnel Security, Physical Security, Industrial Security, InformationSecurity, Classification Management, Communication Security (COMSEC), and Program Security. Work Model 100% Onsite - El Segundo, CA What You'll Be Doing Coordinate with the Program Security Officer (PSO) and Contractor/Government Program Manager (CPM/ More ❯
Lutterworth, Leicestershire, East Midlands, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
Head Of IT - Cyber security - Hybrid role - Amazing opportunity to take your career to the next level. Excellent salary + Pension + Health + stock options + hybridworking- 2 days in the office per week. This is an excellent opportunity for an experienced Head of IT whois looking for a new challenge supporting a cloud first transformation. Do you … of being a Head Of IT or IT Manager ideally within a multi-site set-up and are looking for a career move working for a cutting edge cyber security company. Any international support experience an advantage. About the role:- The role ensures high performance and availability of internal systems for all users, contributing to strategic IT decisions, and … including hands-on problem resolution. Oversee the rota-based support desk and out-of-hours coverage. Infrastructure & Systems:- Manage all IT infrastructure including servers, cloud services (Azure), network, and security systems. Maintain and improve high availability, disaster recovery, and business continuity plans. Implement and manage corporate systems (e.g., email, backups, telephony). Strategic & Project Leadership Plan and execute IT More ❯
DESCRIPTION The U.S. Amazon Dedicated Cloud Security team seeks a passionate and innovative Security Engineer with a strong security and development background to deliver InformationSecurity solutions. As a Security Engineer, you will investigate, identify, and mitigate security risks throughout the porfolio of programs within the InformationSecurity organization and among … to deliver risk reduction mechanisms, particularly around reducing labor-intensive processes. You will work closely with stakeholder teams to gain deep insights into their systems and processes, and integrate security engineering practices into their workflows. You will help drive engineering excellence through scalable and repeatable solutions, clean code, automation, thorough documentation, and approaches that eliminate single points of failure. … Your impact will be critical in helping AWS maintain top-tier security by driving teams to deliver more effectively and securely through secure designs and automation. You'll focus on identifying security trends, enhancing security visibility, and recommending improvements to raise our security bar. This position requires that the candidate selected be a US Citizen and More ❯
Overview SR INFOSEC Engineer: Bowhead is seeking a SR INFOSEC Engineer to support its PEO C3N Contract in Aberdeen, MD. The INFOSEC Engineer will provide a system-of-systems approach to advancing and synchronizing cyber security, information assurance and information management across PEO C3N. Responsibilities Provide Cybersecurity Engineering for Developmental and Systems Support:Provide systems engineering and … analysis support to the C5 community in support of cybersecurity requirements per AR 25-2 and corresponding DA PAMs ensure the security and availability of Mission Command as well as Communications systems. Provide tailored C5ISR engineering analysis concerning Cybersecurity integration at the request of Government and advise the Government of any potential technical issues that result from this integration … that present risk to achieving the goals of the digital force. Areas of focus may include communications security development and engineering support as well as programmatic and technology development for external organizations, including joint programs. Technical subject areas include encryption technologies, communications security/transmission security, satellite network security, cellular, radio and Tactical Internet securityMore ❯
Job Title: Network Engineer II Work Location: Suitland, MD Experience Level: Mid/Senior - 5+ Security Clearance Required: CI Poly Legal Status: U.S. Citizen Salary: $180,000 - $205,000 Clearance Crossover: 4-8 weeks According to Section 6, Table 3 of the DoD 8140 policy document, the minimum credential requirements for Cyber IT/Cybersecurity Workforce (CSWF) positions are … networking security solutions, technologies, and best practices to support the secure implementation and sustainment of enterprise network devices in line with information assurance (IA) and security (INFOSEC) compliance, governance, and requirements. Personal experience working with Cisco Adaptive Security Appliances (ASA) and like products is a plus. Working knowledge of advanced troubleshooting techniques, methodologies, processes, and practices … the strategy to resolve the issue, implement the resolution, and restore the degraded entity to an operational state all while maintaining concern for the original configuration and the overall INFOSEC posture of the environment. Familiarity with operating and maintain, setup and configuration, testing, and sustainment of firewall, proxy, and VPN rules. Familiarity with advanced Cisco Data Center technologies such as More ❯
Athenix Solutions Group is looking for Information System Security Engineers & Information Systems Security Officers for a variety of roles to assist in the performance and review of technical security assessments of various computing environments. These assessments will assist in identifying vulnerabilities, and ensure compliance, with established Information Assurance standards and regulations. In addition, the … ISSE/ISSO will recommend and oversee the application of mitigation strategies to achieve security compliance. Do you have skills and experience in some of the following areas? Participating as a security engineering representative on engineering teams for the design, development, implementation and/or integration of secure networking, computing, and enclave environments Participating as a security engineering representative on engineering teams for the design, development, implementation and/or integration of IA architectures, systems, or system components Participating as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of secure networking, computing, and enclave environments Applying knowledge of IA policy, procedures, and workforce structure to More ❯
Cybersecurity Manager Seeking a Cybersecurity Manager for an InformationSecurity Program of the Department of Defense's Strategic Terrestrial and Space Weather National Security systems. Duties: Serve as the RMF Cybersecurity Specialist for the organization's Systems Maintain Day-to-Day security analysis of RMF packages to ensure timely updates and notifications Update RMF Security … through eMASS. Maintain thorough understating of NIST 800-53 and NIST 800-171 controls and determine which controls are applicable to the application, as well as document implementation in Security Controls Tractability Matrix Conduct reviews to identify and mitigate potential security weaknesses and ensure that all security features applied to a system are implemented and functional Monitor … and resolve Plan of Action and Milestones (POA&M) to mitigate system vulnerabilities on assigned Information Systems Develop and provide IA risk management recommendations to the customer Basic Qualifications: A minimum of 5 years of relevant experience in Air Force or industry standards for Cyber Security and system accreditation pr equivalent experience with National Institute of Standards and More ❯
Zachary Piper Solutions is currently seeking a skilled Information Systems Security Officer (ISSO) to join our team supporting a long-term Air Force program in Herndon, Springfield, and Arlington, Virginia. As an ISSO, you will play a critical role in ensuring the security and compliance of the customer's critical systems. If you have a strong background … in informationsecurity, compliance, and experience working with government projects, this is an excellent opportunity for you to contribute to a mission-critical program. Responsibilities: Conduct periodic reviews of Information Systems to ensure ongoing compliance with the security authorization package. Coordinate with systems administrators to perform system scans for Assessment and Authorization (A&A) purposes and … continuous monitoring, including network devices, servers, databases, and web services. Conduct compliance audits, participate in incident handling, and lead or assist in investigations into security anomalies. Review audit logs and utilize continuous monitoring tools to identify and respond to anomalies, hacking attempts, or insider threats. Requirements: Education: Bachelor's degree (BA/BS) or equivalent work experience on Department More ❯
Role: Principal GRC Analyst (Cyber Security) Salary: Up to £71,500 + excellent pension and benefits Location: Hybrid - Occassional travel to London or Leeds I am currently recruiting a fantastic role for an organisation that play a crucial role in the UK healthcare industry, an organisation that make a positive impact on society. The role will play a key … a team of 2 and taking the lead on key GRC activities. The organistion offer supportive environment and they truly value work/life balance. Key Responsibilities Own the InformationSecurity Assurance framework and programme. Design and perform reviews to provide assurance of informationsecurity controls effectiveness. Be responsible for establishing and implementing the informationsecurity and technology risk management programme. Identify, engage and manage 3rd party organisations to ensure appropriate security assurance activities are conducted. Lead on Secure by Design activities to ensure business and technical changes meet security requirements. Liaise with other bodies to contribute to the maturing of cyber security practices across the Health and Social care More ❯
I’m working with one of our prestigious client based in the Liverpool, and they’re looking for a Cloud Security Engineer to join their InformationSecurity Team. The ideal candidate: Expertise with Azure Cloud Platform. Extensive experience working with Microsoft 365. Good experience with Firewalls, Networks, Switches, Routers & Domain Controllers. Well-versed with Security Protocols More ❯
DUTIES: Responsibilities are full time on customer's onsite and will cover classified programs and Special Access Programs (SAP). No Telework. Provide subject matter expertise and consulting on security related matters for enterprise information system and network architectures, access problems, and implementation of security policies and procedures. Assist in overseeing and managing day-to-day operation … of SAP Information Systems. Optimize system operation and resource utilization and performs system capacity planning/analysis while maintaining the security posture. Assist team in Authorization and Accreditation (A&A) process using RMF across the design lifecycle for classified systems obtaining and maintaining Interim Authority to Operate (ATO), ATO and Authority to Connect (ATC). Create and process … RMF authorization SAP packages from submission to approval/disapproval Develop and maintain IT security documents, including system security plans, risk assessments, Plan of Action and Milestones (POA&M), contingency plans, incident response plans, IT security policies and procedures. Provide recommendations regarding remediation and mitigation of identified vulnerabilities by developing plan of action and milestones (POA&Ms More ❯
CLEARED Senior InformationSecurity Engineer to join DoD consulting company. This is based in Aberdeen Proving Ground, MD (APG) and fully onsite. Essential Duties of the Sr InfoSec Engineer: Provide engineering and analysis support in support of cybersecurity requirements per AR 25-2. Provide tailored C5ISR engineering analysis concerning Cybersecurity integration. Areas of focus may include communications … Internet security and cross-domain solutions. Provide desktop hardware and software support, to include inter-operable and integrated standard office automation desktop software support. Qualifications of the Sr InfoSec Engineer: 5+ years of security engineering experience. Must be able to obtain and maintain an active Top Secret or TS/SCI clearance. Certifications such as Security+, CISSP, CySA+ … CASP, CCNA Security (Any cert that meets IAT Level II or Level III requirement) Scripting experience in Java, Python, or PowerShell. Compensation for the Sr InfoSec Engineer: $115,000 - $150,000 (based on experience) Comprehensive benefit package; Cigna Medical, Cigna Dental, Vision, 401k w/ADP, PTO, paid holidays, Sick Leave as required by law, paid holidays This job More ❯
InformationSecurity Third-Party Risk Specialist Hybrid - Southampton - 60% Time on site £42,848 - £55,000 Please note for to apply for this role you must use the link included below. Job summary Are you passionate about informationsecurity and confident assessing and managing supply chain risks? Do you have experience working with third-party suppliers … to embed secure-by-design principles and improve an organisation's security posture? Would you like to play a key role in protecting national infrastructure and influencing how security is embedded across critical digital services? Job description As a Third-Party InformationSecurity Specialist, you will play a vital role within the Maritime and Coastguard Agency … s InformationSecurity team, helping to protect our people, systems, and data across both internal operations and external suppliers. Your work will directly support MCA's broader InformationSecurity strategy, helping to embed best practices and risk awareness throughout the organisation and its supply chain. You'll influence how security requirements are considered from the More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense … and Military Compartment efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense … and Military Compartment efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense … and Military Compartment efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense … and Military Compartment efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing More ❯
Information System Security Manager (ISSM) 1's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense … and Military Compartment efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing More ❯