Cohere is seeking a DevOps Engineer. The duties of this position include: Serving as a member of the team supporting the installation, optimization, integration, troubleshooting, backup, recovery, modification, security, and upgrading of IT systems and components Architect and design CI/CD support systems that will be used by all application within the organization Designing and implementing systems that … versions of supported software, as they become available Working with other staff to recommend and design system architectures and topologies from both general and specific perspectives Work with organization InformationSecurity personnel to ensure that security best practices are adopted and implemented within the code deliver and deployment processes Reviewing and confirming application code conforms to Enterprise … own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computer security and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
research. This is an on-site position in Annapolis Junction, MD. Responsibilities: Use reverse engineering techniques to delve into the inner workings of various systems and software to uncover security vulnerabilities Develop proof-of-concept exploits that showcase the impact of vulnerabilities Collaborate with cross-functional teams to ensure products are effective Propose and develop tooling that will increase … the team Required Skills: U.S. Citizenship is required Active TS/SCI with the ability to obtain Poly is required Bachelor's or Master's degree in Computer Science, InformationSecurity, or a related field (can be waived) A minimum of 2 years of hands-on experience in vulnerability research and reverse engineering Experience developing exploits and payloads … Strong understanding of low-level systems, software design, and security practices Proficiency in programming languages such as C, Python, and Assembly Experience with Ghidra, IDA Pro, or Binary Ninja Excellent communication and collaboration skills Ability to work independently and as part of a team Preferred Skills: Deep understanding and experience with more than one CPU architecture Proven history of More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
RogueThink Inc
a lasting impact. Job Description: We are seeking a talented and detail-oriented DevSecOps Engineer II to join our growing team. This mid-level role is responsible for integrating security into every phase of the software development and deployment lifecycle, automating CI/CD pipelines, and managing cloud infrastructure in a secure and scalable way. You will work closely … with development, operations, and security teams to ensure robust, secure, and compliant delivery of applications. Responsibilities: • Design, implement, and manage CI/CD pipelines with integrated security gates and … automation tools. • Develop Infrastructure as Code (IaC) using tools like Terraform, Ansible, or CloudFormation. • Deploy, monitor, and secure containerized applications using Docker and Kubernetes (or OpenShift). • Collaborate with InfoSec to integrate compliance and security scanning tools (e.g., SAST, DAST, SCA) into build pipelines. • Implement and monitor security controls and configurations in cloud platforms (AWS, Azure, or GCP More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Cambridge University Press
Job Title: Head of Security Governance, Risk & Compliance Salary: £70,400 - £94,100 Location: Cambridge/Hybrid Minimum 2 days a week in the office Contract: Permanent The Head of Security GRC is a senior leadership role within the Security SMT, tasked with driving the organisation's security governance, risk, and compliance strategy. This position engages … all levels of the business, ensuring regulatory compliance, effective risk management, and robust assurance processes to support decision-making by the Senior Leadership Team. You will deliver a robust Security Assurance Framework, oversee supplier assurance activities, and maintain relevant ISO and Cyber Essentials certifications. Additionally, you'll drive the implementation of security standards, policies, governance reporting, and audit … programmes to ensure robust controls are in place. You'll play a critical role in enabling informed decision-making and promoting a culture of security awareness across the organisation. We are Cambridge University Press & Assessment, a world-leading academic publisher and assessment organisation and a proud part of the University of Cambridge. About the role The position involves engaging More ❯
the supply chain - and we're looking for talented people who want to help. You'll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You'll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly … the largest enterprises, and leading government agencies. We do this by building, maintaining, and securing one of the largest, most complex networks in the world. Within AWS, the Infrastructure Security Organization - Hardware Lifecycle Security (InfraSec-HLS) team is responsible for validating the devices and components within them throughout the hardware lifecycle across global AWS datacenters. The AWS InfraSec … HLS team is seeking a Software Development Engineer II to join our Infrastructure Security-HLS Software Development team. In this role, you will responsible for building, maintaining, and scaling the software solutions that support the security of our devices that form the foundation of our cloud. You will work with Software Development Engineers, Security Engineers, and Software More ❯
people-centered solutions. By delivering diverse, multi-talented professionals, we help our clients achieve their goals and fulfill critical missions. Our trusted partners include the Bureau of Industry and Security, DoD Washington Headquarters Services, U.S. Air Force, U.S. Coast Guard, USAID, CFPB, GSA, CDC, and ACF, among others. We are currently seeking a full-time Helpdesk Specialist with a … and preventive maintenance of desktop, laptop, tablet, and mobile devices to apply necessary changes to configuration, application of patch updates, etc. Ensuring that desktop, laptop, tablet, and mobile devices' security settings are configured according to the Chief InformationSecurity Office (CISO) guidance. This includes, but is not limited to, access control, audit, and network configuration settings. Ensuring More ❯
Cloud Platform Engineer (DV Security Clearance) Position Description Secure Innovation is part of CGI's Space, Defence, and Intelligence business unit, focused primarily on the delivery of contemporary and innovative technical solutions for the government agencies most challenging problems. Our teams work alongside our clients to help them understand how to exploit technologies to maintain competitive advantage. Our systems … are engineered for performance, security, reliability and scalability; built with modern CI and CD tooling and techniques. We're looking for experienced Platform Architects who can design, build, and maintain the platforms upon which our products and services are developed and/or run. CGI was recognised in the Sunday Times Best Places to Work List 2025 and has … community of experts. We'll train and support you in taking your career wherever you want it to go. Our roles are only available if you hold a UK Security Clearance and are a sole UK National due to the secure nature of the project. You will either hold a higher level clearance or be willing to obtain it. More ❯
POSITION: Computer Network Systems Engineer LOCATION: El Segundo, CA REQUIRED SECURITY CLEARANCE: Active TSI with SCI eligibility POSITION TYPE/STANDARD WORK HOURS: Full time, 40 hours THE OPPORTUNITY: Upon award, BTAS will be filling potential openings for the Space Systems Command (SSC). SSC plays a critical role in advancing the United States's space capabilities, delivering cutting … program authorizations, including Authority to Operate, Authority to Test, and Authority to Connect. Support cyber testing and assessment activities, documenting findings and corrective actions in compliance with the Federal InformationSecurity Management Act. MINIMUM QUALIFICATIONS: Subject-matter expertise in computer networks, network protocols, and network architecture Integrating and engineering cybersecurity into mission systems Developing cyber tools for use More ❯
DUTIES AND RESPONSIBILITIES Experience in creating System Security Plans and obtaining system certifications. Experience with Agency Security Directives, Policies, Publications and Regulations is desired. REQUIREMENTS & EXPERIENCE Seven (7) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity required. Bachelor's degree in Computer Science, Information Assurance, InformationSecurity System More ❯
ensuring successful delivery of a strategically important project aligned to enhanced access controls and user permissions. While the project has some touch points with informationsecurity , deep InfoSec experience is not essential - but any awareness or exposure is a definite bonus. Key Requirements: Proven experience as a Senior Project Manager delivering complex business and technical projects within the … of project initiation , team mobilisation , and end-to-end delivery. Comfortable working in fast-paced, evolving transformation environments. Excellent stakeholder management and communication skills. Exposure to or understanding of informationsecurity principles is advantageous but not essential. This is a fantastic opportunity to join a highly engaged, collaborative team on their growth journey in an initial 6 month More ❯
ensuring successful delivery of a strategically important project aligned to enhanced access controls and user permissions. While the project has some touch points with informationsecurity , deep InfoSec experience is not essential - but any awareness or exposure is a definite bonus. Key Requirements: Proven experience as a Senior Project Manager delivering complex business and technical projects within the … of project initiation , team mobilisation , and end-to-end delivery. Comfortable working in fast-paced, evolving transformation environments. Excellent stakeholder management and communication skills. Exposure to or understanding of informationsecurity principles is advantageous but not essential. This is a fantastic opportunity to join a highly engaged, collaborative team on their growth journey in an initial 6 month More ❯
Role: Bid Administrator (Information Technology) Location: Leeds, West Yorkshire Salary: £30,000 - £35,000 Plus 25 Days Holiday, Private Pension, Vendor Certifications and more! About the Company: Our client, a global leader in Sustainability Consulting, is seeking an IT Bid Administrator to join their dynamic team. This role will involve providing crucial IT and informationsecurity support … for client requests for information, ensuring all responses are accurate, comprehensive, and aligned with client requirements. The successful candidate will work in a fast-paced environment, assisting in the preparation of bid documents and responding to security and IT-related questionnaires. Position Overview: The IT Bid Administrator will work closely with the InformationSecurity and IT … teams to provide comprehensive support for client bids. You will ensure that all client requirements regarding IT and informationsecurity are met by reviewing and responding to client documentation, identifying potential risks, and highlighting exceptions. The ideal candidate will be detail-oriented, possess strong analytical skills, and have the ability to thrive in a fast-moving environment. Key More ❯
LS18, Rodley, City and Borough of Leeds, West Yorkshire, United Kingdom
Elevate Technology Group Ltd
Role: Bid Administrator (Information Technology) Location: Leeds, West Yorkshire Salary: £30,000 - £35,000 Plus 25 Days Holiday, Private Pension, Vendor Certifications and more! About the Company: Our client, a global leader in Sustainability Consulting, is seeking an IT Bid Administrator to join their dynamic team. This role will involve providing crucial IT and informationsecurity support … for client requests for information, ensuring all responses are accurate, comprehensive, and aligned with client requirements. The successful candidate will work in a fast-paced environment, assisting in the preparation of bid documents and responding to security and IT-related questionnaires. Position Overview: The IT Bid Administrator will work closely with the InformationSecurity and IT … teams to provide comprehensive support for client bids. You will ensure that all client requirements regarding IT and informationsecurity are met by reviewing and responding to client documentation, identifying potential risks, and highlighting exceptions. The ideal candidate will be detail-oriented, possess strong analytical skills, and have the ability to thrive in a fast-moving environment. Key More ❯
looking to recruit an IT Bid Assistant to support IT aspects of client requests for information. The role involves providing responses to client questionnaires and bid documents from an informationsecurity and IT perspective. We believe this is an excellent opportunity for professionals with a legal, document review, risk or compliance background who are looking to work in … a fast-paced global business. IT Bid Assistant - Key Duties and Responsibilities Reviewing client requirements to ensure InformationSecurity and technical IT requirements are accurately submitted, using standard responses. Highlighting risks and exceptions using standard responses and processes. Maintaining the InformationSecurity & IT responses template. Other duties as required to support the IT and InformationSecurity teams. Duties will vary and be revised due to the nature of the IT environment. IT Bid Assistant - Qualifications Our client is looking for a confident individual with strong interpersonal skills, able to deal with people at all levels and communicate to users in a clear, non-technical language. Team-player Excellent attention to detail Good analytical More ❯
who are one of a major driving forces behind Innovative Development of Enterprise-Led Internet Technology. Role Overview: As a Vulnerability Management/SOCAnalyst you will focus on Technical InformationSecurity within the Security Function , within a major part of the Organisation's Vulnerability Management Team . You will work closely within the Security Department covering … Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are met whilst Minimising Operational Impacts to Endpoints Scheduling Internal & External Resources to Ensure Targets are Met Work across Full InformationSecurity Project Lifecycle Ensure Compliance with Security Policies & Procedures Act as an Escalation Point & Coordinate with other Teams when required Key Skills & Experience Required for SOC Analyst … role will include: Strong Understanding of Information/Cyber Security Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with Incident Response Procedures & Investigations Strong Verbal & Written Communication Skills High Attention to Detail Strong Team Player Searches: SOC More ❯
and services that help people, businesses and governments realize their greatest potential. Title and Summary Manager, Industry Standards Manager, Industry Standards Overview The Industry Standards team within Mastercard’s Security Solutions Organization provides security standards and solutions to ensure the safety and security of the global Mastercard ecosystem. These security standards & solutions cover all areas of … the payments industry inclusive of cardholder data environments, mobile payment devices, traditional cards and terminals as well as leading in the development and implementation of emerging payment security standards covering new technologies such as tokenization and point-to-point encryption. As the Manager, Industry Standards you will focus on the EU region and contribute to the development of security … in the EU region • Drives involvement in standards creation and refinement from key internal and external stakeholders by collaborating to understand market position and needs and develop solutions • Provides security considerations for products both internally and through business partner relationships • Manages product and standards programs with global stakeholders Experiences • In depth experience applying, interpreting and/or assessing various More ❯
Design and implement a Windows 11 hybrid-joined build, utilizing Intune as the primary management system. Serve as the final escalation point for the desktop engineering team. Collaborate with InformationSecurity teams to ensure compliance with security standards Develop and deploy Azure AD-joined, Intune-managed, Autopilot Windows 10 desktop builds. Automate complex desktop provisioning and management … of unused virtual desktops. CPU right-sizing based on VMware usage statistics. Azure VDI deployment workflows. • Serve as the final escalation point for the desktop engineering team. • Collaborate with InformationSecurity teams to ensure compliance with security standards. Key Qualifications & Experience Proven experience as a Desktop Architect or similar role in enterprise environments. Strong expertise in Windows … VMware. Strong troubleshooting skills and ability to handle escalations effectively. Preferred Qualifications Microsoft and Citrix certifications (e.g., Microsoft Azure Solutions Architect, Citrix Certified Expert) are a plus. Experience with security and compliance in desktop infrastructure. Strong stakeholder management and cross-functional collaboration skills More ❯
Potters Bar, Hertfordshire, England, United Kingdom
Canada Life
helping teams manage technology risk. Collecting and analysing data on control effectiveness and assess the impact on risk posture including: IT Risk Register Open actions resulting from audits Open security exceptions Risk and control effectiveness Act as a point of contact and SME to ensure the Risk Controls Framework is effectively rolled out across all teams, working and collaborating … develop and implement risk mitigation strategies and controls, and tracking any subsequent action plans Conduct risk analysis to identify potential, or emerging, technology risks and vulnerabilities, gathering and preparing information to the Risk Owner to assist with decision making Responsible for working with key business stakeholders annually to attest to the InformationSecurity Operating Policy Work with … European CSIO and Security function to ensure alignment between functions, to ensure policies are adhered to and reported consistently Skills, Knowledge and Experience 1st Risk Management experience In depth knowledge of Risk Management frameworks and processes including informationsecurity and technology risk controls Excellent communication skills, demonstrating a clear and articulate standard of written and verbal communication More ❯
m currently supporting a forward-thinking organisation that's undergoing a major digital and tech transformation. They're looking for a Security Operations Analyst to join their growing InfoSec team and play a key role in protecting systems, data, and people from the latest cyber threats. This is a fantastic opportunity for someone passionate about cybersecurity to gain real … Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good communication skills A genuine passion for InfoSec and making a difference Details: Salary: up to £40,000 Up to 10% bonus Strong pension Location: Leeds - 2x a month in the office If this sounds of interest email More ❯
Fluent English required, other languages desirable Advanced Word, Excel, and PowerPoint skills required, knowledge of Project Management tools preferred Bachelor's degree in marketing, business or equivalent experience Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
Professional Services industry who require a Senior SOC & Incident Response Engineer to join the firm in London. This candidate will develop and integrate an Incident Response (IR)/SOC security infrastructure to monitor the Firm's on prem and cloud environments. Responsibilities: * Drive and improve continuous monitoring and incident response, serving as a senior resource in our SOC and … and integrate platforms, tools, service providers, and solutions into our IR/SOC systems, make recommendations as needed. * Ensure integration of input from the Firm's deployed suite of security tools to SOC systems (e.g. SIEM/SOAR), including, but not limited to, IDS/IPS, End Point Protection, MDR/XDR, PAM, MFA, DNS Security, and cloud … security posture management. * Ensure the Firms Incident Response and security monitoring systems adhere to security best practices and baselines to ensure a secure configuration of platforms and resources. Required Skills: * 8+ years of hands-on experience in informationsecurity related responsibilities with a strong focus on SOC engineering, incident response, and thread detection/hunting More ❯
example with hands-on approaches to demonstrate product management excellence and share best practices • Demonstrate and drive Mastercard Way behaviours through their behaviour, (e.g. customer and stakeholder interactions) Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with … an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: • Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed; • Report any suspected informationsecurity violation or breach, and • Complete all periodic mandatory security training in accordance with More ❯
architectural designs across a variety of use cases. • Define and document technical requirements in collaboration with Product Managers, Engineering, UX, and Legal & Privacy teams. • Stay current on industry trends, security protocols, and emerging technologies relevant to digital payments and authentication. All About You • 7+ years in product architecture, technical product management, or solution architecture roles—ideally in digital payments … deployments is a strong advantage. • Proven ability to work with extremely fast paced environment, meet deadlines, and collaborate effectively across teams. • Bachelor’s degree required, Advanced degree preferred. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard’s security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines. More ❯
open to future engagements, we’d love to hear from you. Contact: Rick McGhee Let’s connect ahead of demand. Seniority level Executive Employment type Part-time Job function Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at Alpha Associates Recruitment by 2x Sign in to set job alerts for “Chief InformationSecurity Officer” roles. Manchester, England, United Kingdom 3 months ago Greater Manchester, England, United Kingdom 3 days ago InformationSecurity Architect - AJ Bell Manchester, England, United Kingdom 2 days ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J-18808-Ljbffr More ❯
and ongoing maintenance of Identity and Access Management (IAM) policies and procedures. You will play a key role in identifying, assessing, and mitigating IAM-related risks to ensure the security and compliance of organizational access systems. As an IAM Specialist, you will collaborate with cross-functional teams to deliver global IAM services, streamlining identity and access management across the … to contribute to a secure and efficient IAM framework while supporting a leading organization in the systems integration space. If you have experience in IAM solutions, risk management, and security best practices, apply now! Responsibilities: Provide consultancy on IAM Best Practices (technical, governance & process) to different stakeholders/teams. Overall responsibility for the development and maintenance of IAM policies … Act as a point of escalation for any IAM alerts or issues which has been raised by other departments, or potentially from monitoring systems. Keep abreast of trends in informationsecurity and be able to propose proactive mitigation as appropriate. Skills/Must have: Significant prior experience as a subject matter expert within Identity and Access Management, in More ❯