methods of data presentation. Assisting in design modification by compiling data related to design, specifications, and materials that are pertinent to specific items of equipment or component parts; developing information concerning previous operational failures and modifications, and using judgement and initiative to recognize inconsistencies or gaps in data and seek sources to clarify informationSecurity Clearance: Security … Business (VOSB) founded as a counterintelligence (CI) and Human Intelligence (HUMINT) company in 2008. We are a global operations and solutions integrator delivering full-spectrum intelligence analysis support, training, security, and RD&E support solutions to the Department of Defense and throughout the intelligence community. Prescient Edge is an Equal Opportunity Employer (EEO). All applicants will receive consideration More ❯
methods of data presentation. Assisting in design modification by compiling data related to design, specifications, and materials that are pertinent to specific items of equipment or component parts; developing information concerning previous operational failures and modifications, and using judgement and initiative to recognize inconsistencies or gaps in data and seek sources to clarify informationSecurity Clearance: Security … Business (VOSB) founded as a counterintelligence (CI) and Human Intelligence (HUMINT) company in 2008. We are a global operations and solutions integrator delivering full-spectrum intelligence analysis support, training, security, and RD&E support solutions to the Department of Defense and throughout the intelligence community. Prescient Edge is an Equal Opportunity Employer (EEO). All applicants will receive consideration More ❯
Cyber Technician position. The expected date of the award is September 2025. Primary responsibilities include: • Implement and uphold cybersecurity policies, procedures, and countermeasures • Research, draft, and provide input regarding informationsecurity policies, trusted computing base architectures, and security engineering practices and processes • Support the ISSM and Control System Security Specialist to craft cybersecurity documentation; to include … Risk Management Framework (RMF) process to provide and develop any necessary system documentation, settings, self-assessments, and specifications required for the favorable accreditation of the RMF packages • Implement a security configuration for all hardware and software components of the project to satisfy compliance with the security controls identified in governing documentation • Ensure that the standard methodology for installation … lead in design, documentation and delivery of cybersecurity artifacts for system, subsystems certification and accreditation • Work in concert with both the Engineers and Program Manager to formulate and document security related activities • Support all cyber assessments and audits to include Cyber Operations Rapid Assessment (CORA) and unplanned audits Job Requirements • 1 or more of the following Industry Certifications: CCSP More ❯
methods of data presentation. Assisting in design modification by compiling data related to design, specifications, and materials that are pertinent to specific items of equipment or component parts; developing information concerning previous operational failures and modifications, and using judgement and initiative to recognize inconsistencies or gaps in data and seek sources to clarify informationSecurity Clearance: Security … Business (VOSB) founded as a counterintelligence (CI) and Human Intelligence (HUMINT) company in 2008. We are a global operations and solutions integrator delivering full-spectrum intelligence analysis support, training, security, and RD&E support solutions to the Department of Defense and throughout the intelligence community. Prescient Edge is an Equal Opportunity Employer (EEO). All applicants will receive consideration More ❯
methods of data presentation. Assisting in design modification by compiling data related to design, specifications, and materials that are pertinent to specific items of equipment or component parts; developing information concerning previous operational failures and modifications, and using judgement and initiative to recognize inconsistencies or gaps in data and seek sources to clarify informationSecurity Clearance: Security … Business (VOSB) founded as a counterintelligence (CI) and Human Intelligence (HUMINT) company in 2008. We are a global operations and solutions integrator delivering full-spectrum intelligence analysis support, training, security, and RD&E support solutions to the Department of Defense and throughout the intelligence community. Prescient Edge is an Equal Opportunity Employer (EEO). All applicants will receive consideration More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
TMC Technologies
Create API integration and automation scripts with the Python programming language. - Provision/configure required software onto servers, such as web servers and databases. - Evaluate, improve, and maintain the informationsecurity throughout the Linux infrastructure. - Monitor and correct server issues and create recovery processes for failures and performance bottlenecks. - Manage and monitor all installed systems and infrastructure. - Possess … ensure the highest levels of systems and infrastructure availability. - Monitor and test application performance for potential bottlenecks, identify possible solutions, and work with developers to implement those fixes. - Maintain security, backup, and redundancy strategies. - Write and maintain custom scripts to increase system efficiency and lower the human intervention time on any tasks. - Participate in the design of information and operational support systems. - Provide 4th level support. - Build new baselines with the appropriate security and access controls to include DISA STIGS and required security controls. Updated baselines will be required quarterly and new versions within 90 days of the manufacturer's release to production and full DISA STIGS. - Engineer multi factor authentication between Linux environments and More ❯
evaluate business operations, processes, and systems and identify areas for improvement using data analysis techniques to provide recommendations for efficiencies and cost savings/avoidance and Identify issues, gather information, and provide recommendations and draft documentation to achieve overall goals for organizational strategic planning. They shall provide program support for reviews, conferences, briefings and other meetings, identify and analyze … effectively with clients to identify needs and evaluate alternative business solutions 5) Continually seeking opportunities to increase customer satisfaction and deepen client relationships b) Achieving operational objectives and contributing information and recommendations to strategic plans and reviews c) Implementing productivity and quality standards d) Providing technical direction and guidance to contractor staff to ensure Contract requirements and expectations are …/or multiple projects simultaneously Qualifications The PM must have 10+ year of program management experience and 5+ years of cloud operations experience, bachelors in business administration computer science, information technology, informationsecurity or a related field, and must obtain a Top-Secret clearance prior to starting work under this contract.Additionally, the PM must be certified Program More ❯
worldwide rely on Thales. Thales is a business where brilliant people from all over the world come together to share ideas and inspire each other. In aerospace, transportation, defence, security and space, our architects design innovative solutions that make our tomorrow's possible.Together we offer fantastic opportunities for committed employees to learn and develop their career with us. At … and services that impact the lives of millions of people each day to make life better, and keep us safer. We innovate across the major industries of Aerospace, Defence, Security and Space. Your health and well-being matters to us and that's why we offer you the flexibility to do what's important to you; whether that's … or the ability to flex your start and finish times. Where possible, we support a working pattern that suits your lifestyle and helps you reach your ambitions. Deputy Site Security Manager LR07 Glasgow Are you looking to build your career as a security professional? Do you want the opportunity to work within a highly regarded team that will More ❯
expertise to Operations engineers and technicians, supporting fault isolation and resolution. Solve tough problems with innovative and scalable solutions. Develop secure network designs including configurations that align with Defense InformationSecurity Agency (DISA) Security Technical Implementation Guides (STIGs) and enterprise policies. Obtain Authority to Operate (ATO) for new devices, software, and capabilities. Supervise (not manage) other network … and 4 years, bachelor's and 6 years, associates and 8 years or HS diploma and 10 years. Required qualifications include the following: Must be compliant with DoD 8570 Information Assurance Technical (IAT) Level 2 (Security+ CE) Experience specific to network engineering to include Tier III or higher network operations and/or network design and implementation. Prior responsibility More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
be a fit, click here to submit a referral. If your referral is hired, you'll receive a $3000 payment! code-extrefer Basic Qualifications: • Candidate must possess active US security clearance with a polygraph • 10 years overall experience with a Master's degree in computer science, information assurance, informationsecurity systems engineering, or related discipline from … an accredited college. OR additional 2 years equivalent experience with a Bachelors. OR 16 years overall equivalent experience without Bachelors or Masters. • IAT Information Assurance Technical Level 111 (3) baseline certification as defined by DoD 8570.01-M • Cisco certification Desired Skills: • Experience in network administration • Experience in working with applicable network devices to include repeaters, bridges, routers, gateways, and … and DNS • Experience with integrated processing environments such as Storage Area Networks • Cisco certifications preferred (CCNA, CCNP, CCIE) Clearance Level: TS/SCI w/Poly SP Other Important Information You Should Know Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills More ❯
We have an exciting opportunity for a Software Security Engineer to join our Global Healthcare client. As a Security Engineer, you ll provide hands-on technical expertise to guide software development, delivery and continuous improvement focusing on risk and security. You ll help evolve our client s new Digital Platform so that it s secure and compliant with … both internal and industry regulations. You ll analyse new feature code to identify security risks and work with engineers to mitigate them, working and applying modern security standards such as OWASP CI/CD, DSOMM, SAMM and Cloud Security Posture management systems such as Azure Defender and Prisma Cloud. Our client empowers their people to balance their … DAST (preferred) ideally with HTTP APIs Ability to manage large scale software estates from a operational perspective (build, release, monitoring, rollbacks, high availability, etc) Hands on experience building automated security test suites JOB DESCRIPTION Analysing new feature code to identify security risks and working with engineers to mitigate Delivering improvements to our DSOMM score, either working with teams More ❯
Secret SCI with Full Scope Polygraph Note: Please ensure clearance is clearly listed on your resume and in application notes. Position Summary: We are seeking a highly skilled and security-cleared Senior System Administrator to join our team in North Charleston, SC. In this role, you will manage and support critical infrastructure, oversee system integration, and ensure the security … for delivery systems. Participate in the design, validation, and configuration management of computing systems. Plan and coordinate system changes and upgrades. Administer user access and implement safeguards to meet security requirements. Monitor system performance and support capacity planning, backup, and disaster recovery strategies. Mentor and train junior team members; lead by example in technical excellence and collaboration. Basic Qualifications … of experience working cross-functionally with stakeholders at all levels, including executive leadership. Preferred Qualifications: 5+ additional years of related work experience or equivalent education. Active certifications in Cloud, InformationSecurity, or related fields. Experience with virtualization platforms such as AHV, VMware ESXi, or Hyper-V. Familiarity with VDI infrastructure, system monitoring, and secure infrastructure practices. Experience using More ❯
We have an exciting opportunity for a Software Security Engineer to join our Global Healthcare client. As a Security Engineer, you’ll provide hands-on technical expertise to guide software development, delivery and continuous improvement focusing on risk and security. You’ll help evolve our client’s new Digital Platform so that it’s secure and compliant with … both internal and industry regulations. You’ll analyse new feature code to identify security risks and work with engineers to mitigate them, working and applying modern security standards such as OWASP CI/CD, DSOMM, SAMM and Cloud Security Posture management systems such as Azure Defender and Prisma Cloud. Our client empowers their people to balance their … DAST (preferred) ideally with HTTP APIs Ability to manage large scale software estates from a operational perspective (build, release, monitoring, rollbacks, high availability, etc) Hands on experience building automated security test suites JOB DESCRIPTION Analysing new feature code to identify security risks and working with engineers to mitigate Delivering improvements to our DSOMM score, either working with teams More ❯
seeking creative and dedicated professionals to fulfill their career goals and objectives while delivering mission excellence on programs of national importance. We are seeking a strategic, organized, and proactive Information Technology (IT) subject matter expert (SME) and thought leader with expertise in technical areas, specializing in Cloud, Enterprise Architecture, Geospatial solutions, and associated platforms and tools. As the IT … the portfolio of projects to include Concept of Operations (CONOPs) Serving as a technical liaison with regard to system architecture that focuses on performance, availability, redundancy, data protection, and informationsecurity Collaborating with customers to evaluate mission drivers, identify challenges, define mitigation strategies, assess applications and services, develop transition plans, and develop business cases in support of Cloud More ❯
lines of business, team members, management, key stakeholders and external contacts (e.g., vendors, etc.) • Identify and work collaboratively with the client and other stakeholder groups (Operations, PVM, EPMO, OGC, InformationSecurity, etc.) to achieve objectives and ensure alignment with strategy and business operations • Drive partner satisfaction by learning and understanding partner needs, being responsive to issues, integrating partners … Obtain and analyze vendor performance and delivery data for to ensure quality, consistency, and fairness to inform sourcing activities • Maintain vendor related documentation, including source selection records, supplier performance information, compliance metrics, and value capture results • Ability to develop the overall strategy for a product category and researches new product options in the category to drive TCO savings and More ❯
Security Engineer Oliver James are partnered with a forward-thinking UK organisation that are embarking on the most radical and ambitious transformation programme in the history of its Healthcare business. In response to a changing UK health landscape, the rapid growth of the preventative wellbeing sector, and the need for bold simplification, this organisation is uniting several internal businesses … into a single, streamlined digital offering. The mission? To empower people to be the best version of themselves-with health and wellbeing at the core. As a Security Engineer , you'll be a key player in this journey-applying modern security practices across a newly developed Digital Platform that underpins the transformation. You'll work across agile engineering … teams to ensure security is embedded into every layer of the technology stack, from design through to deployment and monitoring. What You'll Be Doing: Security by Design: Collaborate with engineering teams to assess new features and services, identify potential vulnerabilities, and design secure solutions from the ground up. Code & Tooling Contribution: Play a hands-on role in More ❯
expertise to Operations engineers and technicians, supporting fault isolation and resolution. Solve tough problems with innovative and scalable solutions. • Develop secure network designs including configurations that align with Defense InformationSecurity Agency (DISA) Security Technical Implementation Guides (STIGs) and enterprise policies. Obtain Authority to Operate (ATO) for new devices, software, and capabilities. • Supervise (not manage) other network … a master's and 10 years, a bachelor's and 12 years, an associate and 14 years, or HS and 16 years. • Compliance with Department of Defense (DoD) 8570 Information Assurance Technical (IAT) Level 2 (Security+ CE). • Experience specific to network engineering to include Tier III or higher network operations and/or network design and implementation. • Prior More ❯
Required Clearance: TS/SCI with polygraph. (/sci) () Required Qualifications: Must have ten (10) years of experience in hands on systems administration. Bachelor's degree in Computer Science, Information Assurance, InformationSecurity System Engineering, or related discipline from an accredited college or university is preferred. DoD 8570 IAT Level 2 Certification Security + Required. Ready … to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations More ❯
IT and Digital Procurement S2P experience. Understanding of software licensing models, including SaaS, perpetual, subscription, and cloud-based agreements Experienced with commercial IT and Digital contract negotiation. Familiar with informationsecurity, GDPR, and regulatory compliance as it applies to third party IT services Proven experience identifying and managing key suppliers mitigating risks, understand market trends and monitor supplier More ❯
leading a high-impact systems development and operations team? If so, join us! This role is responsible for leading a team accountable for the operational performance, customer experience, maintenance, security, and functional parity of Builder Tools in US Amazon Dedicated Cloud (ADC) regions. ADC regions are designed for customers with unique personnel, physical, and informationsecurity requirements. … decisions, identify risks, and evaluate the solution and operational quality of their engineering teams. - Putting mechanisms in place to drive operational excellence and ensuring team compliance with policies (e.g., informationsecurity, data handling, accessibility, service level agreements). - Oncall support in ADC regions, and when an issue or outage occurs, they are responsible for ensuring the COE process … mangers, and needs people who want to be team players in an environment where they will be supported by their peers. The candidate selected must obtain and maintain a security clearance at the TS/SCI with polygraph level. Upon start, the selected candidate will be sponsored for a commensurate clearance for each government agency for which they perform More ❯
research. This is an on-site position in Annapolis Junction, MD. Responsibilities: Use reverse engineering techniques to delve into the inner workings of various systems and software to uncover security vulnerabilities Develop proof-of-concept exploits that showcase the impact of vulnerabilities Collaborate with cross-functional teams to ensure products are effective Propose and develop tooling that will increase … the team Required Skills: U.S. Citizenship is required Active TS/SCI with the ability to obtain Poly is required Bachelor's or Master's degree in Computer Science, InformationSecurity, or a related field (can be waived) A minimum of 2 years of hands-on experience in vulnerability research and reverse engineering Experience developing exploits and payloads … Strong understanding of low-level systems, software design, and security practices Proficiency in programming languages such as C, Python, and Assembly Experience with Ghidra, IDA Pro, or Binary Ninja Excellent communication and collaboration skills Ability to work independently and as part of a team Preferred Skills: Deep understanding and experience with more than one CPU architecture Proven history of More ❯
Provide system administration expertise in a small environment of highly specialized users, Windows workstations, Windows servers, Linux servers, File shares, and hypervisors Provide guidance and support for infrastructure and informationsecurity needs, to include ongoing accreditation activities Interface and support program management, system and software engineers, and other team members Implement system administration best practices to ensure the … subcontractor. We have proven track record of successfully providing innovative technology services and solutions on highly mission-focused programs; all while enjoying what we do at the same time. Security is our priority; together, we will make the nation a safer place. Benefits at Navstar Highly Competitive Health Care Premiums, including 100% employer paid for employee Flexible Spending Accounts More ❯
expertise to Operations engineers and technicians, supporting fault isolation and resolution. Solve tough problems with innovative and scalable solutions. • Develop secure network designs including configurations that align with Defense InformationSecurity Agency (DISA) Security Technical Implementation Guides (STIGs) and enterprise policies. Obtain Authority to Operate (ATO) for new devices, software, and capabilities. • Supervise (not manage) other network More ❯
/from a range of internal and external systems Manipulate and link different data sets to inform space management activities and benchmarking Interpret and apply the Estates data and informationsecurity standards, policies and procedures to data management activities Perform space database queries across multiple tables to extract data for analysis Perform routine statistical analysis for estates reporting More ❯
DUTIES AND RESPONSIBILITIES Experience in creating System Security Plans and obtaining system certifications. Experience with Agency Security Directives, Policies, Publications and Regulations is desired. REQUIREMENTS & EXPERIENCE Seven (7) years' experience as an ISSE on programs and contracts of similar scope, type, and complexity required. Bachelor's degree in Computer Science, Information Assurance, InformationSecurity System More ❯