London, England, United Kingdom Hybrid / WFH Options
CENSUS SA
About CENSUS CENSUS is an internationally acclaimed Cybersecurity services provider. We support the needs of multiple industries, providing IT and OT security services to public and private organizations around the world, ranging from financial institutions and critical infrastructure to automotive and secure communications, including Fortune 500 companies. Powered by cutting-edge research, scientific analysis, and in-depth engineering experience … across various industries & technologies, CENSUS delivers unparalleled security consulting & assessment services for products (software, services, devices, and large-scale platforms), infrastructure, and organizations. Learn more about CENSUS at census-labs.com . About the Job/Key Responsibilities CENSUS’ bespoke cybersecurity services are built upon a talented pool of Security Engineers, whose role extends beyond mere adherence to industry … Drawing from their robust technical background and leveraging their project & stakeholder management skills, TPMs serve as the primary facilitators empowering our clients to effectively maximize the potential of our security and advisory teams. We are looking for talented & ambitious professionals to grow our Product Security Professional Services team and join our ongoing mission to deliver in-depth and More ❯
you! So, even if you feel that you're close but not an exact match, we encourage you to apply. Overview We are looking to add an experienced Senior Security Engineer to our Gallagher Technology Team. This role will be part of the global security architecture and engineering function in the UK, working closely with twin teams in … offer hybrid working, allowing you to spend two days a week in the office and three days working from home. Join a world-class team committed to driving exceptional security standards and making a real impact! How you'll make an impact Define and build InformationSecurity engineering standards, artefacts, design patterns, and technical specification documents. Provide … on Network Protocols, Remote Connectivity, Threat Prevention, Sandbox, DDoS, URL Filtering, and SSL decryption. Participate in troubleshooting design level issues. Assess, monitor, and recommend improvements to the global network security architecture to improve security posture, mitigate risks, and balance costs. Apply skills to security services and help build and protect enterprise systems, applications, data, and assets across More ❯
City of London, England, United Kingdom Hybrid / WFH Options
Arthur J. Gallagher & Co
you! So, even if you feel that you’re close but not an exact match, we encourage you to apply. Overview We are looking to add an experienced Senior Security Engineer to our Gallagher Technology Team. This role will be part of the global security architecture and engineering function in the UK, working closely with twin teams in … offer hybrid working, allowing you to spend two days a week in the office and three days working from home. Join a world-class team committed to driving exceptional security standards and making a real impact! How you'll make an impact Define and build InformationSecurity engineering standards, artefacts, design patterns, and technical specification documents. Provide … on Network Protocols, Remote Connectivity, Threat Prevention, Sandbox, DDoS, URL Filtering, and SSL decryption. Participate in troubleshooting design level issues. Assess, monitor, and recommend improvements to the global network security architecture to improve security posture, mitigate risks, and balance costs. Apply skills to security services and help build and protect enterprise systems, applications, data, and assets across More ❯
Chippenham, England, United Kingdom Hybrid / WFH Options
Bechtle
Pre-Sales Consultant - Security As a Pre Sales-Cyber Security Consultant, you will work closely with Account Managers and Post Sales teams to build, influence and challenge a client's cyber security strategy and services, leading to creating and delivering end-to-end solutions. As a member of the Technical Pre-Sales function of Bechtle UK's … Business Solutions and Services division, you will be pivotal to the overall growth of Bechtle UK's Security pillar. As a team, we are centred around understanding customer challenges and supporting the improvement of an organisations security posture to defend against the increasing threat landscape. You will support pre-sales engagements through gaining an understanding of client technical … requirements and ensure the solution and/or service meets expectations. Job Role Responsibilities Deliver strategic whiteboarding sessions to develop and implement security strategies. Ensure a natural focus sits in protecting an organization's technology infrastructure and data from cyber-attacks. Work closely with the sales team to understand client needs and objectives. Lead the process of designing, reviewing More ❯
support software applications currently hosted on-premises to be hosted within the AWS GovCloud instance compliant with FBI policy directives (PD) and guides (PG) mandated to ensure legal and informationsecurity compliance. This shall include analysis of the existing system in collaboration with other team members and Government PM, and designing an appropriate solution. Candidates shall be skilled … team members to troubleshoot and resolve issues. In this role, you will: Support the Government's effort to obtain and maintain an authority-to- operate (ATO) and protect the security posture of the program systems and applications; Possess exceptional interpersonal and communication (verbal and written) skills; Instruct and mentor junior development team members; Provide Government personnel instruction, guidance, and … Control Board (CCB) for approval prior to making changes to application configurations once deployed to production; Education and Experience: Bachelor of Science (B.S.) Degree in Computer Science, Software Development, Information Systems or related field of study, or in lieu of education, six (6) additional years of relevant experience. To learn more about us, check out our website at ! MOMENTUM More ❯
Kendal, Cumbria, North West, United Kingdom Hybrid / WFH Options
Des Scanlan IT Recruitment Ltd
IT Infrastructure & Security Specialist - £40k plus benefits Hybrid working - Kendal Are you an IT Engineer who understands how to plan, develop and install great IT Infrastructure? Can you work in a structured way both on your own and as part of a larger team? Do you like getting involved with all areas of technical infrastructure as well as desktop … be an opportunity to join a forward thinking and creative company who are undertaking a modernisation of their systems. What will you be doing? Reporting to the IT Infrastructure & Security Manager, you will be part of a team of four who identify, plan, and deliver all aspects of IT Infrastructure and Security across a group of companies. You … business needs. This role is a hands-on position designing and provisioning new systems/platforms within a controlled project environment. Ensure that the IT strategy for infrastructure and security requirements is adhered to and continuously improved, supporting the business in its day-to-day operations and growth aspirations. The successful planning, implementation and operation of informationsecurityMore ❯
Senior Delivery Consultant (Security), Professional Services, UK NatSec, WWPS Job ID: 2975344 | AWS EMEA SARL (UK Branch) The Amazon Web Services Professional Services (ProServe) team is seeking a skilled Delivery Consultant (Security) to join our team at Amazon Web Services (AWS). In this role, you'll work closely with customers to design, implement, and manage AWS solutions … that meet their technical requirements and business objectives. You'll be a key player in driving customer success through their cloud journey, providing security expertise and best practices throughout the project lifecycle Our technical Security Consultants to help our customers build comprehensive security models, transform how they secure their sensitive workloads and develop their technical expertise. Our … security consultants deliver architecture guidance, develop security infrastructure and patterns in code, lead proof-of-concept projects, and conduct security workshops for customers. AWS security consultants collaborate with customers to address security and compliance challenges, and they help implement and migrate customer solutions and workloads onto AWS. Professional Services engage in a wide variety of More ❯
Senior Delivery Consultant (Security), Professional Services, UK NatSec, WWPS Job ID: AWS EMEA SARL (UK Branch) The Amazon Web Services Professional Services (ProServe) team is seeking a skilled Delivery Consultant (Security) to join our team at Amazon Web Services (AWS). In this role, you'll work closely with customers to design, implement, and manage AWS solutions that … meet their technical requirements and business objectives. You'll be a key player in driving customer success through their cloud journey, providing security expertise and best practices throughout the project lifecycle Our technical Security Consultants to help our customers build comprehensive security models, transform how they secure their sensitive workloads and develop their technical expertise. Our security consultants deliver architecture guidance, develop security infrastructure and patterns in code, lead proof-of-concept projects, and conduct security workshops for customers. AWS security consultants collaborate with customers to address security and compliance challenges, and they help implement and migrate customer solutions and workloads onto AWS. Professional Services engage in a wide variety of projects More ❯
with our clients and with the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO As a Network and Endpoint Security Pre-Sales Architect, you will: Act as the technical lead in customer-facing engagements, translating complex security needs into effective solution architectures Design Zero Trust-aligned network and … to client requirements & their environments The following skills and experience are essential for this role: 8+ years of experience in cybersecurity, with a strong emphasis on network and endpoint security architecture Proven ability to operate in a technical pre-sales or consulting capacity, translating customer requirements into secure solution designs Strong understanding of network security principles, including firewalls … IPS, NAC, VPN, and network segmentation/micro-segmentation Hands-on experience with endpoint protection and EDR platforms such as CrowdStrike, SentinelOne, Microsoft Defender, or Tanium Familiarity with DNS security tools and strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITRE More ❯
Job Summary We are seeking a skilled and dedicated Information Systems Security Engineer to join our team. In this role, you will be responsible for safeguarding our organization's information systems and ensuring the integrity, confidentiality, and availability of data. You will work closely with IT teams to implement security measures, respond to incidents, and maintain … compliance with industry standards. Responsibilities Design and implement security protocols to protect sensitive information across IT infrastructure. Monitor network security and conduct vulnerability assessments to identify potential threats. Manage incident response activities, including investigation and remediation of security breaches. Develop and maintain disaster recovery plans to ensure business continuity. Collaborate with cross-functional teams to integrate … security into CI/CD pipelines. Utilize tools such as PRTG for network monitoring and performance management. Document security policies, procedures, and incident reports for compliance purposes. Stay updated on the latest cybersecurity trends, threats, and technologies. Requirements Active Secret Clearance Bachelors Degree with 5 years experience 2+ years experience in cybersecurity or information assurance in a More ❯
Job Number: 96 Job Category: GovTech Job Title: INFORMATIONSECURITY ANALYST Job Type: Full-time Clearance Level: Top secret Work Arrangement: On-site Job Location: CA Point Mugu Salary: 120K- 153K Background Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information Assess system vulnerabilities for security risks and propose … and implement risk mitigation strategies Integrate security into a continuous integration, continuous delivery, and continuous deployment pipeline to minimize vulnerabilities in software code Assist in the continuous integration, continuous delivery/deployment (CI/CD), continuous feedback, and continuous operations cycle May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure … Work with ISSO and Cybersecurity Lead to respond to computer security breaches and viruses Requirements BS or BA degree in a Computer or Information Science field or a relevant technical discipline 3 and 10 years of practical CEAT computer security experience in secure network and system design, analysis, procedure/test generation, test execution and implementation of More ❯
Contract personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist with restoring services. Responsibilities: - Providing support to plan, coordinate, and implement the lab's informationsecurity - Providing support for facilitating and helping the lab identify its current security infrastructure and defining future programs, design, and implementation of security related to lab … systems - Assisting the efforts of security staff to design, develop, engineer, and implement solutions to security requirements - Responsible for implementing and developing the DHS IT security - Gathering and organizing technical information about the lab's mission goals and needs, existing security products, and ongoing programs - Performing risk analyses, which also includes risk assessment - Providing support … to plan, coordinate, and implement the lab's informationsecurity - Providing support for facilitating and helping the lab identify its current security infrastructure and define future programs, design, and implementation of security related to lab systems - Possessing and applying expertise on multiple complex work assignments that are broad, requiring originality and innovation in determining how to More ❯
Position: Information System Security Engineer (ISSE) Overview: Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Information System Security Engineer (ISSE) onsite in Denver, CO with a Secret Clearance or Higher. The ideal candidate will have a strong background in security engineering, risk management framework … and hands-on experience with ELK Stack (Elasticsearch, Logstash, Kibana) for log analysis. Responsibilities: • Design, test and implement secure operating systems, networks, security monitoring, and tuning. • Responsible for the management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. • Research … evaluate, and recommend new security tools, techniques, and technologies in alignment with program security strategy. • Configure and utilize the ELK Stack for centralized logging, analysis and security monitoring. Qualifications: • Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline. • 3-5+ years of experience in informationsecurity, cybersecurity More ❯
SteelGate is looking for a talented InformationSecurity Analyst to join our team. The InformationSecurity Analyst will be part of a team that supports our Department of Defense Client supporting a cutting-edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With … missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team. Typical Duties Include: • Determines enterprise informationsecurity standards. • Develops and implements informationsecurity standards. • Provides tactical informationsecurity advice and examining the ramifications of new technologies. • Performs all procedures necessary … to ensure the security of information systems assets and to protect systems from intentional or inadvertent access or destruction. • Ability to provide an independent assessment and ensure security controls are implemented correctly, operating as intended, and are producing the desired outcome. • Maintains current knowledge of relevant technology as assigned. • Completes weekly and monthly reporting requirements. • Serves as More ❯
Helm Point Solutions is currently looking to hire a Senior Information System Security Engineer (ISSE) on a full-time, permanent basis. This position must be performed 100% onsite in the Columbia, MD area and requires an active TS/SCI w/Polygraph security clearance. Title: Information Systems Security Engineer (ISSE) Location: Linthicum Heights, MD … Clearance Required: TS/SCI with Polygraph Full-Time Fully Funded $130,000-$150,000 (Depending on Experience) Overview: Helm Point Solutions is a woman-owned cybersecurity and physical security firm supporting the nation's most critical systems and infrastructure. We're seeking experienced Information Systems Security Engineers (ISSEs) to support vital intelligence operations that directly impact … national security. You'll join a skilled cybersecurity team responsible for strengthening the systems that protect the country's most sensitive missions-delivering standardized, scalable security solutions across multiple teams and environments. What You'll Do: • Conduct security assessments to identify vulnerabilities and ensure IA compliance. • Define, verify, and validate system security requirements and contribute to the More ❯
What you'll do: Design, implement, and manage security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to ensure the organization's networks and systems remain secure. Conduct regular security assessments to identify vulnerabilities and weaknesses in systems, networks, and applications. Develop and implement incident response plans to effectively address security breaches … incidents, and breaches. Collaborate with cross-functional teams to establish and enforce security policies, standards, and procedures. Monitor network traffic, system logs, and security alerts to detect and respond to potential security incidents. Analyze and investigate anomalies and security breaches, taking appropriate actions to mitigate risks. Work closely with cross-functional teams, including IT, software development … and compliance, to integrate security into all phases of the development lifecycle and ensure a comprehensive approach to cybersecurity. Maintain thorough and accurate documentation of security processes, procedures, and configurations. Prepare detailed reports on security findings, incidents, and actions taken. What you'll need to succeed: Active TS/SCI Clearance with CI poly. Bachelor's degree More ❯
Mantis Security is a leading specialty firm of high caliber talent who specialize in Cyber Operations, Cyber Defense, Information Assurance, Software Development, DevSecOps, Security Engineering, and Cloud Engineering. We enable and protect our nation's most important IT assets and invest in the long-term career development of every employee! We are currently looking for the next … Information Systems Security Engineer (ISSE) to join our team of experts! As an ISSE on the Mantis Security Team, you will define informationsecurity requirements and their integration into information systems and its technology component through purposeful security design. What You'll Be Doing: • Develops and implements security designs ensure that the … hardware, operating systems and software applications adequately address cyber security requirements and Security Controls Traceability Matrix (SCTM). • Identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Implement, validate Security Technical Implementation Guide (STIG) requirements and/or perform SRG assessments for all development and implementation projects. More ❯
Information Assurance, IAVA, System Security Plans (SSPs), RMF, Windows, Linux, Authorization to Operate, Verification and Validation, Security+, Security X, CASP+, NIST 800-53 Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/…/active polygraph (Polygraph must be within the last five (05) years). At least twelve (12) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, InformationSecurity, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar … processes may be substituted for a bachelor's degree. Security+ Certification or Security X (previously known as the CASP+) Certification required Must have experience as ISSO working independently, and/or on teams maintaining secure information system operations in isolated, connected and standalone environments. Must have at least five (05) years of experience using tools to support IAVA More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support … for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide support for a program, organization, system, or enclave's information assurance program. Provide support … for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the management of security aspects of the information system and perform day-to-day More ❯
Labor Category: Information System Security Officer Position Title: Assessment and Authorization Officer Position Level: Level 1 - Subject Matter Expert Salary: Up to $215,000.00 per year Core Hours: 9am to 4pm Location: Herndon VA Description: Position Requires a Top Secret (TS/SCI) Clearance with a Polygraph. Assessment and Authorization Officer - This position is being bid on and … Demonstrated experience maintaining assessment and authorization (A&A) packages across multiple services or systems in accordance with FIPS-199, NIST 800-53, and CNSS 1253 requirements. Details: Labor Category: Information System Security Officer Position Title: Assessment and Authorization Officer Position Level: Level 1 - Subject Matter Expert Salary: Up to $215,000.00 per year Core Hours: 9am to 4pm … Cloud, IBM Cloud, or Microsoft Azure cloud architecture. • Demonstrated experience utilizing or reviewing cross domain technology and common architecture designs. • Demonstrated experience consulting project teams on system architecture and security posture. • Demonstrated experience with continuous monitoring requirements to include scan analysis for critical or high findings with common scan tools such as Rapid 7, Nessus, and Qualys. • Demonstrated experience More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non … compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non … compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data More ❯
InformationSecurity Manager III Job Description SECURITY CLEARANCE: Active Top Secret/SCI with ability to obtain DHS Suitability Clearance. LOCATION: Arlington, Virginia (Glebe Road DHS location) OPEN POSITIONS: • ISM03 = Bachelor's Degree and 5+ years of experience COMPENSATION RANGE: • ISM03 = $110,000 - $125,000 Final compensation will be determined, but not limited to, through a holistic … cloud-based cybersecurity analysis capabilities. Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity. We are seeking an InformationSecurity Manager III to support this critical customer mission. JOB DESCRIPTION: InformationSecurity Manager - III - ISM03 MicroSys is supporting a U.S. Government customer to provide support … immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. MicroSys is seeking an InformationSecurity Manager to support this critical customer mission. Responsibilities: • Correlating incident data to identify specific trends in reported incidents • Recommending defense in depth principles and practices (i.e. Defense More ❯
Meritus are recruiting for a leading Defence company in Stevenage who are looking for multiple SOC analysts to develop their in house cyber security function. SOC ANALYST - £45 TO £85PH INSIDE IR35 - ONSITE IN STEVENAGE - SC TO DV CLEARANCE - 6 MONTHS WILL BE EXTENDED Overview of department: An opportunity has arisen in the cyber security operations centre (SOC … meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC members, including the UK InfoSec Team and the IM Domains (Customer Support and Infrastructure/Information Systems). It will cover analysis, monitoring, reporting, alerting and investigation activity utilising a wide variety of security … the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList More ❯