With significant executive support and sponsorship, our financial services client has launched a multi-year project to redevelop and modernise the full technology and security stack. To support this and maintain risk exposure, they are making a significant investment in the InformationSecurity team, processes, and technology. This is a chance to join a small tight-knit … Security Engineering team at an exciting time where we are designing and building the core services. If you like working on designs for high scale, leading-edge, and operating in a truly cloud-native fashion, then we want to hear from you! Responsibilities: You will be part of the Security Engineering team - helping design, implement and support key … services. We’re a hands-on engineering team. We partner with the broader engineering organisation and also build and support our own capabilities across IT Security, IAM, SDLC, and Security Architecture practices. Strong hands-on experience working with major cloud solutions (IaaS, PaaS, Event-driven/Serverless, SaaS) AWS and/or Azure. Capable of designing, implementing, and More ❯
With significant executive support and sponsorship, our financial services client has launched a multi-year project to redevelop and modernise the full technology and security stack. To support this and maintain risk exposure, they are making a significant investment in the InformationSecurity team, processes, and technology. This is a chance to join a small tight-knit … Security Engineering team at an exciting time where we are designing and building the core services. If you like working on designs for high scale, leading-edge, and operating in a truly cloud-native fashion, then we want to hear from you! Responsibilities: You will be part of the Security Engineering team - helping design, implement and support key … services. We’re a hands-on engineering team. We partner with the broader engineering organisation and also build and support our own capabilities across IT Security, IAM, SDLC, and Security Architecture practices. Strong hands-on experience working with major cloud solutions (IaaS, PaaS, Event-driven/Serverless, SaaS) AWS and/or Azure. Capable of designing, implementing, and More ❯
years of experience Level 3: Eight (8) or more years of experience Level 4: Eleven (11) or more years of experience Combination of experience and education may be considered. Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … major. Certifications preferred: Sec+, Net+, CEH Must have experience in computer or information systems design/development/analysis roles, which may include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetration testing Computer forensics Information assurance Systems engineering Network and systems administration Completion of military training in a relevant area such … harassment, in accordance with applicable federal, state, and local laws. We adhere to all legal requirements prohibiting discrimination based on race, color, religion, sex, national origin, age, disability, genetic information, veteran status, or any other characteristic protected by law. More ❯
Are you an experienced Security Architect with significant experience in Microsoft security platforms? Are you interested in helping to shape and secure the digital future at one of the UK's leading universities? Manchester Metropolitan University is looking for an experienced and highly skilled Programme Security Architect to play a central role in our strategic Security & Risk transformation programme. In this influential role, you will lead the development and implementation of advanced security architectures, specifically leveraging Microsoft's security suite, including Defender, Sentinel and Identity capabilities across cloud and on-premise systems to transform and enhance our cyber resilience. You will collaborate closely with our security, architecture, and project teams to design … secure, integrated, and business-aligned solutions. Your expertise will drive improvements across capability modelling, strategy alignment, innovation, and technical planning-ensuring security architectures are robust, flexible, and support our ambitious digital objectives. This is an exciting opportunity to significantly shape and influence security strategy within a supportive, forward-thinking environment, delivering measurable impacts that protect the University's More ❯
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … and execution of this impactful mission that is critical in ensuring mission success through Customer Service Specialists, Database Engineers, Information Systems Security Officers, Information Systems Security Engineers, Sharepoint Developers, Systems Engineers, Network Engineers, and IT Engineers by improving, protecting, and defending our Nation's Security. Job Description: As an IT Engineer you will work with a … a high visibility requirement with the Customer, integrating the latest IT commercial off the shelf (COTS) hardware and software. Additionally, you will be at the forefront: Developing and enforcing security protocols for secure, multi-party capabilities for users across various domain classification. Work with various users to collect requirements for data centers. These users include mission analysts and data More ❯
excited about become a part of Luxoft DXC Team and make progress in your career? Do you want to become a professional and develop in Project Management and Cyber Security sphere? Than this role is definitely for you. Have you successfully managed large-scale IT Infrastructure, Application and Security Projects? Do you like managing all aspects of a … large organizations on a global scale. We are encouraging you to join us and work with one of our banking clients in a position of IT Project Manager - Cyber Security Services. You'll be working in the Technology InformationSecurity Office (TISO) Transformation organization in a team which is global, diverse and collaborative as we work across … IT); • educated to degree level or equivalent qualification or work experience in a relevant area. Nice-to-Have Skills Description: Experience with the delivery of IT projects within Cyber Security field Ready to cooperate with us? Apply on the role and face a new challenge in your life More ❯
excited about become a part of Luxoft DXC Team and make progress in your career? Do you want to become a professional and develop in Project Management and Cyber Security sphere? Than this role is definitely for you. Have you successfully managed large-scale IT Infrastructure, Application and Security Projects? Do you like managing all aspects of a … large organizations on a global scale. We are encouraging you to join us and work with one of our banking clients in a position of IT Project Manager - Cyber Security Services. You'll be working in the Technology InformationSecurity Office (TISO) Transformation organization in a team which is global, diverse and collaborative as we work across … IT); • educated to degree level or equivalent qualification or work experience in a relevant area. Nice-to-Have Skills Description: Experience with the delivery of IT projects within Cyber Security field Ready to cooperate with us? Apply on the role and face a new challenge in your life More ❯
developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 3 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or … the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … major. Position requires active Security Clearance with appropriate Polygraph Pay Range: 150,000-195,000 The RealmOne pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Our approach to crafting offers considers various factors to establish an equitable and competitive compensation package. These considerations include, but are not limited More ❯
developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 2 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or … the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course may count as 6 months of experience). Position requires active Security Clearance with appropriate Polygraph Pay Range: 110,000-150,000 The RealmOne pay range for this job level is a general guideline only and not a guarantee of compensation More ❯
developed techniques will be documented and shared with teammates, stakeholders, and intelligence consumers. The Level 4 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or … the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … major. Position requires active Security Clearance with appropriate Polygraph Pay Range: 214,000-265,000 The RealmOne pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Our approach to crafting offers considers various factors to establish an equitable and competitive compensation package. These considerations include, but are not limited More ❯
the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering … to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. We fearlessly drive change, because without diversity of thought and a commitment to equality for all, there More ❯
the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering … to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. We fearlessly drive change, because without diversity of thought and a commitment to equality for all, there More ❯
about the role Orange Cyberdefense is the expert cyber security business unit of the Orange Group, providing security consulting, solutions and services to organisations around the globe. We strive to protect freedom and build a safer digital society. We are looking for a Senior SecurityConsultant ( SASE )to join our team in the UK. Working as a Senior SecurityConsultant … SASE ) We are seeking a skilled and experienced Senior Security Consultant to join our Presales team.This role requires a strong understanding of cybersecurity, with expertise in SASE (Secure Access Service Edge) and Next Generation Firewall (NGFW) solutions, particularly across Netskope, ZScaler, Palo Alto SASE products (Prisma Access, Prisma SD-WAN), and firewalls including Checkpoint, Fortinet, and Palo Alto. The … ideal candidate will have at least 5 years of experience in a similar role, a firm grasp of the security industry and threat landscape, and the ability to support and lead enterprise accounts. You will possess a consultative approach to solutioning, demonstratingcomprehensive knowledge of our portfolio and the ability to articulate all services to clients effectively. Key responsibilities: Lead More ❯
IT Security Specialist Purpose of the job We seek an experienced IT Security Specialist to lead our cybersecurity efforts, protecting systems, networks, and data. This role involves developing security policies, responding to incidents, ensuring regulatory compliance, and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies … standards, and procedures. Lead security assessments, vulnerability scanning, and penetration testing. Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect data. Manage the organization's cybersecurity compliance with relevant regulations, including ISO 27001/NIS2/Dora requirements. Collaborate with IT and … business teams to design secure systems and enhance network security. Conduct employee training sessions to raise awareness of security best practices and prevent phishing and other cyber threats. Prepare detailed reports for management on security status, incidents, and remediation efforts. Stay up-to-date with evolving cyber threats, technologies, and regulatory requirements to proactively address risks. Requirements Experience More ❯
Description Assured InformationSecurity (AIS) has an opening for a Software Engineer to join our Trusted Systems team. In this role you will help design, build, and maintain secure, scalable software systems using Java, modern microservices architectures, and RESTful APIs. The ideal candidate has strong experience with object-oriented principles, is well-versed in database technologies, and understands … package which includes employer paid health insurance and a 7% contribution to your 401k, candidates may be eligible for other forms of compensation. AIS is a leading cyber and informationsecurity company supporting mission critical operations across the DoD, intelligence community, commerce and beyond. Founded in 2001, AIS is a privately-owned company committed to excellence in all More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Role: Cyber Security Engineer Salary/Rate: up to £700 per day (inside IR35) Location: Hybrid LondonContract Duration: until October 2025 We are currently looking for a Cyber Security Engineer for our government client. This Cyber Security Engineer role is hybrid, based between 2-3 days per week on site in central London and the remainder of … the week working remotely. The contract for the Cyber Security Engineer position is until October 2025 with potential to extend, operating inside IR35. Security Clearance: Security Check ("SC Clearance") This role is inside IR35 - Due to the service of the role, it will now be based on an Umbrella solution. Essential skills/experience required: Certifications: OSCP … Clearance, Active SC, SC Vetted, Cleared To A High Government Standard, Dv Cleared, Dv Clearance, Dv Check, Developed Vetted, Developed Vetting, Dv Strap, Active DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent More ❯
lifecycle of the organizations Active Directory forests, domains, and Domain Controllers. • Deliver and implement a secure, scalable, and resilient Active Directory design, following industry best practices while adhering to InformationSecurity standards. • Provide technical assistance and escalation support for all troubleshooting tasks related to AD, including but not limited to integration with Windows and non-Windows endpoints, authentication … without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law. More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Leyden Solutions Inc
Title: Information Systems Security Officer (ISSO) Clearance: Active TS with ability to pass CI Poly to obtain SCI Location: Washington, DC (5 days/week onsite only; no remote work) Leyden Solutions is an award-winning national security company with an immediate need for an Information System Security Officer (ISSO) to support a federal law … enforcement agency's migration from distributed systems to a data-centric audit and protection approach (DCAP) informationsecurity strategy. Responsibilities/Duties: • Ensure that appropriate steps are taken to implement informationsecurity requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. • Perform compliance monitoring, analysis, tracking and reporting • Apply NIST … technical audiences at all levels of the organization. Required Qualifications: • 3-6 years of strong informationsecurity experience (personnel security experience does not qualify; must be INFOSEC related) • Minimum of 12 years of IT experience, or 10 years of experience and a master's degree • Must be able to demonstrate integration of regulations and processes such as More ❯
managing outsourced vendor/partner projects Strong negotiation, conflict resolution, and stakeholder influence skills Fluent in English with excellent written, verbal, and presentation skills Technically minded with experience in InformationSecurity , particularly IAM Familiar with data management topics , and ideally with SailPoint and CyberArk Change management affinity is a plus Nice to Have Previous experience in data centre … infrastructure, or cyber-security environments Familiarity with public sector or regulated environments More ❯
Security Engineer, Governance, Risk and Compliance Create the future of travel with us Whether it's to visit the people closest to us, starting an exciting adventure, or a career-defining business trip, travel is an essential part of our lives. Yet we've all experienced the aches and pains of getting to our destination. Today, more than … is growing, and we're looking for talented people to join us on our journey. Foundations at Duffel The Foundations team is responsible for the reliability, performance, resilience and security of our infrastructure and applications. The team is working closely with our various engineering teams to understand their needs and help meet the demands of our platform as we … scale globally. What you'll do As a Security Engineer on our Foundations team, you will play a crucial role in establishing and maintaining a robust security governance framework. Your work will be instrumental in ensuring the organisation's compliance with industry standards and regulations, safeguarding our data and systems and building trust with key partners. You will More ❯
and Global Engagement) and various teams across UCL to promote a culture of integrity, good governance and best practice in research and innovation. About the role As Assistant Director (Information Governance), you will play a key role in promoting and embedding the highest standards of information governance across UCL's research and innovation activities. Working within the Compliance … regulatory, legal, and funding frameworks. You will proactively engage with a broad network of stakeholders to support compliance and build institutional capability, championing a consistent and proportionate approach to information governance. This role requires a deep understanding of information governance in a research context, combined with the ability to engage and influence a diverse group of non-specialists. … Bloomsbury campus, with the expectation of regular on-site presence. We welcome applications from candidates seeking flexible working arrangements wherever possible. About you You will bring deep expertise in information governance, particularly in the context of research and innovation. With a strong understanding of informationsecurity, risk management, and data protection, you will have experience working with More ❯
threat actors. Participate in threat hunts and detection engineering efforts to improve the clients proactive defense posture. Required Qualifications: U.S. Citizenship is required. Bachelor's degree in Computer Science, InformationSecurity, or related field (or equivalent practical experience). 5+ years of hands-on experience in malware analysis, digital forensics, or reverse engineering. Deep familiarity with x86/ More ❯
Job Number: 123 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITY ENGINEER I - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 145K Background Support the government in the enforcement of the design and implementation of trusted relationships among external systems and … architectures Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components Identify overall security requirements for the proper handling of government … data Interact with the customer and other project team members Support security planning, assessment, risk analysis, and risk management Requirements Bachelor's degree in computer science, information assurance, informationsecurity system engineering, or a related discipline from an accredited college or university 7 years of experience as an ISSE on programs and contracts of similar scope More ❯
InformationSecurity Engineer Lorton, VA Our customer is a growing Government Contracting organization. The company is currently a sub to a large cloud provider and hiring an InformationSecurity Engineer. The ideal candidate has experience in cyber security, implementing security measures, and handling incident responses. The candidate must also have an active TS/… SCI security clearance • Security Analysis and Reporting: Analyze and report on both organizational and system security posture trends, access controls, and the effectiveness of security controls to the ISSM/ISSO, including compliance with security policies. • Security Implementation and Mitigation: Implement security measures to address vulnerabilities, recommend changes, and ensure the confidentiality, integrity … and availability of systems while documenting all activities. • Documentation and Procedures: Assist the ISSM/ISSO in developing and documenting security requirements, controls, risk management procedures, and the System Security Plan, ensuring compliance with applicable DoD policies. • Incident Management and Recovery: Support the ISSM/ISSO in managing security incidents, including conducting assessments, developing risk management plans More ❯
military coursework/training in a computer-related field plus 10 years of relevant experience, OR +High School diploma/GED plus 12 years of relevant experience. Degree in Information Assurance, InformationSecurity, Information Systems, Information Technology, Computer Networking, Information Science, Cyber Security, or related is preferred. Relevant experience must be in information systems design, development, programming, information/computer/cyber/network security, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, and/or systems engineering (i.e., requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance). Experience in the Risk Management Framework (RMF), Information Systems Security technologies, IT policies, and … the relevant experience requirement. Continued assignment to this work role is contingent upon compliance with NSA's Cyberspace Workforce Improvement Program (CWIP) per NSA/CSS Policy 6-34; Information Assurance Manager (IAM) Tier 1 certification requirements must be met within 6 months of assignment to the position. Maintaining certification status is required through continuous education training or sustainment More ❯