Information Security Job Vacancies

676 to 700 of 1,612 Information Security Jobs

Information Systems Security Officer (ISSO) with Security Clearance

Washington, Washington DC, United States
Hybrid / WFH Options
Leyden Solutions Inc
Title: Information Systems Security Officer (ISSO) Clearance: Active TS with ability to pass CI Poly to obtain SCI Location: Washington, DC (5 days/week onsite only; no remote work) Leyden Solutions is an award-winning national security company with an immediate need for an Information System Security Officer (ISSO) to support a federal law … enforcement agency's migration from distributed systems to a data-centric audit and protection approach (DCAP) information security strategy. Responsibilities/Duties: • Ensure that appropriate steps are taken to implement information security requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. • Perform compliance monitoring, analysis, tracking and reporting • Apply NIST … technical audiences at all levels of the organization. Required Qualifications: • 3-6 years of strong information security experience (personnel security experience does not qualify; must be INFOSEC related) • Minimum of 12 years of IT experience, or 10 years of experience and a master's degree • Must be able to demonstrate integration of regulations and processes such as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Project Manager

Brussel, Belgium
Parallel Consulting
managing outsourced vendor/partner projects Strong negotiation, conflict resolution, and stakeholder influence skills Fluent in English with excellent written, verbal, and presentation skills Technically minded with experience in Information Security , particularly IAM Familiar with data management topics , and ideally with SailPoint and CyberArk Change management affinity is a plus Nice to Have Previous experience in data centre … infrastructure, or cyber-security environments Familiarity with public sector or regulated environments More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Security Engineer, Governance, Risk and Compliance

London, United Kingdom
Duffel
Security Engineer, Governance, Risk and Compliance Create the future of travel with us Whether it's to visit the people closest to us, starting an exciting adventure, or a career-defining business trip, travel is an essential part of our lives. Yet we've all experienced the aches and pains of getting to our destination. Today, more than … is growing, and we're looking for talented people to join us on our journey. Foundations at Duffel The Foundations team is responsible for the reliability, performance, resilience and security of our infrastructure and applications. The team is working closely with our various engineering teams to understand their needs and help meet the demands of our platform as we … scale globally. What you'll do As a Security Engineer on our Foundations team, you will play a crucial role in establishing and maintaining a robust security governance framework. Your work will be instrumental in ensuring the organisation's compliance with industry standards and regulations, safeguarding our data and systems and building trust with key partners. You will More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Assistant Director (Information Governance)

London, United Kingdom
UK Dementia Research Institute
and Global Engagement) and various teams across UCL to promote a culture of integrity, good governance and best practice in research and innovation. About the role As Assistant Director (Information Governance), you will play a key role in promoting and embedding the highest standards of information governance across UCL's research and innovation activities. Working within the Compliance … regulatory, legal, and funding frameworks. You will proactively engage with a broad network of stakeholders to support compliance and build institutional capability, championing a consistent and proportionate approach to information governance. This role requires a deep understanding of information governance in a research context, combined with the ability to engage and influence a diverse group of non-specialists. … Bloomsbury campus, with the expectation of regular on-site presence. We welcome applications from candidates seeking flexible working arrangements wherever possible. About you You will bring deep expertise in information governance, particularly in the context of research and innovation. With a strong understanding of information security, risk management, and data protection, you will have experience working with More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Malware Analyst with Security Clearance

Washington, Washington DC, United States
MAGNUS Management Group
threat actors. Participate in threat hunts and detection engineering efforts to improve the clients proactive defense posture. Required Qualifications: U.S. Citizenship is required. Bachelor's degree in Computer Science, Information Security, or related field (or equivalent practical experience). 5+ years of hands-on experience in malware analysis, digital forensics, or reverse engineering. Deep familiarity with x86/ More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

INFORMATION SYSTEMS SECURITY ENGINEER I - MARYLAND - URGENT with Security Clearance

Maryland, United States
Cyberstrike Group
Job Number: 123 Job Category: GovTech Job Title: INFORMATION SYSTEMS SECURITY ENGINEER I - MARYLAND - URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 145K Background Support the government in the enforcement of the design and implementation of trusted relationships among external systems and … architectures Apply knowledge of IA policy, procedures, and workforce structure to design, develop, and implement secure networking, computing, and enclave environments Participate as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, and/or integration of IA architectures, systems, or system components Identify overall security requirements for the proper handling of government … data Interact with the customer and other project team members Support security planning, assessment, risk analysis, and risk management Requirements Bachelor's degree in computer science, information assurance, information security system engineering, or a related discipline from an accredited college or university 7 years of experience as an ISSE on programs and contracts of similar scope More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Engineer (ISSE) with Security Clearance

Lorton, Virginia, United States
Oxenham Group
Information Security Engineer Lorton, VA Our customer is a growing Government Contracting organization. The company is currently a sub to a large cloud provider and hiring an Information Security Engineer. The ideal candidate has experience in cyber security, implementing security measures, and handling incident responses. The candidate must also have an active TS/… SCI security clearance • Security Analysis and Reporting: Analyze and report on both organizational and system security posture trends, access controls, and the effectiveness of security controls to the ISSM/ISSO, including compliance with security policies. • Security Implementation and Mitigation: Implement security measures to address vulnerabilities, recommend changes, and ensure the confidentiality, integrity … and availability of systems while documenting all activities. • Documentation and Procedures: Assist the ISSM/ISSO in developing and documenting security requirements, controls, risk management procedures, and the System Security Plan, ensuring compliance with applicable DoD policies. • Incident Management and Recovery: Support the ISSM/ISSO in managing security incidents, including conducting assessments, developing risk management plans More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Officer 3 (ISSO3) with Security Clearance

Maryland, United States
Wyetech, LLC
military coursework/training in a computer-related field plus 10 years of relevant experience, OR +High School diploma/GED plus 12 years of relevant experience. Degree in Information Assurance, Information Security, Information Systems, Information Technology, Computer Networking, Information Science, Cyber Security, or related is preferred. Relevant experience must be in information systems design, development, programming, information/computer/cyber/network security, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, and/or systems engineering (i.e., requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance). Experience in the Risk Management Framework (RMF), Information Systems Security technologies, IT policies, and … the relevant experience requirement. Continued assignment to this work role is contingent upon compliance with NSA's Cyberspace Workforce Improvement Program (CWIP) per NSA/CSS Policy 6-34; Information Assurance Manager (IAM) Tier 1 certification requirements must be met within 6 months of assignment to the position. Maintaining certification status is required through continuous education training or sustainment More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

NMCC Information System Security Engineer (ISSE) with Security Clearance

Arlington, Virginia, United States
Country Intelligence Group
NMCC Information System Security Engineer (ISSE) Country Intelligence Group is seeking a full-time NMCC Information System Security Engineer (ISSE) to support cybersecurity operations at the Pentagon. The ISSE will manage and maintain key cybersecurity tools such as Tenable Nessus and Trellix ePO (HBSS/ESS) across Windows and Red Hat Linux environments. Responsibilities include applying … conducting vulnerability assessments, implementing system hardening measures, and supporting the Risk Management Framework (RMF) process. The ideal candidate has experience with tool administration, system architecture, Tier 3 troubleshooting, and security documentation. A strong understanding of IA integration and secure systems engineering is essential. Tasks Performed: • Security Tool Infrastructure Management: o Monitor backend infrastructure, deployment, patching, tuning, and overall … health of security tools, including Tenable Nessus, Trellix ePO (HBSS/ESS), and associated Windows and Red Hat Linux servers. o Monitor system performance, identify bottlenecks, and implement solutions to ensure optimal operation of security tools. o Develop and maintain standard operating procedures (SOPs) for security tool administration. • Vulnerability Management & System Hardening: o Conduct technical security More ❯
Employment Type: Permanent
Salary: USD 152,000 Annual
Posted:

Information System Security Engineer with Security Clearance

Philadelphia, Pennsylvania, United States
Joint Tactics and Technologies
Joint Tactics and Technologies (JTT) is looking for motivated Mid-Level/Senior Information System Security Engineers in Philadelphia, PA! We are a Service-Disabled Veteran Owned Small Business (SDVOSB) specializing in cybersecurity engineering. We offer outstanding benefits and opportunities for leadership development. This work is in support of Naval Surface Warfare Center - Philadelphia. Tasking includes: • Assist with … the developing, maintaining, and tracking Risk Management Framework (RMF) system security plans which include System Categorization Forms, Platform Information Technology (PIT) Determination Checklists, Assess Only (AO) Determination Checklists, Implementation Plans, System Level Continuous Monitoring (SLCM) Strategies, System Level Policies, Hardware Lists, Software List, System Diagrams, Privacy Impact Assessments (PIA), and Plans of Action and Milestones (POA&M). … of obtaining and maintaining Interim Authority to Test (IATT), AO approval, Authorization to Operate (ATO), and Denial of Authorization to Operate (DATO). • Identify and tailor IT and CS security control baselines based on RMF guidelines and categorization of the RMF boundary • Perform Ports, Protocols, and Services Management (PPSM). • Perform IT and CS vulnerability-level risk assessments. • Execute More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Chief Information Officer/Chief Information Security Officer

Olympia, Washington, United States
State of Washington
submit materials as soon as possible. Make a Difference: Protect Consumers & Join Our Dynamic Team! The Office of the Insurance Commissioner (OIC) seeks a qualified individual for the Chief Information Officer/Chief Information Security Officer (Exempt) position. This role is within the Operations Division and is based out of our Tumwater Office. We are an employer … all backgrounds, cultures, and attributes. About the Position Are you a bold, visionary leader ready to shape the future of government technology? We're looking for an exceptional Chief Information Officer/Chief Information Security Officer (CIO/CISO) to join our executive team and take the helm of all things IT and cybersecurity. As the agency … cybersecurity initiatives that directly impact the public good. If you're a seasoned leader with a passion for digital transformation and a proven track record in enterprise IT and security, we want to hear from you. Step into a role where your leadership shapes the future. Apply now and be the difference. This is a Civil-Service Exempt position. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Risk Lead

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
4it Recruitment Limited
Risk & Security Lead - Leeds (Hybrid, 2 days per month in the office) Overview: Are you an experienced Risk & Security professional with a solid understanding of security frameworks such as ISO27001, NIST, and risk assurance? We are looking for a pragmatic and proactive Risk & Security Lead to join a forward-thinking organisation based in Leeds. In this … key role, you will be responsible for driving the organisation's security strategy, improving risk control frameworks, and supporting external audits to ensure compliance and effective risk management. The role will involve the hands-on delivery of a range of Security & Risk projects including Access Management, Audits & Change Transformation. The role is a hybrid role where you will … hear from us in 5 working days then your application has not been successful. Information Security, Risk, Security, Assurance, ISO27001, NIST, PCI-DSS, CISSP, Audit, Auditing, InfoSec, CyberSec More ❯
Employment Type: Permanent, Work From Home
Salary: £65,000
Posted:

DevOps Manager Digital Development

London, United Kingdom
DRP Group
the user experience and how your team can make it even better. The way you roll You'll sit on the Digital Leadership team, and ensure everything DevOps and security is in check with the boring compliance bits (we'll supply the coffee). You also house some pretty impressive techy knowledge in that noggin of yours and you … continuity Assisting with incident management and capture Engaging and supporting development and test teams with DevOps workload Procuring new software/tools to increase efficiency within the business, including security approval and low-level design documentation Getting involved with security configurations Sitting within the Technical Leadership team for digital and utilising your technical and leadership skills to allow … Proficient in a common programming language (Python or PHP is a bonus) Oracle of security concepts such as best configuration practices, risk mitigation techniques , threat modelling, incident reporting, Infosec and ISO27001 Cool as a cucumber with Linux and Command-Line Interfaces Extraordinary understanding of networking Shiny DevOps/Cloud certifications as an added bonus (particularly AWS) Experience migrating and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Head of IT and Digital Services

Manchester, United Kingdom
Hybrid / WFH Options
Zitko Group Ltd
chance to shape a small, skilled team while continuing to contribute directly to the delivery of projects, services, and automation. Overview: Lead and support three teams (IT, Software Development, InfoSec) Continue to work hands-on, especially in areas like automation, systems improvement, and service delivery Improve internal IT services and drive efficiency through technology Identify opportunities to automate manual business … cross-functional teams or technical delivery groups Exposure to business process mapping, systems integration, or low-code automation Understanding of BI/reporting tools and their implementation Knowledge of information security principles and internal compliance frameworks (e.g. ISO27001) Exposure to software development environments or tools This is a unique opportunity to shape and lead a growing internal tech … Title: Senior Accountant Location: Milpitas, CA (Hybrid - 3 Days Onsite/2 Days Remote) Salary: $110,000 - $120,000 per year Employment Type: Full-Time Overview: We are Fire & Security Engineer - Preston/Liverpool/Manchester£36,000 to £38,000 basic Zitko are delighted to be recruiting for a leading UK provider of advanced security Job Title More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Apprentice Network Engineer

12 New Fetter Lane, London, England
BIRD & BIRD LLP
ensuring the reliability, security, and scalability of IT systems supporting business applications, and implementing advanced technologies to enhance productivity and client service. They also work closely with the InfoSec team to protect sensitive legal information, provide technical support, and ensure compliance with industry regulations and standards. By maintaining robust and efficient IT infrastructure, the team enable the firm … inventory records and perform audit functions Provide technical support to localised IT Teams and assist with network-related inquiries Perform routine maintenance and upgrades on network equipment Respond to security incidents to ensure the integrity of the network Deploy and maintain virtual network infrastructure in cloud environments Administration of the server environment including DHCP, DNS, and virtualisation About you … world's digital future. We’re interested in the world, current issues, and emerging trends. We’re an outward looking, sector-focused firm, specialising in Automotive, Aviation & Aerospace, Defence & Security, Energy & Utilities, Financial Services, Life Sciences & Healthcare, Media, Entertainment & Sport, Retail & Consumer, and Technology & Communications. More ❯
Employment Type: Higher Apprenticeship
Salary: £26,000 a year
Posted:

Junior Cybersecurity Consultant

Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date on the latest cyber threats and technologies Requirements: Essential: Experience in information security or networking Understanding of network protocols (e.g. TCP/IP, DNS) Strong communication and client-facing skills A proactive, problem-solving mindset Fluent in written and spoken … evenings/weekends for planned exercises (not a 24/7 role) Desirable: Degree or equivalent experience Previous consulting or technical client-facing experience Background in SOC, Pen Testing, InfoSec, or Systems Admin Knowledge of BGP, WAF, CDN, or cloud platforms (AWS, Azure, GCP) Basic scripting (e.g. Python, Bash) for automation or analysis Please note that at times due to More ❯
Employment Type: Full-Time
Salary: £30,000 - £32,000 per annum
Posted:

Cyber Governance Analyst

England, UK
Hybrid / WFH Options
Fruition Group
company's risk posture and compliance with industry standards, offering a chance to make a lasting impact. Cyber Governance Analyst Responsibilities: With day-to-day reporting to the Group Information Security Officer (GISO), you will act as a first line of defence, ensuring the implementation and maintenance of security controls aligned with company policies and standards. Key … duties include: Collaborating with IT, legal, and policy teams to create and ensure compliance with industry regulations and company-specific policies. Implementing and maintaining Information Security and Privacy Standards and Frameworks, such as ISO 27001, NIST, and CIS. Reviewing system and data architectures alongside engineering teams and architects, recommending best practices. Assessing vulnerabilities, articulating their impact, and recommending … controls and mitigations for current and future systems. Conducting risk assessments and effectively communicating security and risk implications to technical and non-technical stakeholders. Managing and supporting project stakeholder expectations with a flexible, pragmatic approach. Cyber Governance Analyst Requirements: Strong knowledge of cybersecurity frameworks (e.g., ISO 27001, NIST, CIS). Proven experience in a similar role, supporting governance, monitoring More ❯
Employment Type: Full-time
Posted:

Cyber Governance Analyst

United Kingdom
Hybrid / WFH Options
Fruition Group
company's risk posture and compliance with industry standards, offering a chance to make a lasting impact. Cyber Governance Analyst Responsibilities: With day-to-day reporting to the Group Information Security Officer (GISO), you will act as a first line of defence, ensuring the implementation and maintenance of security controls aligned with company policies and standards. Key … duties include: Collaborating with IT, legal, and policy teams to create and ensure compliance with industry regulations and company-specific policies. Implementing and maintaining Information Security and Privacy Standards and Frameworks, such as ISO 27001, NIST, and CIS. Reviewing system and data architectures alongside engineering teams and architects, recommending best practices. Assessing vulnerabilities, articulating their impact, and recommending … controls and mitigations for current and future systems. Conducting risk assessments and effectively communicating security and risk implications to technical and non-technical stakeholders. Managing and supporting project stakeholder expectations with a flexible, pragmatic approach. Cyber Governance Analyst Requirements: Strong knowledge of cybersecurity frameworks (e.g., ISO 27001, NIST, CIS). Proven experience in a similar role, supporting governance, monitoring More ❯
Employment Type: Permanent, Work From Home
Salary: £70,000
Posted:

Project Coordinator

Gloucester, Gloucestershire, South West, United Kingdom
Hybrid / WFH Options
Morson Talent
are met and communications are handled effectively. Use Microsoft Excel extensively to analyse data, track KPIs, and support the production of performance reports. Ensure the safe handling of sensitive information in line with company policies. Support the review of Third-Party Security Assessments, where required. Skills and Experience - Essential: Advanced proficiency in Microsoft Excel - including pivot tables, formulas … written and verbal communication skills. Ability to multitask and prioritise in a fast-paced environment. Desirable: Experience using Power BI to visualise and communicate data insights. Awareness of international information security standards and frameworks (e.g. ISO27001, ISO27017, GDPR, Cyber Essentials Plus). Understanding of common security risks, threats, and mitigation approaches. Tenacity, attention to detail, and a More ❯
Employment Type: Contract, Work From Home
Rate: £200 per day
Posted:

Vacancy for Senior Research Data Steward at University College London

London, United Kingdom
Digital Preservation Coalition
skills are essential to clearly explain technical concepts to non-technical staff. At the Senior grade, candidates should have a strong background working with sensitive data, understanding data governance, information security, and risk management, and be familiar with issues related to handling and disseminating sensitive data. We are especially interested in applicants with experience in areas such as … ISO27001 certification, Information Security Management Systems (ISMS), Trusted Research Environments (TRE), Secure Data Environments (SDE), Data Safe Havens (DSH), the Five Safes model, healthcare data processing, NHS Data Security and Protection Toolkit, anonymising personal data, data protection, and ethics. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Dev Sec Ops Engineer

Herndon, Virginia, United States
Hybrid / WFH Options
Lockheed Martin
Strong documentation skills are a plus in this role. • Strong Technical Expertise: Proficient in coding, scripting, and automation tools. Knowledgeable in cloud technologies, containers, and orchestration tools like Kubernetes. • Security Knowledge: Deep understanding of security principles, practices, and tools. Familiar with threat modeling, risk assessment techniques, and security testing tools. • Collaboration and Communication: Ability to work closely … with development, operations, and security teams. Excellent communication skills to articulate security concerns and solutions effectively. • Continuous Learning: Stays updated with the latest security threats, technologies, and DevSecOps trends. Demonstrates a commitment to ongoing professional development. • Problem-Solving Skills: Strong analytical skills to identify and solve security and operational challenges in a timely and effective manner. … Automation Mindset: Leverages automation to integrate security into CI/CD pipelines efficiently. Familiar with tools like Jenkins, GitLab CI, and automated security testing tools. • Risk Management: Ability to assess, prioritize, and manage security risks in alignment with business objectives. • Compliance and Governance: Understanding of legal and regulatory requirements related to information security. Ensures that DevSecOps More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Director, Open Banking Product Management

London, United Kingdom
MasterCard
influencer and able to navigate a matrixed organization and/reporting structure. Be able to navigate ambiguity with ease. • Strong aptitude for modelling and applying quantitative analytical approaches Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Defence Services - Manager

England, UK
Hybrid / WFH Options
KPMG UK
what it is. Why Join KPMG Technology and Engineering as a Cyber Defence Services – Manager? At KPMG we are looking for a manager who lives and breathes hacking and information security. You will have earned your stripes doing CHECK work in data centres and be ready to, or already skilled in leading teams of talented testers. In return we … will you be doing? As the Pen Test Manager, you'll be responsible for leading and mentoring a team of talented penetration testers, ensuring the successful delivery of critical security assessments for our diverse clientele. You'll wear multiple hats, acting as a technical expert, project manager, and strategic leader, driving both individual and team growth. Responsibilities: Management and … demonstrable understanding of penetration testing and red-teaming including NCSC and CREST accredited schemes. Proven experience of successfully managing and delivering testing Proven experience working within the UK cyber security industry Demonstrable understanding and practical application of information security principles Strong technical background in computing, networks, and programming. Proven experience of producing high quality deliverables working alone More ❯
Employment Type: Full-time
Posted:

DLP Testing Analyst

London, United Kingdom
CFC
support the ongoing operations and improvement of our DLP capabilities and be the first line of investigation and escalation for potential data policy violations. Reporting to the Head of Information Security, you will work directly with IT, HR, compliance, and business stakeholders to investigate, document, and help resolve data protection issues. About the role Within this role, you … investigation. Conducting in-depth investigations of potential DLP policy breaches using available tools and logs. You will document findings and write clear, structured investigation reports for the Head of Information Security Escalating high-risk incidents to the Group CISO or repeat offenses for further action or disciplinary review with HR. Supporting the management, tuning, and improvement of DLP … awareness efforts by identifying areas where training or guidance can help reduce accidental data breaches. About you The ideal candidate for this role will have prior experience in a security operations, DLP, or compliance-focused roles. Within this role, they would have gained: Experience using DLP technologies (e.g., Microsoft Purview, Symantec, Forcepoint, or similar). Familiarity with data classification More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

A2A Risk Solutions, Product Management, GTM

united kingdom, united kingdom
Mastercard
example with hands-on approaches to demonstrate product management excellence and share best practices Demonstrate and drive Mastercard Way behaviours through their behaviour, (e.g. customer and stakeholder interactions) Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for information security and must: Abide by Mastercard’s security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected information security violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard’s guidelines. More ❯
Posted:
Information Security
10th Percentile
£35,643
25th Percentile
£48,165
Median
£65,000
75th Percentile
£78,750
90th Percentile
£100,000