Information Security Job Vacancies

901 to 925 of 2,130 Information Security Jobs

IA Policy and Compliance Certified Professional with Security Clearance

Washington, Washington DC, United States
TekSynap
Responsibilities & Qualifications RESPONSIBILITIES The IA Policy and Compliance Certified Professional is expected to be able to: Capabilities reflect a strong foundation in Federal laws and regulations governing information security/privacy, and information assurance and a working knowledge of the security standards and controls utilized by Federal civilian agencies, the DoD and the Intelligence Community. Manages … and directs the implementation, testing and validation of physical, technical and administrative security requirements and assists in the design of a strong security operations program and an effective business continuity plan. Evaluates programs against Privacy Act, HIPAA/HITECH, Federal and commercial regulations and guidance (e.g., NIST, FISMA, OMB). May monitor, evaluate, and maintain systems and procedures … to protect data systems and databases from unauthorized users. Determines causes of security breaches and researches, recommends, and implements changes to procedures to protect data from future violations. Assists in educating users on security procedures. Maintains one or more of the following professional certifications: CISM, CIPA, CISSP. REQUIRED QUALIFICATIONS Active Top-Secret Clearance with a CI Poly BS More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Analyst Microsoft Sentinel / SIEM

London, South East, England, United Kingdom
Salt Search
Cyber Security Analyst - Local Government - Contract £400 per day | Inside IR35 | Hybrid (2 days on-site in North London) | Rolling 3-month contract Salt is partnered with a forward-thinking local government body in North London seeking a Cyber Security Analyst to support their internal IT and security teams on a key programme of work. This is … hybrid contract role, with two days per week on-site and the remainder remote. You'll play a central role in monitoring, analysing, and improving the organisation's cyber security posture - particularly around SIEM and incident response, with a strong focus on Microsoft Sentinel. Key Responsibilities: Monitor security alerts and log data using Microsoft Sentinel and related SIEM … tools Respond to security incidents, performing root cause analysis and recommending remediations Conduct vulnerability assessments and support threat detection activities Assist with the configuration and optimisation of the organisation's security infrastructure Collaborate with technical teams to ensure best practices in information security are maintained Essential Experience: Proven experience in a cyber security analyst or More ❯
Employment Type: Contractor
Rate: £400 per day
Posted:

Principal Cyber Engineer with Security Clearance

Washington, Washington DC, United States
Hybrid / WFH Options
Everfox, formerly Forcepoint Federal
cyber engineer role supporting enterprise software solutions • Advanced experience in Linux and scripting • Strong software development experience using procedural programming languages • Excellent communication skills and ability to relay technical information to customers and laypersons • Interest or experience in cyber security to include practices/methodologies, associated technologies, application design and development and/or experience in an operational … environment • Strong knowledge of networking concepts (e.g. TCP/IP, firewalls, routers, etc.) • Strong knowledge of programming logic and methodologies (e.g., regular expressions) • BS Computer Science, Computer Engineer, Information Security or equivalent • DODI 8570.1-M Compliance at IAT Level I; SANS GSEC, CISSP preferred Things that would be Nice to Have: • Experience with security design and architecture … of Cross Domain solutions (CDS) • Working knowledge of virtualized, networked environments, specifically VMWare and HyperV based systems • Strong verbal and technical writing skills • Experience with security COTS product integration (e.g., firewall, web gateways, Data Loss Prevention) • Prepare documentation to support Assessment and Authorization (A&A) activities • Apply knowledge of current Information Assurance (IA) policies as a contributor to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Security Engineer, Detection and Response

London, United Kingdom
Archa
At Ripple, we're building a world where value moves like information does today. It's big, it's bold, and we're already doing it. Through our crypto solutions for financial institutions, businesses, governments and developers, we are improving the global financial system and creating greater economic fairness and opportunity for more people, in more places around the … network of financial institutions, Ripple is improving the global financial system and increasing economic inclusion for more people, in more places around the world. Ripple is looking for passionate Information Security professionals to build a world class Information Security program. As part of the Information Security team, you will help us achieve this mission … employees, and our customers. To accomplish this, we are building data pipelines and detections, automating incident response, and developing leading-edge solutions to collect and analyze data in both security incidents and investigations. As a Detection and Response Engineer, you will build and grow your career in all of these areas. WHAT YOU'LL DO: Help lead the overall More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Master Scheduler with Security Clearance

Herndon, Virginia, United States
MANTECH
Master Scheduler to join our team in the DC, Maryland, and Virginia (DMV) area In this role you will play a critical role in analyzing and improving our network, security, and cloud operations processes, deployments, and systems. The successful candidate will collaborate with cross-functional teams, gather requirements, conduct analysis, and utilize data and analytics to drive effective decision … to include to track schedules, identify slack times and activities, identify potential schedule slips and deltas, and brief schedules to team and to DHS leadership Collaborate with network engineers, security specialists, and cloud operations teams to ensure alignment between business objectives and technical implementation. Conduct data analysis and provide recommendations based on analysis; create financial models and perform data … project plans, timelines, and other project documents; provide project management support to ensure that all tasks are completed on time and within budget; create reports and dashboards to present information to stakeholders Minimum Qualifications: Bachelor's Degree in Information Security, Computer Science, Business Management, Data Analytics or related field 3+ years of experience in project management, data More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Specialist 6 with Security Clearance

Charleston, South Carolina, United States
M.C. Dean
scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are seeking an Senior Cybersecurity Specialist to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a team that designs, engineers, integrates, operates and maintains electronic security … and assessing Cyber compliance for all Operations and Infrastructure on schedule and in accordance with government policies. Ensure team maintenance, monitoring, reporting, and assessment of Cyber compliance on all security tools and technology. Ensure team is monitoring, reporting, and assessment of Cyber internal and external policy compliance. Work to mitigate risk across security system's infrastructure. Interface daily … with program management, operations, and engineers leads to ensure coordinated performance of program requirements and increase the security posture of the supported environment. Conduct manual STIG reviews. Support preparation of Plan of Action & Milestones (POAM) development to support compliance and authorization/reauthorization activities. Prepare and disseminate regular Cyber Compliance/vulnerability reporting; interact with the customer to explain More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Logistician with Security Clearance

San Antonio, Texas, United States
Abacus Technology Corporation
acquisition support for the EPASS program at Lackland AFB. This is a full-time position. Responsibilities Apply analytical processes to the planning, design, and implementation of new and improved information systems to meet the business requirements of customer organizations. Perform needs analyses to define opportunities for new or improved business process solutions. Consult with customers to identify and recommending … new or modified systems. Ensure the integration of all systems components; e.g., procedures, databases, policies, software, and hardware. Plan systems implementation; and/or ensure the rigorous application of information security/cybersecurity policies, principles, and practices to the systems analysis process. Qualifications 15+ years experience in logistics and acquisition including at least 5 years in a DoD … and procedures related to the inventory and tracking of accountable property. Able to lead a project team in completing complex projects. Knowledge of agency program planning, funding, and management information systems. Broad knowledge of the organization and functions of activities involved in providing logistical support. Able to coordinate and evaluate the efforts of functional specialists to identify specific requirements More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Dev Sec Ops Engineer with Security Clearance

Herndon, Virginia, United States
Hybrid / WFH Options
Lockheed Martin
Strong documentation skills are a plus in this role. • Strong Technical Expertise: Proficient in coding, scripting, and automation tools. Knowledgeable in cloud technologies, containers, and orchestration tools like Kubernetes. • Security Knowledge: Deep understanding of security principles, practices, and tools. Familiar with threat modeling, risk assessment techniques, and security testing tools. • Collaboration and Communication: Ability to work closely … with development, operations, and security teams. Excellent communication skills to articulate security concerns and solutions effectively. • Continuous Learning: Stays updated with the latest security threats, technologies, and DevSecOps trends. Demonstrates a commitment to ongoing professional development. • Problem-Solving Skills: Strong analytical skills to identify and solve security and operational challenges in a timely and effective manner. … Automation Mindset: Leverages automation to integrate security into CI/CD pipelines efficiently. Familiar with tools like Jenkins, GitLab CI, and automated security testing tools. • Risk Management: Ability to assess, prioritize, and manage security risks in alignment with business objectives. • Compliance and Governance: Understanding of legal and regulatory requirements related to information security. Ensures that DevSecOps More ❯
Employment Type: Permanent
Salary: USD 185,840 Annual
Posted:

Cyber Security Consultant

Brussel (Stad), Brussel, Belgium
Hybrid / WFH Options
TCrew
We're Hiring: Data Cyber Security Consultant (SIEM Analyst) Location: Belgium (Hybrid - 1 day/week on-site) Start Date: ASAP Sector: Cybersecurity/SOC/Incident Response Are you passionate about cybersecurity and driven by data? We're looking for a Data Cyber Security Consultant to join a dynamic and centralized Cyber Security Incident Response Team … to ensure the right logs are captured. Create dashboards and reports to enhance visibility. Support blue team activities during red team exercises. Your Profile: Bachelor's in Computer Science, Information Security, or equivalent experience. Strong understanding of Windows, Linux, internet technologies, and network protocols. Experience with Splunk Enterprise Security is a must. Proficiency with query languages (e.g. … full rights as a Belgian citizen or have resided in Belgium for 5-10 years . Ready to take on a role where you make a direct impact on security monitoring and incident response? Apply now or share with someone in your network More ❯
Employment Type: Permanent
Salary: EUR Annual
Posted:

Security Architect

London Area, United Kingdom
Albany Beck
Lead Security Architect The Opportunity Albany Beck is partnering with a global Investment Bank to deliver a critical Protocol Analysis & Remediation programme. We’re looking for a Lead Security Architect with deep technical expertise and a strategic mindset to drive the design and implementation of security controls focused on reducing the risk of attackers moving undetected between … you'll lead discovery, design, and implementation efforts, playing a vital role in reducing risk and progressing toward a Zero Trust framework. Key Responsibilities Lead the development of robust security architectures to detect, prevent and contain lateral movement between endpoints and workloads. Drive the discovery phase by analysing logs (via Azure Log Analytics) and auditing configurations to identify vulnerabilities … and insecure protocols. Define and present security architecture designs and risk reduction recommendations to Cyber Security Architecture and Engineering teams for sign-off. Collaborate with Linux and Windows SMEs to implement secure configurations and protocol controls. Architect and enforce network segmentation and access control models. Conduct security assessments, provide remediation strategies, and guide stakeholders in secure design More ❯
Posted:

Security Architect

City of London, London, United Kingdom
Albany Beck
Lead Security Architect The Opportunity Albany Beck is partnering with a global Investment Bank to deliver a critical Protocol Analysis & Remediation programme. We’re looking for a Lead Security Architect with deep technical expertise and a strategic mindset to drive the design and implementation of security controls focused on reducing the risk of attackers moving undetected between … you'll lead discovery, design, and implementation efforts, playing a vital role in reducing risk and progressing toward a Zero Trust framework. Key Responsibilities Lead the development of robust security architectures to detect, prevent and contain lateral movement between endpoints and workloads. Drive the discovery phase by analysing logs (via Azure Log Analytics) and auditing configurations to identify vulnerabilities … and insecure protocols. Define and present security architecture designs and risk reduction recommendations to Cyber Security Architecture and Engineering teams for sign-off. Collaborate with Linux and Windows SMEs to implement secure configurations and protocol controls. Architect and enforce network segmentation and access control models. Conduct security assessments, provide remediation strategies, and guide stakeholders in secure design More ❯
Posted:

Digital Network Exploitation Analyst, All Levels () with Security Clearance

Annapolis Junction, Maryland, United States
Acclaim Technical Services
is consistently ranked as a top workplace among DC area firms and continues to grow. We are actively hiring a Digital Network Exploitation Analyst to join our Defense & Homeland Security Division working in Annapolis Junction, MD. We are hiring Digital Network Exploitation Analysts (DNEAs) of all skill levels for a variety of roles to support core Intelligence Community (IC … missions through our Next Generation Analysts portfolio. Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. As a cyber professional in the intelligence community, you will work as part of a team on the frontlines against our cyber adversaries. ATS is hiring cyber professionals with technical expertise and a … opportunities will give you the chance to showcase your talent and expertise while working on the cutting edge of national cybersecurity missions. Join us in helping advance our national security interests as part of the world's most advanced team of cyber professionals. RESPONSIBILITIES Evaluate target opportunities using all source data to understand and map target networks, and to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Asset Information Delivery Technician

London, United Kingdom
GNA Group
Job Title: Asset Information Delivery Technician Location: Central London Offices (Flexible Hybrid Option) Start Date: Aug 2025 Contract Duration: 8 months Salary: Competitive, based on experience About the Project: Join the Largest Nuclear Infrastructure Project in Europe, a transformative initiative delivering sustainable, zero-carbon energy for millions. This high-profile project drives innovation in engineering, construction, and commissioning, prioritizing … safety, quality, and collaboration. Job Purpose: We are seeking two Asset Information Delivery Technicians to join our central Data and Information Management Team for an 8-month contract. This delivery-focused role supports the rollout of a consistent Asset Information Framework (AIF) across the project and its tier 1 supply chain. You will develop practical asset information … align tasks with project priorities. Map and analyze asset data flows from platforms like EDRMS, EAMS, and CDE, including technical documentation (e.g., design specifications, operations manuals). Develop asset information products, including asset classifications, data dictionaries, breakdown structures, labelling requirements, and equipment catalogues. Configure asset data requirements, ensuring compliance with security, quality, and change management standards. Create templated More ❯
Employment Type: Contract
Rate: GBP 250 - 300 Daily
Posted:

Asset Information Delivery Technician

South West London, London, United Kingdom
Hybrid / WFH Options
GNA Group
Job Title: Asset Information Delivery Technician Location: Central London Offices (Flexible Hybrid Option) Start Date: Aug 2025 Contract Duration: 8 months Salary: Competitive, based on experience About the Project: Join the Largest Nuclear Infrastructure Project in Europe, a transformative initiative delivering sustainable, zero-carbon energy for millions. This high-profile project drives innovation in engineering, construction, and commissioning, prioritizing … safety, quality, and collaboration. Job Purpose: We are seeking two Asset Information Delivery Technicians to join our central Data and Information Management Team for an 8-month contract. This delivery-focused role supports the rollout of a consistent Asset Information Framework (AIF) across the project and its tier 1 supply chain. You will develop practical asset information … align tasks with project priorities. Map and analyze asset data flows from platforms like EDRMS, EAMS, and CDE, including technical documentation (e.g., design specifications, operations manuals). Develop asset information products, including asset classifications, data dictionaries, breakdown structures, labelling requirements, and equipment catalogues. Configure asset data requirements, ensuring compliance with security, quality, and change management standards. Create templated More ❯
Employment Type: Contract, Work From Home
Rate: From £250 to £300 per day
Posted:

Digital Network Exploitation Analyst (DNEA) with Security Clearance

Annapolis Junction, Maryland, United States
Aperio Global
years of experience Level 3: Eight (8) or more years of experience Level 4: Eleven (11) or more years of experience Combination of experience and education may be considered. Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … major. Certifications preferred: Sec+, Net+, CEH Must have experience in computer or information systems design/development/analysis roles, which may include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetration testing Computer forensics Information assurance Systems engineering Network and systems administration Completion of military training in a relevant area such … harassment, in accordance with applicable federal, state, and local laws. We adhere to all legal requirements prohibiting discrimination based on race, color, religion, sex, national origin, age, disability, genetic information, veteran status, or any other characteristic protected by law. More ❯
Employment Type: Permanent
Salary: USD 117,000 Annual
Posted:

4149 Senior Active Directory Engineer with Security Clearance

Springfield, Virginia, United States
Procession Systems
Intelligence Community customer. All the personnel on the team will work together to support innovative design, engineering, procurement, implementation, operations, sustainment and disposal of user facing and data center information technology (IT) services on multiple networks and security domains, at multiple locations worldwide, to support the IC mission. GENERAL DUTIES: Accountable for the management, uptime, and lifecycle of … the organizations Active Directory forests, domains, and Domain Controllers. Delivers and implements a secure, scalable, and resilient Active Directory design, following industry best practices while adhering to Information Security standards. Provides technical assistance and escalation support for all troubleshooting tasks related to AD, including but not limited to integration with Windows and non-Windows endpoints, authentication, role-based More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Event & Operations Monitoring Lead with Security Clearance

Reston, Virginia, United States
Peraton
About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical … corrective actions to resolve the issue, escalating issues that cannot be resolved within the network operations center, and maintaining/upgrading the supporting network infrastructure and services. Provide monitoring information that impacts or informs products in development to the Government and affected contractors. This position is contingent upon Spring 2025 award Qualifications Required Qualifications Active TS/SCI with … principles Understanding of IT Operations tools and capabilities. (Network Management Systems, ITSM Suites, Service Monitoring Tools) Highly motivated and able to prioritize and integrate multiple projects Strong understanding of information security trends and current industry focus areas, Technical experience with vulnerability management, normal infrastructure/perimeter protections, information security best practices Demonstrated process improvement success Strong More ❯
Employment Type: Permanent
Salary: USD 179,000 Annual
Posted:

Program Security Architect

Manchester, Lancashire, United Kingdom
Manchester Metropolitan University
Are you an experienced Security Architect with significant experience in Microsoft security platforms? Are you interested in helping to shape and secure the digital future at one of the UK's leading universities? Manchester Metropolitan University is looking for an experienced and highly skilled Programme Security Architect to play a central role in our strategic Security & Risk transformation programme. In this influential role, you will lead the development and implementation of advanced security architectures, specifically leveraging Microsoft's security suite, including Defender, Sentinel and Identity capabilities across cloud and on-premise systems to transform and enhance our cyber resilience. You will collaborate closely with our security, architecture, and project teams to design … secure, integrated, and business-aligned solutions. Your expertise will drive improvements across capability modelling, strategy alignment, innovation, and technical planning-ensuring security architectures are robust, flexible, and support our ambitious digital objectives. This is an exciting opportunity to significantly shape and influence security strategy within a supportive, forward-thinking environment, delivering measurable impacts that protect the University's More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Event & Ops Monitoring Specialist - Day Shift with Security Clearance

Reston, Virginia, United States
Peraton
About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical … corrective actions to resolve the issue, escalating issues that cannot be resolved within the network operations center, and maintaining/upgrading the supporting network infrastructure and services. Provide monitoring information that impacts or informs products in development to the Government and affected contractors. Qualifications Required Qualifications Active TS/SCI with Polygraph level clearance. BA/BS and 5+ … principles Understanding of IT Operations tools and capabilities. (Network Management Systems, ITSM Suites, Service Monitoring Tools) Highly motivated and able to prioritize and integrate multiple projects Strong understanding of information security trends and current industry focus areas, Technical experience with vulnerability management, normal infrastructure/perimeter protections, information security best practices Demonstrated process improvement success Strong More ❯
Employment Type: Permanent
Salary: USD 166,000 Annual
Posted:

IT Engineer Level 3 (FORECASTED) with Security Clearance

Annapolis Junction, Maryland, United States
Columbia Technology Partners
software components. Recommends new technologies and processes for complex systems. Coordinates system installations and monitors equipment functioning. Creates 'build docs' for system administrators. Identifies system requirements for operations and security, and works with other engineers and staff to develop design and integrate components. The Level 3 IT Engineer shall possess the following capabilities: Develops and reviews system architecture, including … problems Performs analyses and studies and prepares summary reports Gathers facts through research, interviewing, and surveys to analyzes the client's business, draws conclusions, and prepares final reports Develops security procedures for design reviews, and for operational monitoring, recording, and responding to security events Provides highly technical and specialized guidance concerning automated solutions to complex information processing … problems Leads large scale information systems engineering projects Resolves major technical problems with immediate and long term, durable solutions Determines solutions and impacts for major changes to the baseline, and keeps apprised of changes to mission applications and systems to ensure high availability and reliability Oversees and guides major portions of the IT system architecture Recommends architectural options and More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Database Engineer Level 2 (FORECASTED) with Security Clearance

Annapolis Junction, Maryland, United States
Columbia Technology Partners
This position is contingent on Contract Award Description: Provide technical expertise for database design, development, implementation, information storage and retrieval, data flow and analysis. Develop relational and/or Object-Oriented databases, database parser software, and database loading software. Project long-range requirements for database administration and design. Responsible for developing a database structure that fits into the overall … architecture of the system under development and has to make trades among data volumes, number of users, logical and physical distribution, response times, retention rules, security and domain controls. The DBE works primarily at the front end of the lifecycle-requirements through system acceptance testing and Initial Operational Capability (IOC). Develop requirements from a project's inception to … its conclusion for a particular business and Information Technology (IT) subject matter area (i.e., simple to complex systems). Assist with recommendations for, and analysis and evaluation of systems improvements, optimization, development, and/or maintenance efforts. Translate a set of requirements and data into a usable document by creating or recreating ad hoc queries, scripts, and macros; update More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

System Administrator with Security Clearance

Huntsville, Alabama, United States
PeopleTec
/library of all supporting documentation. Qualifications Required Skills/Experience : Mid Level: 5 years of experience Microsoft Windows Active Directory Understanding of NIST 800 series publications and Federal Information Security Management Act (FISMA) compliance Must be a U.S. Citizen An active DoD Top Secret clearance with SCI eligibility is required to perform this work. Candidates are required … during their employment. Education Requirements : BS or B.A. Degree Preferred Qualifications: Microsoft Windows Server Hybrid Administrator Associate VMWare Data Center Virtualization (VCP-DCV) Cisco Certified Network Professional (CCNP) Certified Information Systems Security Professional (CISSP) VMWare vSphere 7 experience (P) Cisco Networking (P) Dell Server, and SAN Storage hardware experience (P) Familiarity with system accredita ti on and authorization … interest in employment with PeopleTec, Inc. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, genetic information, citizenship, ancestry, marital status, protected veteran status, disability status or any other status protected by federal, state, or local law. PeopleTec, Inc. participates in E-Verify. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ConMon Cyber Tools Engineer IV with Security Clearance

Chantilly, Virginia, United States
RDR, Inc
The Cyber Tools Engineer IV provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to: Support the Information Security Continuous Monitoring (ISCM) program lead in standing up the customer's Continuous Monitoring (ConMon) program Coordinate with ConMon lead to identify process improvements to the current ConMon policies and procedures … STEM) or an advanced IA certification (i.e. CISSP or CASP)Experience briefing senior customer personnel Experience with Statistical analysis (primarily predictive) Experience supporting IC or DoD in the Cyber Security Domain Experience with data transformation (structured data format/schema transformation) using common programming tools (e.g. Python, JSON, etc.) Working knowledge of Microsoft tools; Outlook, Excel, PowerPoint, SharePoint Job … formulas, functions and macro scripting Excellent oral and written communications skills Experience with data visualization tools (e.g. Tableau, Infogram, Chartbloks) Lean Six Sigma certification (green or black belt) Travel Security Clearance Top Secret/SCI/CI Poly More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Technical Compliance Manager V with Security Clearance

Warner Robins, Georgia, United States
Aleut Federal LLC
technical documentation critical to systems integration, engineering, cybersecurity, and lifecycle sustainment. This position ensures that all documentation meets Air Force (C3IA and local unit) directives, federal standards, and applicable security classification and labeling guidelines. Operating under the direction of program leadership, the Technical Compliance Manager works collaboratively with engineers, imagery analysts, system integrators, and cybersecurity professionals to produce user … cybersecurity, installation, and maintenance processes. Ensure compliance with documentation standards outlined in DoDM 5200.01 Vol 2, DoD 5400.7-R, AFI 16-1404, ICD 710, JDCSISSS 6.3.7, CAPCO, and related information security policies. Collaborate with technical staff to acquire source material and translate complex concepts into clear, standardized written materials. Review system blueprints, drawings, mockups, and parts lists to … with document updates and quick-turn compliance tasks during deployment, testing, and sustainment events. Ensure correct marking and labeling of classified and unclassified materials based on the level of information processed at each site. Maintain awareness of updates to federal and DoD classification policy to ensure timely adoption of changes across documentation assets. EDUCATION/TRAINING Required: High School More ❯
Employment Type: Permanent
Salary: USD 96,000 Annual
Posted:

Technical Consultant Level 2 (FORECASTED) with Security Clearance

Annapolis Junction, Maryland, United States
Columbia Technology Partners
Ten (10) years' experience as a Technical Consultant (TC) in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. Requirements: U.S. Citizenship is required for all applicants. CTP is an equal opportunity … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DoD 8570 compliance with Information Assurance Technical (IAT) Level II certification is required. This position requires an active Security Clearance with … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in information security, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Information Security
10th Percentile
£33,000
25th Percentile
£47,500
Median
£65,000
75th Percentile
£78,750
90th Percentile
£100,000