the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering … to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. We fearlessly drive change, because without diversity of thought and a commitment to equality for all, there More ❯
the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering … to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. We fearlessly drive change, because without diversity of thought and a commitment to equality for all, there More ❯
responsible for installing, troubleshooting, servicing, and repairing desktop/laptop computers and our network equipment, providing personal computer, hardware, and software support and installing attendant software. You'll investigate information, network, and communications needs of our employees and make recommendations regarding software and hardware purchases to meet those needs. This hands-on technical position will diagnose, resolve, and respond … computing hardware and systems, software installations, equipment inventory, proprietary software, and network connectivity to ensure the efficient and successful operations of site IT in accordance with SNC corporate business, security, and IT standards, practices, policies, and procedures. The IT Support Technician reports to, takes direction from, and is supervised by a Corporate IT supervisor/manager. Will also receive … SNC's corporate team, we provide the company and its business areas with strategic direction and business support spanning executive management, finance and accounting, operations, human resources, legal, IT, informationsecurity, facilities, marketing, and communications. Responsibilities: Responsible for inventory management to include the purchase, configuration, repair, break/fix, moves/add/changes and integration of new More ❯
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development, you'll be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready … Issue detailed reports outlining findings, risks, and recommendations for remediation. • Translate complex technical findings into actionable insights for both technical and non-technical audiences. • Stay updated with the latest security trends, tools, and techniques. • Participate in research and development projects. • Focus on your development by attaining industry recognised certifications. • Be available for occasional on-call duties and on-site More ❯
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development, you'll be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready … Issue detailed reports outlining findings, risks, and recommendations for remediation. • Translate complex technical findings into actionable insights for both technical and non-technical audiences. • Stay updated with the latest security trends, tools, and techniques. • Participate in research and development projects. • Focus on your development by attaining industry recognised certifications. • Be available for occasional on-call duties and on-site More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development, you'll be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready … Issue detailed reports outlining findings, risks, and recommendations for remediation. • Translate complex technical findings into actionable insights for both technical and non-technical audiences. • Stay updated with the latest security trends, tools, and techniques. • Participate in research and development projects. • Focus on your development by attaining industry recognised certifications. • Be available for occasional on-call duties and on-site More ❯
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development,be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready to thrive … Lead on-site customer engagements. Lead on developing and providing training courses. Oversee and issue detailed reports outlining findings, risks, and recommendations for remediation. Stay updated with the latest security trends, tools, and techniques. Participate in research and development projects. Focus on your development by attaining industry recognised certifications. Be available for occasional on-call duties and on-site More ❯
the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … degree, OR 5 years' applicable experience with a bachelor's degree, OR 7 years' applicable experience with an associate degree Relevant Experience: Relevant experience must be in computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing … computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered towards the relevant experience requirement (i.e., 24-week JCAC course may count as 6 months of experience). In addition to core DNEA skills, this individual requires a More ❯
multiple and interrelated functions within MO which sustain and enhance current and future fielded systems. The Systems Engineer/Systems Administrator will be responsible for implementing, troubleshooting and maintaining Information Technology (IT) systems. The Systems Engineer will: Configure, install, manage and troubleshoot UNIX and Windows operating systems and GOTS/COTS software Support IT systems including day-to-day … Nifi. Qualifications: Fourteen (14) years experience as a SE in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. Five (5) years of additional SE experience may be substituted for a bachelor … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: CWIP cert is not required but may be needed for special accesses. This position requires an active Security Clearance with appropriate Polygraph. More ❯
Digital Network Exploitation Analyst (DNEA) Talent and Tradecraft Advisor Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US Are you in search of a new and challenging experience supporting the United States Intelligence Community and … the following foundational CS areas: algorithms, computer architecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and InformationSecurity (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS … major. • Experience: 10+ years of relevant experience performing as a leader or project manager within the areas of computer or information systems design, development, and/or analysis, including engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. More ❯
definition of a system or component under development (requirements, designs, interfaces, test procedures, etc.) that provides a common reference point for hardware and software developers Develop derived requirements for Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control … interfaces Qualifications: Fourteen (14) years experience as a SE in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. Five (5) years of additional SE experience may be substituted for a bachelor … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned, Service More ❯
to complex systems). Assists other project members with analysis, evaluation and with the preparation of recommendations for system improvements, optimization, development, and maintenance efforts in the following specialties: information systems architecture; networking; telecommunications; automation; communications protocols; risk management/electronic analysis; software; life-cycle management; software development methodologies; and modeling and simulation. The Level 5 Subject Matter Expert … scenarios and use cases that accurately reflect end users' needs. Assist in the development, organization, and articulation of Mission expectation to support test planning and operational evaluation activities. Support information management transformation. Maintain cognizance of all operational requirements, ensuring that the spirit of the requirements is preserved across programmatic and acquisition activities. Articulate/white board ideas to all … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DoD 8570 compliance with IAT Level II and OS Certification is required. This position requires an active Security Clearance with appropriate Polygraph. More ❯
performance and interface requirements. Implement specific network solutions to support server requirements to include load-balancing, VPN's, firewall contexts, Traffic Shaping Voice over IP (VoIP), GRE Tunneling, IP Security (IPSec), IP Encryption, Media over IP (MoIP), and network address translation (NAT) where appropriate. Configure and maintain organization's network diagrams and accreditations. Oversee the support to all network … algorithms for models using networking and/or telecommunications technologies and systems. Required Clearance: TS/SCI with polygraph. (/sci) () Required Qualifications: Master's degree in Computer Science, Information Assurance, InformationSecurity Systems Engineering, or a related discipline from an accredited college or university. Ten (10) years of relevant professional experience providing Network Engineering support and … training commensurate with network engineering curriculums. (NOTE: Bachelor's degree from an accredited college or university in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline and Twelve (12) years of relevant professional experience providing Network Engineering support. Fifteen (15) years of relevant experience providing Network Engineering support may be substituted for a bachelor's More ❯
Coordinate domestic and foreign disclosure staffing requests for Product Office related products planned for delivery or presentation to leadership and customers. Ensure products are properly marked according to PMO informationsecurity standards. Develop and maintain historical archives to ensure activities, briefings and decisions are available for reference and to maintain the PMO/PdO leadership institutional knowledge. Assess … of all actions and cost, schedule, and performance risk; identify alternative risk mitigation approaches; and ascertain appropriate action required to maintain or improve project schedules. Qualifications An active SECRET security clearance and the ability to maintain. A bachelor's degree in a relevant discipline or significant applicable experience. 3 to 10 years of applicable experience associated with business, financial … communications skills, people skills, and enthusiasm are essential, as well as the ability to handle a variety of tasks in a team environment. The ability to research data, analyze information, synthesize options, and make sound recommendations to staff contractors and government officials. Proficiency with Microsoft Excel, Word, and PowerPoint. The ability to travel when required. The candidate would be More ❯
about the role Orange Cyberdefense is the expert cyber security business unit of the Orange Group, providing security consulting, solutions and services to organisations around the globe. We strive to protect freedom and build a safer digital society. We are looking for a Senior SecurityConsultant ( SASE )to join our team in the UK. Working as a Senior SecurityConsultant … SASE ) We are seeking a skilled and experienced Senior Security Consultant to join our Presales team.This role requires a strong understanding of cybersecurity, with expertise in SASE (Secure Access Service Edge) and Next Generation Firewall (NGFW) solutions, particularly across Netskope, ZScaler, Palo Alto SASE products (Prisma Access, Prisma SD-WAN), and firewalls including Checkpoint, Fortinet, and Palo Alto. The … ideal candidate will have at least 5 years of experience in a similar role, a firm grasp of the security industry and threat landscape, and the ability to support and lead enterprise accounts. You will possess a consultative approach to solutioning, demonstratingcomprehensive knowledge of our portfolio and the ability to articulate all services to clients effectively. Key responsibilities: Lead More ❯
IT Security Specialist Purpose of the job We seek an experienced IT Security Specialist to lead our cybersecurity efforts, protecting systems, networks, and data. This role involves developing security policies, responding to incidents, ensuring regulatory compliance, and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies … standards, and procedures. Lead security assessments, vulnerability scanning, and penetration testing. Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect data. Manage the organization's cybersecurity compliance with relevant regulations, including ISO 27001/NIS2/Dora requirements. Collaborate with IT and … business teams to design secure systems and enhance network security. Conduct employee training sessions to raise awareness of security best practices and prevent phishing and other cyber threats. Prepare detailed reports for management on security status, incidents, and remediation efforts. Stay up-to-date with evolving cyber threats, technologies, and regulatory requirements to proactively address risks. Requirements Experience More ❯
Engineer develops, maintains, and enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real- time systems, and business management information systems) based upon documented requirements. Works individually or as part of a team. Reviews and tests software components for adherence to the design requirements and documents test results. Resolves … adherence to strict timing, system resource, or interface constraints; Perform quality control on team products Confer with system engineers and hardware engineers to derive software requirements and to obtain information on project limitations and capabilities, performance requirements and interfaces Coordinate software system installation and monitor equipment functioning to ensure operational specifications are met Implement recommendations for improving documentation and … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: None This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned More ❯
and/or topics to identify analytic vectors. Experience in the principles and methods of exploiting foreign communications and communication systems to identify, collect, analyze, process, and disseminate SIGINT information in accordance with established requirements and priorities. Experience in the use of software applications and databases associated with SIGINT target development. Ability to develop techniques and tools for collecting … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: None This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
This position is contingent on contract award Description: Provide support for implementation, troubleshooting and maintenance of Information Technology (IT) systems. Manage IT system infrastructure and any processes related to these systems. Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DOD 8570 Certification This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
Washington, Washington DC, United States Hybrid / WFH Options
RAND Corporation
Job Type: Term (Fixed Term) Full-time or part-time Applications are due by July 27 Overview RAND's Technology and Security Policy Center (TASP) is seeking mission-driven AI Policy Re search Residents to contribute to and lead research, decision support, and/or technical work at the rapidly evolving intersection of artificial intelligence , national or global security … Intelligence (AGI) teams . T PG delivers timely , actionable analysis and policy recommendations to US and European decision-makers on topics at the intersection of frontier AI and national security . This includes rapid-response work for decisionmakers as well as longer-term, deeper work that results in pub lications . Recent examples include responses to the White House … s request for feedback on the AI A ction P lan . The Geopolitics of AGI team helps policymakers understand, anticipate , and prepare to navigate the national security and geopolitical implications of AGI , including by developing an adaptive and forward-looking U.S. strategy for AGI . Recent examples of their public work include Artificial General Intelligence's Five Hard More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Leidos
seeking a Cybersecurity Engineer to support a government contract in the National Capital Region (NCR). The ideal candidate will be able to identify, assess, and address IT systems security issues. Additionally, the Cybersecurity Engineer will coordinate with the IT team and customer management. This position works 100% in the office, there is no ability for remote or hybrid … work and there may be some business travel (approximately 10% of the time). Are you ready to make an impact? In this role you will: Actively monitor the security status for all IT systems and resolve all security issues quickly Investigate computer and informationsecurity incidents. Applies advanced knowledge of concepts, processes, practices, and procedures … POAMs) and vulnerability management Experience with network infrastructure design, routed data protocols, and hardware platforms. Experience with technologies such as DHCP, DNS, SSH, TCP, and UDP. Demonstrated experience with security device architecture, engineering, and installation/management. Knowledge of WAN and LAN, routing, switching, and firewalls. Knowledge in Operating Systems such as Windows, Cisco IOS, and RHEL. Demonstrated experience More ❯
Coordinate domestic and foreign disclosure staffing requests for Product Office-related products planned for delivery or presentation to leadership and customers. Ensure products are properly marked according to PMO informationsecurity standards. Develop and maintain historical archives to ensure activities, briefings, and decisions are available for reference and to maintain the PMO/PdO leadership's institutional knowledge. … identify alternative risk mitigation approaches; and ascertain appropriate action required to maintain or improve project schedules. Other duties as assigned. At a minimum you should have: An active SECRET security clearance and the ability to maintain it. A bachelor's degree in a relevant discipline or significant applicable experience. 3 to 10 years of applicable experience associated with business … communication skills, people skills, and enthusiasm are essential, as well as the ability to handle a variety of tasks in a team environment. The ability to research data, analyze information, synthesize options, and make sound recommendations to staff, contractors, and government officials. Proficiency with Microsoft Excel, Word, and PowerPoint. The ability to travel when required. You will be highly More ❯
helps secure an enduring future for our shareholders. Join our team and discover why we are a top veteran employer and Certified Great Place to Work ASRC Federal provides informationsecurity, enterprise architecture, software development and health IT solutions to federal government customers. Our employees embrace innovation and are committed to a culture of continuous, standards-driven process … preferred/HS is a must Proficient in Microsoft Excel, a must. Experience in cost analysis, program financial analysis and/or general accounting reconciliation Ability to communicate financial information efficiently and effectively. Ability to thrive in a collaborative environment while independently managing special projects and initiatives. Ability to demonstrate creativity in problem-solving and think strategically about the … and Bureau officials for assigned areas on all aspects of the allocation, use, and control of appropriated funds. Prepare budget justifications and funding reports. Analyze program plans, justifications and information concerning the accomplishment of objectives to determine the validity of assumptions, consistency and adequacy of dollar estimates, and realism of work plan projections. Develop and request additional informationMore ❯
lifecycle of the organizations Active Directory forests, domains, and Domain Controllers. • Deliver and implement a secure, scalable, and resilient Active Directory design, following industry best practices while adhering to InformationSecurity standards. • Provide technical assistance and escalation support for all troubleshooting tasks related to AD, including but not limited to integration with Windows and non-Windows endpoints, authentication … without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law. More ❯
As the Senior Manager - Anti-Piracy & Content Security, you'll play a critical role in safeguarding Virgin Media O2's TV & Entertainment services. From managing high-profile content security partnerships with the Premier League and major studios to influencing national anti-piracy forums, this is your chance to work at the cutting edge of content protection and make … a real impact on our business and customers. You'll lead both proactive and reactive content security measures - from negotiating security terms in major content deals to guiding product and network teams on digital rights management, and helping shape our response to evolving piracy threats. Collaborating across legal, commercial, technical, and industry bodies, you'll champion compliance, innovation … and barriers. We embed equity and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must haves Proven experience in content security, digital rights management (DRM), pay TV security, and/or anti-piracy, including implementing processes or technologies to detect, deter, and respond to piracy threats. Strong understanding of More ❯