Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development, you'll be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready … Issue detailed reports outlining findings, risks, and recommendations for remediation. • Translate complex technical findings into actionable insights for both technical and non-technical audiences. • Stay updated with the latest security trends, tools, and techniques. • Participate in research and development projects. • Focus on your development by attaining industry recognised certifications. • Be available for occasional on-call duties and on-site More ❯
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development,be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready to thrive … Lead on-site customer engagements. Lead on developing and providing training courses. Oversee and issue detailed reports outlining findings, risks, and recommendations for remediation. Stay updated with the latest security trends, tools, and techniques. Participate in research and development projects. Focus on your development by attaining industry recognised certifications. Be available for occasional on-call duties and on-site More ❯
is a senior management level position responsible for accomplishing results through the management of a team or department in an effort to prevent, monitor and respond to incidents. Citi Security and Investigative Services (CSIS) has a mission to protect Citi's employees, assets and clients, and consists of the following anchors: Crisis Management Executive Protection Intelligence Investigations Investigative Policy … Independent Review Operations Security CSIS Global Security and Intelligence Centers: CSIS has three main GSICs located in Tampa, London, and Singapore. All CSIS GSICs are responsible for the execution of four core programs, including: CCTV/Alarm Monitoring and Response - provide comprehensive physical security monitoring for threats to the firm's assets, employees, and customers. GSICs monitor … the access control system, intrusion detection and panic alarm systems for threats and use the systems and CCTV systems to initiate and coordinate a security response to security and safety incidents or crisis events. Threat Monitoring - execute disruptive, targeted and executive threat monitoring plans following the CSIS Intelligence Threat Monitoring Procedures. GSICs also engage and leverage the CSIS More ❯
to complex systems). Assists other project members with analysis, evaluation and with the preparation of recommendations for system improvements, optimization, development, and maintenance efforts in the following specialties: information systems architecture; networking; telecommunications; automation; communications protocols; risk management/electronic analysis; software; life-cycle management; software development methodologies; and modeling and simulation. The Level 5 Subject Matter Expert … scenarios and use cases that accurately reflect end users' needs. Assist in the development, organization, and articulation of Mission expectation to support test planning and operational evaluation activities. Support information management transformation. Maintain cognizance of all operational requirements, ensuring that the spirit of the requirements is preserved across programmatic and acquisition activities. Articulate/white board ideas to all … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DoD 8570 compliance with IAT Level II and OS Certification is required. This position requires an active Security Clearance with appropriate Polygraph. More ❯
Coordinate domestic and foreign disclosure staffing requests for Product Office related products planned for delivery or presentation to leadership and customers. Ensure products are properly marked according to PMO informationsecurity standards. Develop and maintain historical archives to ensure activities, briefings and decisions are available for reference and to maintain the PMO/PdO leadership institutional knowledge. Assess … of all actions and cost, schedule, and performance risk; identify alternative risk mitigation approaches; and ascertain appropriate action required to maintain or improve project schedules. Qualifications An active SECRET security clearance and the ability to maintain. A bachelor's degree in a relevant discipline or significant applicable experience. 3 to 10 years of applicable experience associated with business, financial … communications skills, people skills, and enthusiasm are essential, as well as the ability to handle a variety of tasks in a team environment. The ability to research data, analyze information, synthesize options, and make sound recommendations to staff contractors and government officials. Proficiency with Microsoft Excel, Word, and PowerPoint. The ability to travel when required. The candidate would be More ❯
IT Security Specialist Purpose of the job We seek an experienced IT Security Specialist to lead our cybersecurity efforts, protecting systems, networks, and data. This role involves developing security policies, responding to incidents, ensuring regulatory compliance, and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies … standards, and procedures. Lead security assessments, vulnerability scanning, and penetration testing. Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect data. Manage the organization's cybersecurity compliance with relevant regulations, including ISO 27001/NIS2/Dora requirements. Collaborate with IT and … business teams to design secure systems and enhance network security. Conduct employee training sessions to raise awareness of security best practices and prevent phishing and other cyber threats. Prepare detailed reports for management on security status, incidents, and remediation efforts. Stay up-to-date with evolving cyber threats, technologies, and regulatory requirements to proactively address risks. Requirements Experience More ❯
and/or topics to identify analytic vectors. Experience in the principles and methods of exploiting foreign communications and communication systems to identify, collect, analyze, process, and disseminate SIGINT information in accordance with established requirements and priorities. Experience in the use of software applications and databases associated with SIGINT target development. Ability to develop techniques and tools for collecting … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: None This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
the best from us. RSC2 is looking for Senior Systems Engineer to join our growing team! Requirements This individual will serve as an expert and provides technical guidance and information to meet requirements. Review, assist and mentor lower-grade employee's work for quality, accuracy of work. Perform a wide range of systems engineering services to ensure the PD … and advise Government on obtaining best possible acquisition outcome with a given team, schedule, and set of requirements.Qualifications/Requirements: TS clearance level Bachelor's degree in computer science, information systems, engineering, business or related scientific or technical discipline. A minimum of eight (8) years of related experience. Four (4) additional years of direct relevant technical experience may be … Test and Evaluation Master Plans, and specific requirement test plans for SIGINT, Radar, and EO/IR systems. IAT level II certification required Preferred certifications: Project Management Professional (PMP), informationsecurity (CompTIA or similar programs), Intelligence Fundamentals Professional Certification (IFPC) Work Location: Aberdeen Proving Ground, MDWork Location: Aberdeen Proving Ground, MD Employment Type: Full-time, Salary-Exempt Benefits More ❯
This position is contingent on contract award Description: Provide support for implementation, troubleshooting and maintenance of Information Technology (IT) systems. Manage IT system infrastructure and any processes related to these systems. Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: DOD 8570 Certification This position requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
Senior Security Consultant - London (Hybrid, 2-3 days per week in office) - Up to £75,000 About the Role An opportunity to join an innovative cyber security consultancy focused on creating great security outcomes for their clients. This company is delivering cutting-edge solutions, and helping clients strengthen their security posture, grow great process, and prepare … some great projects, working with an exciting team with a good range of solutions, championing 'best for client' delivery, trust, transparency, and great outcomes. Key Responsibilities As a Senior Security Consultant, you will work within a dynamic, client-facing team, managing the security needs of high-growth clients through consultancy and managed services. You will collaborate with a … include: Client Delivery - Serve as the main point of contact for clients, managing relationships and communication, Identifying and mitigate cyber risks, oversee certification audits, and support incident response. Leading security awareness initiatives, including training, phishing simulations, and governance meetings. Scope, plan, and coordinate penetration tests and managing third-party security assessments Capability Development - Enhance internal processes, implement automation More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Leidos
seeking a Cybersecurity Engineer to support a government contract in the National Capital Region (NCR). The ideal candidate will be able to identify, assess, and address IT systems security issues. Additionally, the Cybersecurity Engineer will coordinate with the IT team and customer management. This position works 100% in the office, there is no ability for remote or hybrid … work and there may be some business travel (approximately 10% of the time). Are you ready to make an impact? In this role you will: Actively monitor the security status for all IT systems and resolve all security issues quickly Investigate computer and informationsecurity incidents. Applies advanced knowledge of concepts, processes, practices, and procedures … POAMs) and vulnerability management Experience with network infrastructure design, routed data protocols, and hardware platforms. Experience with technologies such as DHCP, DNS, SSH, TCP, and UDP. Demonstrated experience with security device architecture, engineering, and installation/management. Knowledge of WAN and LAN, routing, switching, and firewalls. Knowledge in Operating Systems such as Windows, Cisco IOS, and RHEL. Demonstrated experience More ❯
Coordinate domestic and foreign disclosure staffing requests for Product Office-related products planned for delivery or presentation to leadership and customers. Ensure products are properly marked according to PMO informationsecurity standards. Develop and maintain historical archives to ensure activities, briefings, and decisions are available for reference and to maintain the PMO/PdO leadership's institutional knowledge. … identify alternative risk mitigation approaches; and ascertain appropriate action required to maintain or improve project schedules. Other duties as assigned. At a minimum you should have: An active SECRET security clearance and the ability to maintain it. A bachelor's degree in a relevant discipline or significant applicable experience. 3 to 10 years of applicable experience associated with business … communication skills, people skills, and enthusiasm are essential, as well as the ability to handle a variety of tasks in a team environment. The ability to research data, analyze information, synthesize options, and make sound recommendations to staff, contractors, and government officials. Proficiency with Microsoft Excel, Word, and PowerPoint. The ability to travel when required. You will be highly More ❯
helps secure an enduring future for our shareholders. Join our team and discover why we are a top veteran employer and Certified Great Place to Work ASRC Federal provides informationsecurity, enterprise architecture, software development and health IT solutions to federal government customers. Our employees embrace innovation and are committed to a culture of continuous, standards-driven process … preferred/HS is a must Proficient in Microsoft Excel, a must. Experience in cost analysis, program financial analysis and/or general accounting reconciliation Ability to communicate financial information efficiently and effectively. Ability to thrive in a collaborative environment while independently managing special projects and initiatives. Ability to demonstrate creativity in problem-solving and think strategically about the … and Bureau officials for assigned areas on all aspects of the allocation, use, and control of appropriated funds. Prepare budget justifications and funding reports. Analyze program plans, justifications and information concerning the accomplishment of objectives to determine the validity of assumptions, consistency and adequacy of dollar estimates, and realism of work plan projections. Develop and request additional informationMore ❯
Job Title: Asset Information Analyst Location: London, UK Start Date: Aug 2025 Contract Duration: 8 months with possibility of extension Salary : Competitive, based on experience About the Project: Join the Largest Nuclear Infrastructure Project in Europe, a pioneering initiative delivering sustainable, zero-carbon energy for millions. This high-profile project drives innovation in engineering, construction, and commissioning, with a … focus on safety, quality, and collaboration. Job Purpose: We are seeking an Asset Information Analyst for an 8-month contract to join our central Data and Information Management Team. This role supports the rollout of a consistent Asset Information Framework (AIF) across the project and its tier 1 supply chain. You will focus on asset data extraction … business case development. Conduct in-depth analysis of legacy files, categorizing content and providing recommendations for AIF development. Perform research on standards, guidance, and lessons learned to inform asset information strategies. Support the production of reports, including the Phase 1 AIF Research and Assessment Summary Report and the complete AIF Phase 1 Report. Map and analyze asset data flows More ❯
lifecycle of the organizations Active Directory forests, domains, and Domain Controllers. • Deliver and implement a secure, scalable, and resilient Active Directory design, following industry best practices while adhering to InformationSecurity standards. • Provide technical assistance and escalation support for all troubleshooting tasks related to AD, including but not limited to integration with Windows and non-Windows endpoints, authentication … without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law. More ❯
As the Senior Manager - Anti-Piracy & Content Security, you'll play a critical role in safeguarding Virgin Media O2's TV & Entertainment services. From managing high-profile content security partnerships with the Premier League and major studios to influencing national anti-piracy forums, this is your chance to work at the cutting edge of content protection and make … a real impact on our business and customers. You'll lead both proactive and reactive content security measures - from negotiating security terms in major content deals to guiding product and network teams on digital rights management, and helping shape our response to evolving piracy threats. Collaborating across legal, commercial, technical, and industry bodies, you'll champion compliance, innovation … and barriers. We embed equity and inclusion into everything we do, supporting you to be your authentic self throughout your application journey. The must haves Proven experience in content security, digital rights management (DRM), pay TV security, and/or anti-piracy, including implementing processes or technologies to detect, deter, and respond to piracy threats. Strong understanding of More ❯
enhance our cybersecurity defenses. This role requires expertise in reverse engineering, malware analysis, and a deep understanding of cybersecurity threats and mitigation techniques. You will investigate potential intrusions and security events to contain and mitigate incidents. You will be responsible for researching cyber-attacks, malware, and threat actors to determine potential impact and develop remediation guidance; validates, categorizes and … investigates escalated cyber security events; profiles and trends events in the environment for potential incidents; collects, assesses and catalogues threat indicators; performs malware analysis. Responsibilities include, but are not limited to: Conduct in-depth analysis of malware samples using reverse engineering techniques to understand their behavior, functionality, and impact. Utilize tools and techniques such as IDA Pro, Ghidra, OllyDbg … junior analysts and assist in their professional development. Participate in incident response activities, providing expertise on malware analysis and remediation Minimum Qualifications: Bachelor's Degree in Computer Science, Cybersecurity, InformationSecurity, or a related field 2+ years of relative experience 1+ years of experience in reverse engineering, malware analysis, and cybersecurity. 8570 Certification- Level II Preferred Qualifications: Previous More ❯
Washington, Washington DC, United States Hybrid / WFH Options
RAND Corporation
Job Type: Term (Fixed Term) Full-time or part-time Applications are due by August 3rd Overview RAND's Technology and Security Policy Center (TASP) is seeking mission-driven Technical AI Policy Research Scientists to contribute to and lead research, decision support, and/or technical work at the intersection of artificial intelligence and national or global security. RAND … related to technical AI infrastructure, such as data centers, energy, semiconductor fabrication facilities, supercomputers, AI chip production, AI model releases, China's semiconductor supply chain and AI ecosystem, and information security. Interpret research results in the context of new developments and in relation to other elements of the AI infrastructure stack. Perform technical tasks such as coding or data … with areas of technical AI governance, such as those mentioned above. Experience in the US government or advising or working with policymakers in relation to emerging technology and national security issues, including in the White House, Congress, interagency processes, and/or the intelligence community. Experience in working on AI research, working on ML model development/deployment , and More ❯
system backups and database archive operations Conducts hardware and software audits of workstations and servers to ensure compliance with established standards, policies, and configuration guidelines Ensures that performance and security of computers meet the needs of network users May evaluate existing systems and assist with planning long-term strategies May coach and provide guidance to less-experienced professionals Qualifications … applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: Compliance with IAT Level 2 is required (Security+ CE) This position requires an active Security Clearance with appropriate Polygraph. About us: Founded … and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our More ❯
Security Engineer, Governance, Risk and Compliance Create the future of travel with us Whether it's to visit the people closest to us, starting an exciting adventure, or a career-defining business trip, travel is an essential part of our lives. Yet we've all experienced the aches and pains of getting to our destination. Today, more than … is growing, and we're looking for talented people to join us on our journey. Foundations at Duffel The Foundations team is responsible for the reliability, performance, resilience and security of our infrastructure and applications. The team is working closely with our various engineering teams to understand their needs and help meet the demands of our platform as we … scale globally. What you'll do As a Security Engineer on our Foundations team, you will play a crucial role in establishing and maintaining a robust security governance framework. Your work will be instrumental in ensuring the organisation's compliance with industry standards and regulations, safeguarding our data and systems and building trust with key partners. You will More ❯
applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Certification Requirements: PMP, FAC-P/PM Senior Level, or Defense Acquisition Workforce Improvement Act (DAWIA) Level 3 certification in Program Management required. This position … requires an active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned, Service-Disabled Veteran Owned Small Business with a specialization in technology and management consulting committed to solving intricate and sensitive technology issues facing corporations and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development … operational deployment, and support of key systems. With a proven track record in informationsecurity, project management, systems/network engineering, security risk management, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our customers need for results that exceed expectations. CTP staff have worked closely with both government engineers More ❯
SCI We have an exciting job opportunity for a Technical Lead. This role involves leading a team of system and network administrators responsible for the installation, configuration, maintenance, and security of the organization's systems. The Technical Lead will ensure the smooth operation of the IT infrastructure and provide technical support to end-users. This position requires a Top … remote access solutions. Supervise the support for a range of devices, such as desktop computers, laptops, tablets, printers, scanners, and other peripherals. Ensure the Help Desk team adheres to InformationSecurity and Privacy Awareness training and complies with standards. Utilize and maintain the service desk ticketing and tracking systems, ensuring accurate record-keeping and efficient ticket resolution. Coordinate … with other IT teams and departments to support organizational goals and initiatives. Communicate effectively with stakeholders to ensure alignment and transparency. Required Education and Experience Bachelor's degree in information technology, Computer Science, or a related field. Relevant experience may substitute for the degree requirement. Minimum of 7 years of experience in IT help desk support, including at least More ❯
and applications Experience in developing and maintaining specialized utility programs and software for cyber defense Familiarity with compliance requirements and federal cybersecurity regulations Desired Qualifications: Bachelor's degree in informationsecurity, Computer Science, or a related field (or equivalent experience) Experience with Splunk, Oracle/SQL platforms, and Python Experience integrating third-party components and automating cybersecurity operations More ❯
and Global Engagement) and various teams across UCL to promote a culture of integrity, good governance and best practice in research and innovation. About the role As Assistant Director (Information Governance), you will play a key role in promoting and embedding the highest standards of information governance across UCL's research and innovation activities. Working within the Compliance … regulatory, legal, and funding frameworks. You will proactively engage with a broad network of stakeholders to support compliance and build institutional capability, championing a consistent and proportionate approach to information governance. This role requires a deep understanding of information governance in a research context, combined with the ability to engage and influence a diverse group of non-specialists. … Bloomsbury campus, with the expectation of regular on-site presence. We welcome applications from candidates seeking flexible working arrangements wherever possible. About you You will bring deep expertise in information governance, particularly in the context of research and innovation. With a strong understanding of informationsecurity, risk management, and data protection, you will have experience working with More ❯
Arlington, Virginia, United States Hybrid / WFH Options
LMI Government Consulting (Logistics Management Institute)
bachelor's degree in finance, auditing, business management/administration, or risk/compliance from an accredited college/university. 5-10 years of Department of Defense experience Federal InformationSecurity Modernization Act Minimum 3 years of risk management experience to include assessment, evaluation of financial and non-financial controls mitigation, and program management Familiarity with the Department … Individual salaries are determined by various factors including, but not limited to location, internal equity, business considerations, client contract requirements, and candidate qualifications, such as education, experience, skills, and security clearances. More ❯