Eastleigh, Hampshire, United Kingdom Hybrid / WFH Options
Ageas
Job Title : Information Security Assurance Specialist Contract Type: Permanent, Full Time Salary Range: £33,200-£41,500 depending on experience Location: Eastleigh Information Security Assurance Specialist: At Ageas, we are committed to protecting our customers, employees, and systems through robust information security practices. We are seeking a Information Security Assurance and Architecture Specialist … will be expected to spend 1 day per week in our Eastleigh office, the remainder of your time will be spent working from home. Main Responsibilities asInformation Security Assurance Specialist: Support the A&A Manager to represent the information security department on change, architecture and projects Support on the delivery of the Information Security assurance plan on … guidance on security best practices, threat modelling, and mitigation strategies. Support incident response and post-incident reviews from an architectural perspective. Skills and experience you need asInformation Security Assurance Specialist: Strong understanding of all security principles and underlying technologies and how they apply to technological and business solutions Demonstrable ability to design security operations, procedures, policies and assurance activities More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Sanderson
Information Security/Information Privacy SME (Contract) Location: Central London (Hybrid – 2 days onsite per week) Contract: Inside IR35 or Umbrella Engagement Duration: 6–12 months (with potential extension) Industry: Private Banking/Wealth Management Role Overview: We are seeking a highly experienced Information Security/Information Privacy Subject Matter Expert (SME) to support a leading … private bank in London. This role is focused on providing strategic and operational guidance on cybersecurity, data protection, and regulatory compliance to ensure the bank’s information assets and customer data remain secure and compliant with applicable standards (e.g., ISO 27001, GDPR, FCA requirements). Key Responsibilities: Serve as the SME for all matters related to information security … and privacy. Advise on the development and maintenance of security policies, procedures, and frameworks. Review and strengthen current information security architecture and controls. Conduct risk assessments, gap analyses, and privacy impact assessments (DPIAs). Provide expert input on GDPR, UK Data Protection Act, and other relevant regulations. Partner with internal stakeholders across legal, compliance, IT, and operations to improve More ❯
RiverTech is seeking a skilled Information Security (INFOSEC) Specialist to support the Joint Staff Security Office (JSSO) at the Pentagon in providing comprehensive security services. The ideal candidate will be responsible for ensuring that classified information, SCI, and controlled unclassified information (CUI), under the control of the JS, is protected in accordance with authoritative policies. To … security procedures and policies in coordination with government personnel. Investigates, prepares, and submits incident reports as required. Participates in the development of security education programs. Develop, implement, and enforce information security policies, standards, and guidelines. Key responsibilities include: Maintain repository for information security policies, standards and guidelines, ensuring timely reviews and updates. Develop, implement, and conduct specialized training … tracking completion status. Track and developed detailed report analyses on all security incidents to address areas of concern. Address security incidents involving non-compliance with security procedures for classified information, from initiation to completion, in accordance with authoritative policies and JS SOPs. Develop and implement mitigation strategies to address identified risks. Collaborate with other security disciplines such as PHYSEC More ❯
well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Operations Specialist In this role you will Perform technical communications vulnerability assessments of computer networks, Industrial Control Systems, radio, wireless, and other communication systems that directly support the … Writing, and Major Command follow-up) Education Requirements: Bachelor's of Science degree in Computer Science or equivalent field A minimum of 3-5 years experience working in the Information Technology field Security Clearance Requirements: TS/SCI Other Requirements: May be required to move equipment/files weighing up to 50 pounds Requires ability to consistently perform repetitive … action employer and does not discriminate on the basis of race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service, or other non-merit factors. More ❯
Central HRIS team is responsible for improving the group-wide HR system by optimizing current modules, launching new solutions, and promoting data-driven HR processes. The team also supports information security and conducts training to raise awareness and strengthen internal systems. Key Responsibilities Act as the primary point of contact for HRIS-related inquiries from regional teams. Support the … troubleshooting. Analyze HR data and generate actionable reports to support decision-making. Support ad-hoc tasks and assignments from key HR stakeholders. Requirements Bachelor’s degree in Human Resources, Information Technology, or related discipline. Up to 2 years of relevant experience in HRIS, HR operations, or project support. Proficiency in both Mandarin and English (spoken and written). Strong More ❯
Job Description: CompTech is seeking an InformationSpecialist II in support of our customer, the Environmental Protection Agency (EPA). Scope of work: -Working with records or docket management -Using automated information systems -Providing technical support for records management programs, dockets, records centers, or other information services under the supervision of a Records/Information … Innovation, and Customer Satisfaction. As an equal opportunity employer, all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, genetic information, national origin, age, disability, or status as a protected veteran. If you require assistance or an accommodation due to a disability, please call Human Resources at or email . More ❯
Job Title: Information Assurance Systems/Network Specialist Location: On-site in Washington, DC (14th Street NW & Constitution Ave) Clearance Required: Active Top Secret with SCI eligibility Type: Full-time, direct hire About the Company This opportunity is with a well-established federal IT services provider that's growing steadily and is officially Certified as a Great Place … regulations. About the Role This role supports a federal law enforcement agency's cybersecurity operations. You'll be working on-site, helping to manage the security posture of sensitive information systems. The focus will be on Authorization to Operate (ATO) processes, risk assessments, and network/system security. Key Responsibilities (Summarized for Candidate Call) Work with system owners to More ❯
an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent - Open Position Status: Full Time Position Title: Information Technology/Assurance Specialist II Location: Colorado Springs, CO Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph Duties and Responsibilities The … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following: Establish complex operational software configuration controls and system interfaces for computer system(s) assigned. Maintain file servers, Firewalls … checklist. Review and provide technical and cyber security coordination on all Bodies of Evidence that make- up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices. Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration. Provide External InformationMore ❯
an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent - Open Position Status: Full Time Position Title: Information Technology/Assurance Specialist II Location: San Antonio, TX Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph Duties and Responsibilities The … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following: Establish complex operational software configuration controls and system interfaces for computer system(s) assigned. Maintain file servers, Firewalls … checklist. Review and provide technical and cyber security coordination on all Bodies of Evidence that make- up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices. Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration. Provide External InformationMore ❯
This is a contingent opportunity The Information Operations Specialist performs technical communications vulnerability assessments of computer networks, Industrial Control Systems, radio, wireless, and other communication systems that directly support the critical assets on DoD Installations or other agencies' facilities. Duties: Review and provide an assessment of the following: cyber issues and integration employment of the core capabilities of … computer and network hardware components and operating systems. In lieu of a degree, commensurate operational experience may be substituted. Additional Requirements Possess working knowledge of Department of Defense's Information Assurance Vulnerability Alert processes. Mastery level experience working hands-on with Computer Network modeling software. Mastery level experience working hands-on with Computer Network vulnerability/compliance analysis software. … Ability to lift and move object which weigh up to 50lbs. Expert in the performance of in-the-field vulnerability-based assessments in the technical area of Information and CyberSpace Operations. Desired Experience: Experience providing analytical support to one or more special operations forces (SOF) units or commands Tactical or operational level experience operating in a deployed environment Experience More ❯
well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Technology/Information Assurance Specialist I The IT/IA primary function is working within Special Access Programs (SAPs) supporting Department ofDefense (DoD) agencies, such as HQ … Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. In this role you will Establish complex operational software configuration controls and system interfaces for computer system(s) assigned Maintain file servers, Firewalls, network access, Security … checklist Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package Identify any and all vulnerabilities and implement countermeasures Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration Provide External InformationMore ❯
agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to- day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: • Establish complex operational software configuration controls and system interfaces for computer system(s) assigned • Maintain file servers, Firewalls, network … checklist • Review and provide technical and cyber security coordination on all Bodies of Evidence that make-up the authorization package • Identify any and all vulnerabilities and implement countermeasures • Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices • Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration • Provide External Information … such as System or Network Administrator Education: • Bachelor's degree or equivalent experience (4 years) Certifications: • Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level I or Information Assurance Manager I within 6 months of the date of hire. Security Clearance: • Current Top Secret Clearance with SCI Eligibility • Eligibility for More ❯
MELE Associates is seeking a mission-driven Information Technology Specialist to support NEST operations with classified computing and secure communications systems. The successful candidate will provide hands-on technical support for a variety of IT and communications infrastructures in both classified and unclassified environments. This role requires a strong foundation in networking, system security, and operational readiness. ESSENTIAL … office staff with ad hoc troubleshooting on teleconference and general IT issues Support facility network infrastructures and problem resolution. Other duties as assigned MINIMUM QUALIFICATIONS Bachelor's degree in information technology, Computer Science, Engineering, or a related field; or equivalent technical training and experience Minimum of 6 years of experience in IT system administration, networking, or communications system support. More ❯
POA&M) activities related to ATO. Asset where possible in completing POA&M activities. Requirements Ensure the effective implementation of DOE and NNSA cybersecurity policies and procedures for designated information systems, ensuring alignment with organizational security standards and best practices. Lead the Assessment and Authorization (A&A) activities for designated systems, ensuring compliance with federal regulations and internal security … designated systems. Conduct thorough risk assessments to understand vulnerabilities and recommend mitigation strategies to ensure system integrity. Lead and conduct cybersecurity tests and assessments, providing actionable results to the Information System Security Manager (ISSM). Address vulnerabilities and provide guidance for remediation. Evaluate the security impact of proposed changes to assigned information systems. Recommend and implement strategies for … Participate in training and tabletop exercises to ensure readiness in case of security incidents. Effectively communicate cybersecurity status, risks, and mitigation strategies to stakeholders, both formally and informally. Present information clearly in group and individual settings to ensure understanding across all levels of the organization. Key Candidate Traits: In-depth knowledge of DOE and NNSA cybersecurity frameworks and guidelines. More ❯
positions that could easily transition over to a full-time regular and permanent job with HII. Program Of Instruction For this internship, the SkillBridge intern will train as an Information Technology Analyst within HII-Mission Technologies, reporting to a designated HII Supervisor, with the goal of refining and enhancing current Information Technology Analyst fundamentals and principles. The intern … Preparation of required network cyber (IA) documentation Week 19: Developing SOPs, and implementing audits, threat and vulnerability assessments, and applying security-related software tools to manage and control classified information systems Week 20: Resolving information systems security incidents Additional Goals Project management Minimum Qualifications Active-Duty Military ONLY within final 180 days of active-duty service to actively … Degree in a related field, and a minimum of five (5) years' experience maintaining IT systems or a minimum of ten (10) years' experience maintaining IT systems. DoD 8570 Information Assurance Management Level II certification, or equivalent, and 4 years of classified information systems experience working on DoD ACAT I, ACAT II, or ACAT. Physical Requirements Physical Requirements More ❯
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, national origin, age, protected veteran status, or disability status. Description Markon is seeking Information Technology/Information Management (IT/IM) Specialists to support our NRO client at multiple locations across the US. Responsibilities The ideal Information Technology/Information Management (IT/IM) Specialist will be responsible for (but not limited to) the following tasks: Manage information across formats and throughout its life cycle to support mission/business goals. Support information systems, collaborative tools, and custom applications aligned with evolving NRO strategies. Perform systems analysis to optimize IM capabilities and functions. Administer IM systems … ensuring availability, efficiency, and compliance. Maintain and enhance IM content management and records management functions. Apply knowledge management principles to improve information sharing and enterprise performance. Coordinate with the ACIO and other stakeholders to implement IT/IM best practices. Align information resources (hardware, software, personnel, and funds) with mission objectives. Qualifications Required: TS/SCI with a More ❯
What You'll Be Working On: ️ Managing and enforcing information security policies, procedures, and standards to safeguard organizational data ️ Conducting risk assessments and ensuring compliance with relevant security frameworks (e.g., ISO 27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other teams to implement and maintain secure information management systems … Providing expert guidance on data classification, encryption, and access controls to maintain the integrity and confidentiality of sensitive data What We're Looking For: ️ Proven experience as an Information Assurance Specialist or in a similar role focused on data protection and compliance ️ Strong understanding of information assurance frameworks (e.g., ISO 27001, NIST SP 800-53, COBIT) ️ Experience More ❯
AMERICAN SYSTEMS is an employee-owned federal government contractor supporting national priority programs through our strategic solutions in the areas of Information Technology, Test & Evaluation, Program Mission Support, Engineering & Analysis, and Training. Responsibilities As an Information Systems Security Specialist with AMERICAN SYSTEMS you will have the opportunity to do the following: Develop and implement a set of … techniques or analytics applications to transform raw data into meaningful information using data-oriented programming languages and visualization software Conduct data mining, data modeling, natural language processing, and machine learning to extract and analyze information from large structured and unstructured datasets Perform software integration or testing, including analyzing and implementing test plans and scripts Visualize, interpret, and report … data findings; Create dynamic data reports Qualifications Active Top Secret Clearance U.S. Citizenship Required for the purposes of obtaining/holding a U.S. security clearance Certified Information systems security professional (CISSP) Minimum of three (3) years' experience directly supporting information systems security efforts Pay Transparency Statement AMERICAN SYSTEMS is committed to pay transparency for our applicants and employee More ❯
The Red Gate Group is seeking an Information Operations Specialist to support the United States Air Force (USAF). This critical role focuses on conducting technical communications vulnerability assessments to identify and mitigate risks to mission-critical assets and Department of Defense (DoD) infrastructure. As an Information Operations Specialist, you will evaluate and analyze the security More ❯
As a QC Information Systems (QCIS) Specialist, you will act as an administrator of computerized systems and business analyst between labs groups and IT for Enterprise projects such as Empower, Biovia Laboratory Execution Systems (LES), Labware, LIMS, and other digital initiatives. Candidates should have a technical understanding of GMP analytical laboratory Information and Enterprise systems. Responsible for … coordinate training of new and existing local admins, prepare training materials as necessary. Executes protocols, reports, investigations using, and other records, using Veeva on behalf of QC. Support QC information system lifecycle management activities from concept, development, validation, implementation, maintenance, to retirement. Ability to interpret scientific documentation (quality assay SOPs, Master Specifications, etc.) in order to translate information … static data configuration and reports in LIMS, Empower, and other computerized data management systems, is a plus for some roles within the team. Education: Bachelor's Degree preferably in Information Systems/Technology or Biotechnology related field. Spotlight call notes: 2+ years information management experience needed to perform well in this role. Experience in a scientific lab setting More ❯
• Seven (7) years of professional experience in a broad-based Automatic Data Processing (ADP) services environment. • Experience analyzing data, security and access control, storage, analysis, and reporting. • Experience with data management tools and systems. OpalSoft, Inc. is an Equal Opportunity More ❯
improving its banking activities in various markets and thus contributing to the overall economy. Role Description This is a full-time on-site role located in Amsterdam for an Information Technology Specialist. The Specialist will be primarily support the development and maintenance of internal business applications using Oracle technologies. This role requires increasing Technical proficiency by adhering to More ❯
Where you can thrive. Where you can find your next, right now. We've got what you're looking for. Job Description: Parsons is looking for an amazingly talented Information Operations Specialist to join our team! In this role you will get to perform integrated, multidisciplinary assessments that assess survivability of critical U.S. Air Force mission systems, infrastructures … systems that directly support the Mission Assurance Programs or mission critical assets on DoD installations or other agencies' facilities What Required Skills You'll Bring: Possess 5+ years of Information Operations and Cyberspace Operations (CS) experience as defined and described in Joint Publication 3- 13 Information Operations and 3-12 Cyberspace Operations, DoDI 8500.1and DoD 8570.01. Possess working … knowledge of DoD's IT system and network certification and accreditation processes to include system security authorization agreements. Possess the professional information technology and security certifications prescribed in DoD 8570.01-M, DoDI 8570.1M Demonstrate the ability to progress through established professional technical and IA certification tiers within an established time period per the Parsons Information Operations Standard Operating More ❯
Interested in driving digital tranformation and customer engagement? We are looking for an IT Application Specialist for a growing IT Team. The company Our client is the B2B Product Media expert and trusted partner for companies. And as the world is constantly changing, they keep thinking forward! They want to support you through the sustainable transition of the Product … location. From Hoofddorp, there is a 20-minute direct bus connection. The role In this role, you will be responsible for the delivery, maintenance, and continuous improvement of Product Information Management (PIM) platform. You will: Play a key role in delivering and maintaining innovative technology for our customers. Work closely with Product Owners, scrum team members, and other business … to ensure seamless implementation. Report to the Team Lead and contribute to a growing IT team that enhances user experience and maximizes application value. Manage PIM platform for product information and assets, ensuring data is up-to-date and complete. Engage with business stakeholders to negotiate requirements and understand their value. Fulfill business requirements by leveraging system configuration possibilities More ❯
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, national origin, age, protected veteran status, or disability status. Description Markon is seeking Information Assurance Specialists to support our NRO client at multiple locations across the US. Responsibilities The ideal Information Assurance Specialist will be responsible for (but not limited to … with a Counterintelligence Polygraph (Preferably with this client) High School Diploma, Associate's Degree, or Bachelor's Degree required (dependent on level) 2-10+ years of experience in Information Assurance or cybersecurity Familiarity with DoDI 8570 and related IA certification requirements Understanding of cybersecurity integration into systems and acquisition Experience monitoring, defending, and administering secure networks Desired: Current More ❯