Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
Ipswich only applicable to existing BT employees) What you'll be doing Kubernetes DevOps/SysOps Engineering role managing Kubernetes clusters and container orchestration, automating deployment, scaling, and management of containerized applications. Implement best practices for Kubernetes configuration and security. Configuration, deployment and maintenance of Elastic Stack on Kubernetes (ECK) Work with log Collection Tools and Technologies (Beats … concepts such as microservices, service mesh. Strong knowledge of security policy/regulatory frameworks Experience Required for the Role Bachelor's/Master's degree in Computer Science, InformationSystems, Engineering, or other related fields 5+ years experience in a Dev Ops Role demonstrating ownership of a critical platform Experience leading a Dev Ops squad proving oversight and More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
is located in Colorado Springs, CO and will support the C2BMC program. The candidate will lead a team to ensure security compliance through the implementation of informationsystem security best practices for assigned informationsystems utilizing industry-standard cybersecurity tools. The candidate will be responsible for the overall ATO lifecycle and compliance enforcement of cybersecurity … expected to participate in tasks that include, but are not limited to the management of informationsystems, providing information for the development of System Security Plans, establishing and maintaining hardware and software configuration management plans, preparing documents to gain government approvals to operate informationsystems, weekly system audits … experience utilizing Tenable.sc, Trellix ePO, Splunk, and/or other vulnerability management compliance tools - Experience hardening Linux and Windows Operating Systems to DISA STIG baselines - Experience with system certification, auditing, and continuous monitoring - Experience managing and implementing the ATO Lifecyle utilizing eMASS, Xacta, or other technologies Desired Skills: - Knowledgeable of vulnerability management tools - Knowledgeable of More ❯
Lexington Park, Maryland, United States Hybrid / WFH Options
Spalding, a Saalex Company
Description Spalding, a Saalex Company is seeking a Network and Computer System Administrator in Lexington Park, MD. Spalding, a Saalex Company is a professional services company delivering cutting-edge solutions to the Department of Defense since 2001. Our expert-level solutions include software development, information technology, program management, financial management and business intelligence … interfaces/integrations of third-party tools to Teamcenter. Maintain network performance by performing network monitoring and analysis, and performance tuning; troubleshooting network problems; escalating problems to vendors. Perform system monitoring and verify the integrity and availability of hardware, network, and server resources and systems. Review system and application logs and verify completion of scheduled jobs, including system … can be substituted for a BS or BA degree. Desired: Working experience with Naval aviation logistics systems and IT tools/technologies desired, i.e. OOMA, Aircraft Inventory Readiness Reporting System, AvPLM, Technical Directives, Product Lifecycle Management (PLM), Teamcenter, MRO, and DECKPLATE. Prior senior civilian or military service desired. CompTIA Security+ or CISSP certification. Education: BS or BA More ❯
San Diego, California, United States Hybrid / WFH Options
G2 Ops, Inc
factors). Benefits: Competitive package valued between $13,000 for individuals and $28,000 for families. Openings: Multiple roles supporting various DoD customers. Knowledge Requirements: Systems architecture, requirements engineering, system verification & validation, risk analysis, and familiarity with tools like DOORS and defense industry standards (DoDAF). Additionally, proficiency in system modeling, simulation, and analysis tools (e.g., MATLAB, Simulink … the Role As a Systems Engineer at G2 Ops, you will likely focus on developing and integrating submarine communication systems and/or establishing standards, governance, and enterprise-wide system engineering processes. Both roles require strong systems engineering expertise, but each demands a distinct skill set and technical focus. Systems Development & Integration Our customer supports submarine communications by developing … testing, and integrating advanced systems. If you join this team, your responsibilities will include: Developing and integrating communication systems for submarine platforms. Conducting system verification & validation to ensure performance in undersea environments. Managing system lifecycle requirements, including software and hardware integration. Testing and evaluating new technologies. Developing system models and performing trade studies to optimize performance and More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
CACI
ServiceNow Configuration Management Database Technical Lead Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: CACI is looking for a ServiceNow Configuration Management Database (CMDB) Technical Lead to support our DoD customer … user experience across the customer environment. On this program, CACI will deliver capabilities and services to implement and operate an enterprise ITSM solution, enterprise service desk and endpoint management for end user devices to enable the DoD customer to transition focus from IT operations to mission operations. This position is hybrid, with work expected on site in Chantilly … impact Qualifications: Required: Active secret clearance OR ability to obtain a secret clearance 10+ years of relevant experience Bachelor's Degree (or 15 yrs without a degree) ServiceNow Certified System Administrator certifications. Experience recommending commercial solutions to the DoD, especially in the CMDB and asset space. Experience reviewing reports of computer equipment production, malfunction, and maintenance to determine and More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Chief Information Security Officer (CISO) 📍 Location: London (Hybrid Working Model) 💼 Salary: Competitive + Bonus + Equity Options 🕒 Type: Full-time, Permanent About the Role Chief Information Security Officer (CISO) to join a fast-scaling, high-impact organisation in the heart of London. This is a strategic, foundational hire —you will be responsible for designing and building … has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO … execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure More ❯
City of London, London, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Chief Information Security Officer (CISO) 📍 Location: London (Hybrid Working Model) 💼 Salary: Competitive + Bonus + Equity Options 🕒 Type: Full-time, Permanent About the Role Chief Information Security Officer (CISO) to join a fast-scaling, high-impact organisation in the heart of London. This is a strategic, foundational hire —you will be responsible for designing and building … has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO … execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure More ❯
South East London, England, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Chief Information Security Officer (CISO) Location: London (Hybrid Working Model) Salary: Competitive + Bonus + Equity Options Type: Full-time, Permanent About the Role Chief Information Security Officer (CISO) to join a fast-scaling, high-impact organisation in the heart of London. This is a strategic, foundational hire —you will be responsible for designing and building … has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO … execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerability management, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure More ❯
Amyx is seeking to hire a Cybersecurity Certification and Accreditation (C&A) Analyst for a remote position supporting Defense Operation Technology environments with regards to Authorization of informationsystems and all associated cybersecurity policies and procedures. The C&A Analyst should possess an understanding of how the security controls identified in the NIST 800-53 apply to the … The C&A Analyst will assist in the determination of the applicable severity value for an identified vulnerability (e.g., non-compliant security control), determine the possible ramifications on the system's current or future authorization, and be required to brief senior management on the progress or results of an informationsystem undergoing the authorization … maintain continuous monitoring programs for OT environments. Conduct security control assessments to evaluate the effectiveness of security controls in place for OT systems. Prepare and review accreditation packages, including system security plans (SSPs), risk assessments, and security control assessments Must have the ability to communicate accurate information Qualifications Required: • Secret Clearance • Must be eligible for IT-II More ❯
King's Cross, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
careers Support and drive process change and communication in line with Dynamics365 F&O and CRM best practice Coordinate and contribute to end-user training, including the development of system documentation and training materials Assist with functional specifications of customizations and integrations required for Dynamics365 F&O and CRM implementations Provide pre-go-live and post-go-live end … user support Serve as the lead Dynamics365 F&O and CRM technical expert on the development team Take responsibility for the customized unit programming and overall system functionality Work with the Project Managers, Business Analyst and Consultants to understand the business/application requirements of the assigned task Take responsibility for delivering development tasks within agreed budgets and timelines … years of people management 2+ years in a large international company preferred Excellent organizational skills with the ability to balance multiple demands Proven ability to write effective system and process documentation ?"including business and system requirements, process diagrams, and data flow charts Exceptional customer service skills follow up with clients and team members and takes the More ❯
careers Support and drive process change and communication in line with Dynamics365 F&O and CRM best practice Coordinate and contribute to end-user training, including the development of system documentation and training materials Assist with functional specifications of customizations and integrations required for Dynamics365 F&O and CRM implementations Provide pre-go-live and post-go-live end … user support Serve as the lead Dynamics365 F&O and CRM technical expert on the development team Take responsibility for the customized unit programming and overall system functionality Work with the Project Managers, Business Analyst and Consultants to understand the business/application requirements of the assigned task Take responsibility for delivering development tasks within agreed budgets and timelines … years of people management 2+ years in a large international company preferred Excellent organizational skills with the ability to balance multiple demands Proven ability to write effective system and process documentation ?"including business and system requirements, process diagrams, and data flow charts Exceptional customer service skills follow up with clients and team members and takes the More ❯
performance of operational controls, implement and manage security controls and consider lessons learnt in order to protect the bank from potential cyber-attacks and respond to threats. Accountabilities: * Management of … security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cyber security incidents, and provide a prompt response to restore normal operations with minimised system damage. * Identification of emerging cyber security threats, attack techniques and technologies to detect/prevent incidents, and collaborate with networks and conferences to gain industry knowledge and expertise. * Management … on the audience. Some other highly valued skills may include: * A solid technical understanding of threats against the financial industry across physical and cyber threat domains. * Proficiency in operating system fundamentals and security (Windows & Linux). * Expertise in networking principles, protocols, and practices. * Familiarity with traditional ITIL concepts, including incident, change, and problem management. * Understanding of cloud security principles More ❯
IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients. Primary Responsibilities: Develop secure privileged access management solutions and architectures for clients. Evaluate designs and infrastructure against information assurance/security standards and procedures. Support Authorizing Official (AO) actions by developing and delivering PAM … Privileged Access Management) solutions that include supporting documents and artifacts in accordance with RMF as defined in NIST 800-37 revision 2 and related agency specific RMF requirements Provide input into an Audit and Accountability Plan containing methods, procedures, and planned reviews for the continuing accreditation and authorization against AU (Audit and Accountability) family controls per NIST SP … Access Control family of controls to include auditing annually, at a minimum Develop integrated solutions, processes, and procedures for evaluating, monitoring, remediating, and/or documenting informationsystem security vulnerabilities IAW DoD Instruction (DoDI) 8510.01 (RMF for DoD IT) Support integration and implementation of Asset Management, Identity, Access Control Systems/Solutions, Compliance Monitoring and More ❯
Columbia, Missouri, United States Hybrid / WFH Options
Centene
professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Leads the Identity and Access Managementsystems and solutions. Performs review of system, user, and administrative roles and accounts and to understand access levels for enterprise applications and platforms. Designs, builds, tests, and maintains scalable and stable off-the-shelf software applications … builds technology software solutions to meet technical business identity access needs. Leads cross functional teams through the entire implementation process. Enforces policies and procedures related to identity lifecycle management, and supporting resources using IAM technical best practices Analyzes, designs, develops, implements, and supports identity related areas of software applications and identity governance Reviews documentation of IAM related technical … requirements, designs, infrastructure, and support processes Liaises with other teams in information security risk management infrastructure, architecture management, and business functions to implement end to end IAM solutions Leads the development of overall IAM technical strategies, designs, standards and procedures which support business strategies Performs the coding, configuring, testing and documentation of developments in More ❯
Florissant, Missouri, United States Hybrid / WFH Options
Centene
professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Leads the Identity and Access Managementsystems and solutions. Performs review of system, user, and administrative roles and accounts and to understand access levels for enterprise applications and platforms. Designs, builds, tests, and maintains scalable and stable off-the-shelf software applications … builds technology software solutions to meet technical business identity access needs. Leads cross functional teams through the entire implementation process. Enforces policies and procedures related to identity lifecycle management, and supporting resources using IAM technical best practices Analyzes, designs, develops, implements, and supports identity related areas of software applications and identity governance Reviews documentation of IAM related technical … requirements, designs, infrastructure, and support processes Liaises with other teams in information security risk management infrastructure, architecture management, and business functions to implement end to end IAM solutions Leads the development of overall IAM technical strategies, designs, standards and procedures which support business strategies Performs the coding, configuring, testing and documentation of developments in More ❯
Kansas City, Missouri, United States Hybrid / WFH Options
Centene
professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Leads the Identity and Access Managementsystems and solutions. Performs review of system, user, and administrative roles and accounts and to understand access levels for enterprise applications and platforms. Designs, builds, tests, and maintains scalable and stable off-the-shelf software applications … builds technology software solutions to meet technical business identity access needs. Leads cross functional teams through the entire implementation process. Enforces policies and procedures related to identity lifecycle management, and supporting resources using IAM technical best practices Analyzes, designs, develops, implements, and supports identity related areas of software applications and identity governance Reviews documentation of IAM related technical … requirements, designs, infrastructure, and support processes Liaises with other teams in information security risk management infrastructure, architecture management, and business functions to implement end to end IAM solutions Leads the development of overall IAM technical strategies, designs, standards and procedures which support business strategies Performs the coding, configuring, testing and documentation of developments in More ❯
Saint Louis, Missouri, United States Hybrid / WFH Options
Centene
professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Leads the Identity and Access Managementsystems and solutions. Performs review of system, user, and administrative roles and accounts and to understand access levels for enterprise applications and platforms. Designs, builds, tests, and maintains scalable and stable off-the-shelf software applications … builds technology software solutions to meet technical business identity access needs. Leads cross functional teams through the entire implementation process. Enforces policies and procedures related to identity lifecycle management, and supporting resources using IAM technical best practices Analyzes, designs, develops, implements, and supports identity related areas of software applications and identity governance Reviews documentation of IAM related technical … requirements, designs, infrastructure, and support processes Liaises with other teams in information security risk management infrastructure, architecture management, and business functions to implement end to end IAM solutions Leads the development of overall IAM technical strategies, designs, standards and procedures which support business strategies Performs the coding, configuring, testing and documentation of developments in More ❯
Jefferson City, Missouri, United States Hybrid / WFH Options
Centene
professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Leads the Identity and Access Managementsystems and solutions. Performs review of system, user, and administrative roles and accounts and to understand access levels for enterprise applications and platforms. Designs, builds, tests, and maintains scalable and stable off-the-shelf software applications … builds technology software solutions to meet technical business identity access needs. Leads cross functional teams through the entire implementation process. Enforces policies and procedures related to identity lifecycle management, and supporting resources using IAM technical best practices Analyzes, designs, develops, implements, and supports identity related areas of software applications and identity governance Reviews documentation of IAM related technical … requirements, designs, infrastructure, and support processes Liaises with other teams in information security risk management infrastructure, architecture management, and business functions to implement end to end IAM solutions Leads the development of overall IAM technical strategies, designs, standards and procedures which support business strategies Performs the coding, configuring, testing and documentation of developments in More ❯
St. Louis, Missouri, United States Hybrid / WFH Options
Centene
professionals have access to competitive benefits including a fresh perspective on workplace flexibility. Position Purpose: Leads the Identity and Access Managementsystems and solutions. Performs review of system, user, and administrative roles and accounts and to understand access levels for enterprise applications and platforms. Designs, builds, tests, and maintains scalable and stable off-the-shelf software applications … builds technology software solutions to meet technical business identity access needs. Leads cross functional teams through the entire implementation process. Enforces policies and procedures related to identity lifecycle management, and supporting resources using IAM technical best practices Analyzes, designs, develops, implements, and supports identity related areas of software applications and identity governance Reviews documentation of IAM related technical … requirements, designs, infrastructure, and support processes Liaises with other teams in information security risk management infrastructure, architecture management, and business functions to implement end to end IAM solutions Leads the development of overall IAM technical strategies, designs, standards and procedures which support business strategies Performs the coding, configuring, testing and documentation of developments in More ❯
Reston, Virginia, United States Hybrid / WFH Options
TekSynap
Responsibilities & Qualifications This contract supports the Department of Homeland Security (DHS) and its component agency, the Federal Emergency Management Agency (FEMA), in advancing its mission to protect the nation and respond to emergencies effectively. Specifically, it focuses on enhancing and sustaining FEMA's Office of the Chief Information Officer (OCIO) Operations Portfolio. The mission centers around … the Operations and Maintenance (O&M) of IT systems and services that are critical to FEMA's ability to deliver emergency management capabilities. This includes ensuring continuous system availability, security, modernization, and operational efficiency to support FEMA's mission-critical programs and services. RESPONSIBILITIES Ten Years (10) of experience in design and support cloud architecture for multi … state and guide prioritization and sequencing of transformation efforts. Propose and develop a strategic roadmap that supports long-term IT and mission goal REQUIRED QUALIFICATIONS Experience: Background in information technology with a focus on cloud architecture , including multi-tier or hybrid environments and enterprise-level designs. Certifications (must include): Certified InformationSystems Security Professional ( CISSP ) ITIL More ❯
Washington, Washington DC, United States Hybrid / WFH Options
CGI
incidents to understand the impact and threat mechanisms - Own the response and remediation for alerts - Ensure that each alert description and recommendation is clearly articulated to technical and management personnel - Develop proper response actions as part of guided response to DOJ, in the context of a specific security incident - Engage with DOJ to guide through a response action … related field or equivalent demonstrated experience and knowledge -Minimum of 6 years hands-on experience and expert knowledge with RMF and NIST -Minimum of 3 years supporting and maintaining system authorizations for a federal government department or agency cloud based systems -Strong knowledge of Cybersecurity best practices -Strong verbal and written communication skills At least 2 of the following … certifications are required: -Certified InformationSystems Security Professional (CISSP) -Certified Information Security Manager (CISM) -Certified Governance, Risk and Compliance (CGRC) -Certified in Risk and InformationSystems Control (CRISC) -InformationSystems Security Management Professional (ISSMP) -Certified InformationSystems Auditor (CISA) -Certified Cloud Security Professional (CCSP) -Certified Ethical Hacker (CEH More ❯
Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
of the company's core products to an existing customer. This role will lead a team that will oversee, co-ordinate and deliver all facets of cyber and information security related to the delivery across an engineering lifecycle - from requirements all the way through to in-service support and maintenance. This is an exciting opportunity at the very … z2ez0 That extends outside of traditional enterprise IT scenarios extending to proprietary and open-source software, firmware and electronic hardware. Developing, evaluating and analysing design constraints, and detailed system and security designs as they pertain to the cyber domain. Decomposing cyber and security requirements down to the system control level. Conducting cyber and information security risk … activities including threat modelling, vulnerability analysis and analysis of mitigations, including technical understanding. Scoping and managing security verification and validation activities and remedial action plans. Coordinating with product engineers, system architects, and developers to provide oversight and guidance in the development of robust solutions, including advising on suitable product or platform lockdown and configurations. It would be nice if More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Concurrent Technologies Corp
safer, more secure future. Elevate your readiness posture and make a tangible impact in building a world that's better prepared for tomorrow's uncertainties." Key Responsibilities: • Provide information technology guidance and direction for safety and occupational health data analytics projects. • Provide management oversight and technical direction for the safety analytics and reporting tools, including assisting … associated with managing large-scale data warehouse and analytic platforms. • Contribute to the development and execution of long range and multi-year work plans and schedules in support of system releases. • Provide metrics and performance standards that guarantee successful operations and maintenance • Prepare and present briefings to senior management officials. Communicates complex functional and technical requirements, issues … and problems to both technical and non-technical personnel. • Develop and/or provide input for the planning, budget, configuration and management processes related to large, complex data warehouse and analytic platforms. • Monitor implementation of DoD safety data standards and business processes to form judgements on potential revisions of data standardization and business processes. • Engage with stakeholders to More ❯
visit planning, retail execution, inventory management, and promotional tracking. Lead code reviews, enforce development standards, and ensure high-quality, maintainable code. Troubleshoot and resolve platform issues, ensuring system stability and performance. Work in Agile teams, managing sprint deliverables and aligning with product owners and solution architects. Technical Requirements: 6+ years of Salesforce development experience, with at least … Apex , Lightning Web Components (LWC) , SOQL , and Salesforce DX . Proven experience integrating Salesforce with external systems (REST/SOAP APIs, middleware). Familiarity with Retail Execution , Visit Management , and Field Sales processes in FMCG. Experience with CI/CD pipelines , Git , and automated testing frameworks. Salesforce certifications (e.g., Platform Developer II, Consumer Goods Cloud Consultant) are highly … work under pressure in fast-paced environments. Collaborative, agile mindset with a focus on continuous improvement. Academic & Professional Qualifications: Bachelor's or Master's degree in Computer Science, InformationSystems, or related field. Strong academic background and a passion for learning and innovation. Team Environment & Culture: Join a high-impact digital programme with over 20 team members across More ❯
scalable, and secure lottery solutions that evolve with the needs of players and operators. Our flagship platform, Genesis , provides a powerful foundation for lotteries worldwide, featuring: Player Account Management (PAM) for secure and seamless player experiences Draw-Based Games (DBG) for classic lottery draws Nexus Aggregator & Apollo RGS for e-Instants and Fast Play games Web & mobile applications … employees into our digital ecosystem and a key player helping ensure we deliver projects as we continually update our cloud infrastructure. Key Accountabilities and Duties: Procurement and vendor management, working with SaaS tools to better support cost savings, license management and supplier relationships Create a technology wide procurement process for identifying and negotiating with potential new … asset assignment for our team including remote hardware troubleshooting, logistic management with kit allocation and replacements delivered hand in hand with maintaining our inventory managementsystem Provide in person support in our office in London and remote support as well for the remote employees in other countries/offices. Work with the Infrastructure Team in More ❯