with our clients to better understand and manage their security risks, architect and build secure infrastructure and solutions, and protect live services. In a rapidly changing world where information has a significant value, supply chains are increasingly interconnected. In a world of uncertainty when doing business on a global basis, the resilience of operations has become a board … do whatever it takes - from improving the security of a single component to delivering a holistic security and privacy program. As a Cyber Incident Response Advisory and Incident Management Senior Manager or Associate Director, you will focus on developing our business across both proactive and reactive services, whilst leading our advisory engagements and supporting live responses in an … provide further detail as you progress through the recruitment process or you can contact the Independence team upon request. Connect with your colleagues "I belong to a large eco-system of cyber professionals who are extremely knowledgeable and eager to share that knowledge with others . click apply for full job details More ❯
with our clients to better understand and manage their security risks, architect and build secure infrastructure and solutions, and protect live services. In a rapidly changing world where information has a significant value, supply chains are increasingly interconnected. In a world of uncertainty when doing business on a global basis, the resilience of operations has become a board … do whatever it takes - from improving the security of a single component to delivering a holistic security and privacy program. As a Cyber Incident Response Advisory and Incident Management Senior Manager or Associate Director, you will focus on developing our business across both proactive and reactive services, whilst leading our advisory engagements and supporting live responses in an … provide further detail as you progress through the recruitment process or you can contact the Independence team upon request. Connect with your colleagues "I belong to a large eco-system of cyber professionals who are extremely knowledgeable and eager to share that knowledge with others . click apply for full job details More ❯
and the ability to consult on complex projects while considering the business implications of technology decisions to the current and future business environment. Responsibilities: Lead collection, capture, and management of mission user needs from prioritization through concept development, and user story writing to support development and deployment. Facilitate the gathering of business focused requirements to support a product … customer facility. Requirements: Active Top Secret with SCI eligibility Minimum of 5 years of experience with 3 years of related technical specialized experience Education: Bachelor's Degree in InformationSystems Engineering, Computer Science, Engineering, Business or other related field In absence of degree, additional years of experience may be substituted for educational requirements Preferred: Agile and or/ More ❯
and the ability to consult on complex projects while considering the business implications of technology decisions to the current and future business environment. Responsibilities: Lead collection, capture, and management of mission user needs from prioritization through concept development, and user story writing to support development and deployment. Facilitate the gathering of business focused requirements to support a product … and stakeholders to ensure the most valuable features are clearly defined and addressed in each sprint Requirements Clearance Required: • Active Top Secret Minimum Education: • Bachelor's Degree in InformationSystems Engineering, Computer Science, Engineering, Business or other related field. • In absence of degree, additional years of experience may be substituted for educational requirements Minimum Years of Experience: • Minimum More ❯
Senior Data Management Professional - Data Product Owner - Data AI Location London Business Area Data Ref # Description & Requirements Bloomberg runs on data. Our products are fueled by powerful information. We combine data and context to paint the whole picture for our clients, around the clock - from around the world. In Data, we are responsible for delivering this data … competitiveness of Bloomberg's offerings. The Role: As a Data Product Owner, you will be responsible for providing subject matter expertise in fixed income data and annotation program management, to contribute to the development of Bloomberg Assistant (ASKB). You will play a crucial role, in collaboration with product and engineering teams to implement strategies to gather and … 4+ years of recent work experience in the financial services industry, focusing on Fixed Income Strong understanding of credit analyst workflows and data needs Demonstrated experience in data management concepts, for example in improving data accuracy, completeness or timeliness A proven track record of successful project management skills and ability to prioritize tasks accordingly Proficiency in More ❯
requirements. They work with systems engineers, solutions architects and programmers to ensure applications and systems interoperate to deliver end-to-end mission solutions and maintain the integrity of the system-of-system enterprise. Duties include: Provides a total systems perspective including a technical understanding of relationships, dependencies and requirements of hardware and software components. Supports planning, implementation approaches … globally distributed network of systems. Supports the planning and implementation approaches of data management practices to treat and handle data as a resource. Assists Government in managing system development efforts, moves or modernization changes including analysis, telecommunications (LAN, WAN, voice, video), planning, cabling, IT and cloud requirements, network security measures, and other factors. Refer to Section 3.3 … Enterprise Integration Engineering (Cross System and Segment) for a listing of expected work activities the Integration Engineer position would be required to support. Skills and Experience: Required: Bachelor's degree or higher in Engineering, Computer Science, Information Technology, ManagementInformationSystems, or related STEM degree program, or equivalent Mid level experience as a More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Larbey Evans
day-to-day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and integration stability. IT Applications Analyst Key Responsibilities: Perform ongoing system maintenance, patching, and upgrades in coordination with change management procedures Manage user access controls, including provisioning, de-provisioning, and access reviews Monitor system health and performance … to and resolve incidents and service requests in line with SLAs Provide break/fix troubleshooting and root cause analysis across supported systems Collaborate with infrastructure teams to support system scalability and optimization Facilitate alignment between delivery teams and Information Security, Infrastructure Partner with stakeholders to define and monitor adoption success criteria for newly implemented applications IT … Applications Analyst Skills & Requirements: 3+ years’ experience in enterprise application support or IT operations within a law firm Bachelor’s degree in InformationSystems, Computer Science, or related field (or equivalent experience) Experience with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patch management, and vulnerability remediation processes Familiarity with ITIL More ❯
systems. The intent is to provide senior decision makers with documented and actionable data to aid in making strategic investment decisions. What will you do? Document all identified system risks, planned test procedures, and results. Perform analyses of vulnerabilities identified during testing. Preview program-level documentation such as requirements specification, system architecture, design documents, test plans, and … security or related IT field. Demonstrated experience with cyber penetration testing. Demonstrated experience leveraging adversarial tactics to conduct hands-on security testing. Demonstrated experience applying computer attack methods and system exploitation techniques. Demonstrated working knowledge of cyber security principles for Linux, Windows, and virtual platforms. Demonstrated experience designing, testing, or implementing IT security architecture. Demonstrated experience performing network security … management tools Demonstrated experience developing risk management methodologies. Demonstrated experience analyzing test results to develop risk and threat mitigation plans. Demonstrated experience testing or reviewing system configuration, development, and design specifically around enterprise systems and hypervisors. Demonstrated experience designing, testing, or implementing complex Windows installations. Desired skills: Demonstrated experience participating in public and private informationMore ❯
based out of our Columbia, MD office. As a DAO3., you will serve on a team that is responsible for the Authorization and Assessment process under the Risk Management Framework (RMF) for new and existing informationsystems and will be expected to maintain Authority to Operate compliance for all assigned systems. Responsibilities: Responsible for assisting in … Cybersecurity into systems deployed in operational environments. Prepare security authorization documentation. Here's What You'll Need: Eight (8) years of related work experience as an IT Risk Assessor, System Security Engineer, InformationSystems Security Manager or DAO. A Bachelor's degree in Computer Science, Information Technology Engineering, or related field. In lieu of a … Level III certification, such as the GSLC, CISM, CISSP (or associate) certification. US Citizen with an active TS/SCI with Poly Working knowledge of the following is required: system security design process, defense-in depth/breadth, engineering life cycle, information domains, cross-domain solutions, controlled interfaces, identification, authentication and authorization, system integration, ICD More ❯
Job Duties and Responsibilities: PROGRAM PROTECTION PLANNING Develop and update the Program Protection Plan (PPP) Develop and update the Counterintelligence Support Plan (CISP), Integrated Threat Assessment and review the System Threat and Analysis Reports annually, provide written summaries and incorporate threat changes and countermeasures into the PPP. Review and update the Anti-Tamper Plan (ATP) Review and update the … Security Classification Guide (SCG) Review and update the Technology Assessment and Control Plan (TA/CP) Review and update the System Security Engineering Management Plan (SSEMP) Review acquisition documents for compliance with Critical Program Information (CPI) and Critical Components protection requirements Conduct regular contractor site visits to evaluate the design, implementation and verification of system security Evaluate system contractor change proposals, e.g. Engineering Change Proposals (ECPs), Task Change Proposals (TCPs), Configuration Change Proposals (CCPs), waivers and deviations, and provide security assessments. Evaluations shall address cost, schedule, performance and interface impacts/risks, and meet change board documentation requirements and suspense dates Develop, publish and maintain a PPP matrix that identifies current status for More ❯
more than 4,500 employees worldwide who engineer and deploy automated, secure, and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together we are creating the integrated systems and technologies that shape the built and cyber-physical world. We offer an excellent benefits package including: A competitive salary Medical … Commercial facilities to support the development and implementation of the DoD Risk Management Framework (RMF) process. Location: Onsite at JBAB Responsibilities Position Responsibilities: • Conduct ICS/SCADA system inventories following guidance including, but not limited to U.S. Army ICS Inventory Methodology and Unified Facilities Criteria (UFC) 4-010-06, Cybersecurity of Facility-Related Control Systems. • Assist in … and authorization process. • Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems. • Conduct vulnerability scanning and document system vulnerabilities. • Work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts. Required Education & Experience: Active TS/SCI w/polygraph clearance More ❯
position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management … area of Cyber Security. Daily Tasks include, but are not limited to: Coordinate and prepare Inspector General (IG) FISMA closure requests from field reps and program InformationSystem Security Engineers (ISSEs) Update and manage metrics reporting for several database sources Coordinate with RMF stakeholders on closure Body of Evidence (BoE) for Enterprise Vulnerability and Remediation (EVAR) tracked … findings Prepare and update slides for weekly and monthly deliverables for contract and EVAR meetings Research trending vulnerabilities being reported through enterprise security tools Support automation activities with system engineers from other offices Job Requirements Qualifications: Required: Current U.S. Government Top Secret clearance with SCI eligibility Favorably adjudicated Counter Intelligence Polygraph DoD 8570 certification in IAT or IAM Strong More ❯
Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates InformationSystems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to improve … 3+ years of relevant experience Clearance: TS/SCI with CI Polygraph Requirements/Responsibilities: ICD 503 and the Government's certification and accreditation process Networks, computer components, system protocols, and COTs technology System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers Software integration of … Linux, Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration managementSystem maintenance Integration testing Informationsystem engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration More ❯
Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 4. We are looking for a security professional who reviews and evaluates InformationSystems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … and 10+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • ICD 503 and the Government's certification and accreditation process • Networks, computer components, system protocols, and COTs technology • System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers • Software integration … Linux, Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Informationsystem engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration More ❯
Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates Government InformationSystems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … and 3+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • ICD 503 and the Government's certification and accreditation process • Networks, computer components, system protocols, and COTs technology • System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers • Software integration … Linux, Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Informationsystem engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration More ❯
Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates Government InformationSystems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … and 5+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • ICD 503 and the Government's certification and accreditation process • Networks, computer components, system protocols, and COTs technology • System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers • Software integration … Linux, Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Informationsystem engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration More ❯
Advanced Red Team LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates InformationSystems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … 3+ years of relevant experience Clearance: • TS/SCI with CI Polygraph Requirements/Responsibilities: • ICD 503 and the Government's certification and accreditation process • Networks, computer components, system protocols, and COTs technology • System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers • Software integration of … Linux, Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Informationsystem engineering • Penetration testing and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration More ❯
Arlington, Virginia, United States Hybrid / WFH Options
UICGS and Bowhead Family of Companies
undergoing cloud migration, responsible for creating, maintaining, and managing comprehensive technical documentation that meets stringent government standards. Responsibilities Lead the development and maintenance of comprehensive technical documentation suites including system specifications, user manuals, installation guides, and operational procedures Manage and coordinate documentation projects across multiple concurrent cloud migration initiatives Establish and enforce documentation standards, style guides, and quality assurance … processes Conduct complex technical interviews with subject matter experts, engineers, and system administrators to gather detailed information Create and maintain documentation templates, standards, and best practices for the organization Review and edit technical documents produced by junior staff, ensuring accuracy, clarity, and compliance Collaborate with cross-functional teams including developers, system architects, and project managers to … version control, and configuration management Advanced proficiency in technical writing tools including Microsoft Office Suite, Adobe Creative Suite, and documentation platforms Strong understanding of software development lifecycle, system architecture, and cloud computing concepts Proven leadership experience managing technical writing teams and complex documentation projects Excellent project management skills with ability to handle multiple concurrent deliverables More ❯
Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates NRO InformationSystems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … and 3+ years of relevant experience Clearance: TS/SCI with CI Polygraph Requirements/Responsibilities: ICD 503 and the Government's certification and accreditation process Networks, computer components, system protocols, and COTs technology System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers Software integration … Linux, Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration managementSystem maintenance Integration testing Informationsystem engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration More ❯
Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates NRO InformationSystems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform security focused services to … and 5+ years of relevant experience Clearance: TS/SCI with CI Polygraph Requirements/Responsibilities: ICD 503 and the Government's certification and accreditation process Networks, computer components, system protocols, and COTs technology System methodologies including: client/server, web hosting, web content servers, policy servers, directory servers, firewalls, WAN, MAN, LAN, switches, and routers Software integration … Linux, Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration managementSystem maintenance Integration testing Informationsystem engineering Penetration testing and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration More ❯
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … biometric authentication, video surveillance, audio visual, it systems, perimeter defense and command and control systems for federal, local and commercial customers across high-growth markets. Responsibilities InformationSystem Security Engineer Position Summary In this position you will work on developmental and operational teams responsible for system security engineering services of developmental and operational systems for our … Technology (IT) and Operational Technology (OT) systems Assisting in the development and verification of documentation necessary to complete the DoD RMF assessment and authorization process Conducting ICS/SCADA system inventories following DoD guidance Conducting vulnerability scanning and document system vulnerabilities Supporting ISO standardization and Quality inspections Participating in continuous improvement of organizational cybersecurity posture Provide systemMore ❯
SCI w/CI Poly Description: We are seeking an experienced Cyber Security Engineer to conduct systems security analysis and implementation, Risk Management Framework (RMF) and accreditation, system engineering, system design and assurance, testing, software engineering, program design, configuration management, integration, and testing of cybersecurity products and techniques. This role provides technical knowledge and … or risk management Active TS/SCI security clearance with CI Poly Active technical certification compliant with DoD 8140 (e.g., CYSA+) Experience with Automated InformationSystem (AIS) security with multiple IC SCI Control Systems, DoD Special Access Program (SAP)/Special Access Required (SAR) activities, and SCI Special Handling Experience in scripting languages, Linux/… Systems Manager (CISM) certification Understanding of NIST controls and logging tools Experience with DISA Security Technical Implementation Guide (STIG) application Possess a working knowledge of administrating servers, system and application security threats and vulnerabilities Experience with cyber security tools in areas such as cyber security, monitoring, automation, development, and deployment Experience with vulnerability scanning and malware remediation. More ❯
performing comprehensive INFOSEC assessment of management, operational, and technical security controls to determine overall effectiveness of the controls for A&A determination throughout our customer's program system lifecycle. SCAs provide an assessment of the severity of weakness or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. … and assess informationsystems (IS) for compliance with IC, DoD, and ND guidelines Provide security advice and guidance to government and industry partners Advise InformationSystem Owners (ISO) on confidentiality, integrity, and availability impact values Offer technical guidance for Authorization and Accreditation (A&A) responses Evaluate IS threats and vulnerabilities, recommending additional safeguards as needed … and assessments, prepare written reports for government approval Ensure completion of security control assessments for each IS Support RMF process-related presentations, briefings, and reports Utilize customer's RMF system of record for workflow duties and documentation Track and report on RMF process workflow activities and metrics Prepare Security Assessment Reports (SARs) and Authorization Recommendations Collaborate on Plans of More ❯
security Assessment and Authorization (A&A) support throughout a customer's programs lifecycle to Contractor and Government facilities processing customers information. SCAs enhance the InformationSystem (IS) security awareness of Directorates' & Offices' staffs, ensure that proper IS security resources are appropriately applied, and act as an IS liaison between the Directorates & Offices and OS&CI. … information about Government and industry IS status and representative contact information. Prepare, review, and record notification and status messages to indicate A&A state of systems to system owner or programs in a format approved by the Government. The contractor shall ensure that appropriate IS security requirements including applicable DCID, ICD, and customer directives and guidance are … addressed and applied, and that appropriate documentation is prepared by the system owners or programs. The documentation will be contained in the Security Assessment Package, including, but not limited to the Concept of Operations (CONOPS) Plan, System Security Plans, System Requirements Traceability Matrix, Risk Management Matrix, Test Results, interface control documents, requests for changes, test More ❯
performing comprehensive INFOSEC assessment of management, operational, and technical security controls to determine overall effectiveness of the controls for A&A determination throughout a customer program's system lifecycle. SCAs provide an assessment of the severity of weakness or deficiencies discovered in the IS and its environment of operation and recommend corrective actions to address identified vulnerabilities. … assess informationsystems (IS) for compliance with IC, DoD, and ND guidelines Provide IS security advice and guidance to government and industry partners Advise InformationSystem Owners (ISO) on confidentiality, integrity, and availability impact values Offer technical guidance for Authorization and Accreditation (A&A) responses Evaluate IS threats and vulnerabilities, recommending additional safeguards as needed … visits and assessments, prepare written reports for government approval Ensure completion of security control assessments for each IS Support RMF process-related presentations, briefings, and reports Utilize customer RMF system of record for workflow duties and documentation Track and report on RMF process workflow activities and metrics Prepare Security Assessment Reports (SARs) and Authorization Recommendations Collaborate on Plans of More ❯