understand business, security, and technical requirements, driving improvements to existing solutions. Collaborating with infrastructure, application, and governance partners across the Nuclear Security Enterprise, you will define informationsystem requirements to implement and support highly available, resilient solutions that enhance user experience. Duties and Responsibilities may include but are not limited to: Provide Web, REST API Single Sign … On authentication and authorization services by integrating with Access Manager. Work with developers to enable applications for authentication and authentication services. Monitor production services and respond to system problems and user issues. Perform Architect Access Management solutions using industry best practices and proven methodologies. Contribute to the fulfillment of technical projects and organizational objectives functioning as an … is underpinned by a merit-based culture that measures success by productivity and credibility. CeLeen will provide reasonable accommodations to applicants who are unable to utilize our online application system due to a disability. Please send your request to the Human Resources Team . CeLeen is committed to equal employment opportunity based on merit. We recruit, employ, train, compensate More ❯
site analysis, operation, and support of complex Counter Unmanned Aerial Systems (C-UAS) simulation models. • Formulate and apply mathematical modeling and other optimizing methods to develop and interpret information that assists management with C-UAS decision making, policy formulation, or other managerial functions. • Collect and analyze C-UAS data and develop decision support software, service, or … products. • Participate in routine working group sessions to facilitate information exchange, peer review and vetting of products. • Establish working relationships with analytical partners such as OSD-CAPE, Air Force Research Laboratory (AFRL), CAA, Navy N81, Joint Staff (JS)-J8, etc. to extend CCJ8's Modeling and Simulation Teams C-UAS analysis capabilities and expertise. • Develop C-UAS study More ❯
Oxfam is a global movement of people working together to end the injustice of poverty. Are you a visionary leader with a passion for safeguarding sensitive information on a global scale? Do you have the technical expertise to develop and implement leading information security and data protection strategies that ensure compliance and security? Can you inspire … teams to prioritise information security in an ever-evolving digital landscape? The Role: Oxfam GB is seeking a Head of Information Security and Data Protection to lead the Cybersecurity, Data Protection, and Information Governance teams. This role involves managing risks across these areas, ensuring compliance with relevant regulations and control frameworks, and coordinating information security efforts across the wider Oxfam confederation to protect its reputation and systems. Reports to: Chief Transformation Officer Direct reports: Information Security Manager, Data Protection Manager, Data Protection Officer, Information Governance Lead What we are looking for: We seek a candidate who is committed to Oxfam's mission to end poverty and aligns with More ❯
Job Number: R Program Management Specialist The Opportunity: Are you searching for a position where you can use your project management and analysis skills to develop a project from concept to completion? A program requires a significant investment of limited resources. With that level of complexity, you need to keep the project on a productive path. … That's why we need you, a project management spe cia list who can help ensure success through careful analysis and effective communication. On our team, you'll leverage program and project management expertise in supporting a U.S. Navy ( USN ) client for acquisition and sustainment management of an Acquisition Category ( ACAT ) program. You'll … work with program leadership to manage cost, schedule, and performance to support Navy Information Technology ( IT ) systems using tools like Micro sof t Excel to analyze budget s and tracking information, Micro sof t Project to manage schedules, Micro sof t Word to develop contractual and other technical documents, and Micro sof t PowerPoint to develop More ❯
Job Title : Information Security Assurance Specialist Contract Type: Permanent, Full Time Salary Range: £33,200-£41,500 depending on experience Location: Eastleigh Information Security Assurance Specialist: At Ageas, we are committed to protecting our customers, employees, and systems through robust information security practices. We are seeking a Information Security Assurance and Architecture … be responsible for supporting and operating the day-to-day activities relating to security, initiatives, controls and governance processes. This role is a combination of internal consultancy, change management and assurance activities to provide confidence to the business that we are meeting our security goals. You will act as the bridge between our technical teams and operational functions … you will be expected to spend 1 day per week in our Eastleigh office, the remainder of your time will be spent working from home. Main Responsibilities as Information Security Assurance Specialist: Support the A&A Manager to represent the information security department on change, architecture and projects Support on the delivery of the InformationMore ❯
MCS Group is seeking a Cyber Security Third Party Risk Management Lead to join their client, a thriving and well-established organisation with headquarters in Dublin. This position is a 12 month Fixed Term Contract into permanency as is standard in the organisation. With multiple projects in the pipeline and a growing team, this is a fantastic opportunity … for an experienced Risk Management professional to join a successful team in a newly created position. The Third-Party Risk Management (TPRM) Lead will be responsible for designing, implementing, and overseeing a robust third-party risk management programme. This role ensures that all external vendors, suppliers, and partners align with the organisation's security … legal, IT, the cyber team, and other business units, the TPRM Lead will assess, monitor, and mitigate third-party risks. This position is part of a growing risk management function, playing a key role in safeguarding the organisation against external threats. The successful candidate will be afforded public sector benefits - increased holidays, fantastic pension and unmatched job security More ❯
advice and recommendations on product design. Using Adobe Captivate Designing, building, and maintaining websites. Creating print products such as posters, books, and presentation materials. Using content creation and management tools for web design, web development, programming, graphic design, animation, videography, photography and audio recording, editing and distribution. Using JIRA or other IT ticket or work tracking system. Accessing … Qualifications Other skills and demonstrated experiences which are highly desired but not mandatory to perform the work, include demonstrated experience with or in: Web-based collaboration and document management platforms; task management tools that provide browser-based access for team document libraries, calendars, task lists, alert, and schedules such as SharePoint or other similar software products. … Video production or experience in a video production support role. JavaScript (JS). Graphic design including animation and 3D animation. Degree(s): Bachelor's Degree in Computer Science, InformationSystems, Graphic Design, Multimedia Development, Online Learning, or other related field from an accredited institution. Certification(s): UX/UI Ability Certification from an accredited institution. What We Offer More ❯
decompose and assist with managing performance budgets. Apply agile development principles to develop roadmaps and work packages that align with project priorities and make use of collaboration and management software tools to manage project execution. Support proposal teams and contribute to or lead the authoring of technical content. Identify and pursue expanded or new technical scope with current … to support the capture of additional work through viewpoints, white papers, or other intellectual capital. Build and maintain trusted relationships with clients through technical excellence. Efficiently communicate technical information to senior and executive leadership and clients. Communicate with high technical precision through succinct presentations, engineering reviews, and technical briefings, and convey complex technical concepts simply to non-technical … clearance; willingness to take a polygraph exam Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; Top Secret clearance is required. Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health More ❯
Eastleigh, Hampshire, United Kingdom Hybrid / WFH Options
Ageas
Job Title : Information Security Assurance Specialist Contract Type: Permanent, Full Time Salary Range: £33,200-£41,500 depending on experience Location: Eastleigh Information Security Assurance Specialist: At Ageas, we are committed to protecting our customers, employees, and systems through robust information security practices. We are seeking a Information Security Assurance and Architecture … be responsible for supporting and operating the day-to-day activities relating to security, initiatives, controls and governance processes. This role is a combination of internal consultancy, change management and assurance activities to provide confidence to the business that we are meeting our security goals. You will act as the bridge between our technical teams and operational functions … our Eastleigh office, the remainder of your time will be spent working from home. Main Responsibilities asInformation Security Assurance Specialist: Support the A&A Manager to represent the information security department on change, architecture and projects Support on the delivery of the Information Security assurance plan on an annual basis to confirm the ongoing effectiveness of More ❯
and tools used by the Actuarial Department. In this role you will support the implementation of approved business requirements necessary to support regulatory requirements, new products, reinsurance structures, managementinformation and external reporting requirements You will also support the production of financial results from the core Actuarial model and systems for use in the Actuarial Department More ❯
upgraded, as permitted by the applications reliant on them. Basic Qualifications 3+ years of experience with Elasticsearch Administration. Direct experience maintaining and integrating Elasticsearch within an operational enterprise information system. Experience working in an Agile development environment and tempo. Experience with deploying and using Elasticsearch in Commercial Cloud Platforms (e.g., AWS, Google Cloud, Azure). Bachelor's with … experience in lieu of a degree. TS/SCI with Poly is required for consideration. Preferred Qualifications Experience working on the customer's systems. Understanding of the customer's system development policies. Additional certifications related to Elasticsearch. At Leidos, the opportunities are boundless. We challenge our staff with interesting assignments that allow them to thrive professionally and personally. For More ❯
upgraded, as permitted by the applications reliant on them. Basic Qualifications 3+ years of experience with Elasticsearch Administration. Direct experience maintaining and integrating Elasticsearch within an operational enterprise information system. Experience working in an Agile development environment and tempo. Experience with deploying and using Elasticsearch in Commercial Cloud Platforms (e.g., AWS, Google Cloud, Azure). Masters with … substituted in lieu of a degree. TS/SCI with Poly is required for consideration. Preferred Qualifications Experience working on the customer's systems. Understanding of the customer's system development policies. Additional certifications related to Elasticsearch. At Leidos, the opportunities are boundless. We challenge our staff with interesting assignments that allow them to thrive professionally and personally. For More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
NEST Corporation
This is a new role for nest and will report to the Senior IT Service Operations Manager.Nest operates a three lines of defence approach to information security with the second and third lines delivered by an internal information security team and external auditors respectively. This role covers the first line of defence, of which a large … part is outsourced.Currently management of the 3rd party contract provisions related to security, together with various internal control responsibilities are covered by other members of the team for whom this is not a specialism. This role will take on those responsibilities, bringing more specialist experience and knowledge. You will help to develop and improve our information security controls as we seek to improve our infosec maturity using the NIST framework as an externally assessed benchmark.This first line role combines a contract management aspect with the requirement for hands-on process operation for internally managed controls such as access reviews, and some investigations such as subject access requests or insider threats.This role will More ❯
Category: : Professional Subscribe: : Department: : Information Technology Services - 02007 Locations: : Albany, NY Posted: : Mar 27, 2025 Closes: : Open Until Filled Type: : Full-time Ref. No.: : WF240312 Position ID: : 186812 About University at Albany: Established in 1844 and designated a University Center of the State University of New York in 1962, the University at Albany's broad mission of excellence … colleges across three campuses. Located in Albany, New York, New York State's capital, the University is convenient to Boston, New York City, and the Adirondacks. Job Description: Information Technology Services (ITS) at the University at Albany is seeking applicants for a Project Manager. This position is responsible for the management, monitoring, and delivery of projects … define project requirements, success criteria and desired outcomes. Reporting to the Project Portfolio Manager, the Project Manager is part of the team which oversees and updates ITS' project management framework, processes, and tools. They are engaged in fostering a culture of continuous improvement and promoting the development of project management standards and best practices. The Project More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
NCC
July 2025 Summary; The NCC is the UKs innovation partner! Were supporting a range of interesting new projects in the defence sector and are hiring for an additional Information Protection Officer to join our expanding secure operations team. The Information Protection Officers role is to ensure that policies and processes for secure operations are in place … communicated, and readily accessible to NCC personnel, contractors and visitors. Youll report into the Information Security Manager. What youll be doing; Youll support secure working across the NCC, working collaboratively with colleagues to provide guidance and develop practical approaches to information protection alongside innovation, engineering and operations. They ensure continuous improvement of policies and process in … spaces, to enable technical and operational activity to happen in an appropriately secure manner Attending collaborative working groups such as Space Review Board Supporting security audits Supporting asset management Review compliance with security policies and procedures Document security risks, and support the mitigation of threats to the confidentiality, integrity, availability, accountability and relevant compliance of informationMore ❯
Description Provides aid to the program, organization, system, or enclave's information assurance program. Lends assistance for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintains operational security posture for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established … and followed. Assists with the management of security aspects of the informationsystem and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for informationsystem security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Assists security authorization activities in compliance with InformationMore ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and More ❯
Are interested in this opportunity. Please forward a copy of your most update resume in word format to The candidate will be responsible for evaluating key points in the System Lifecycle, such as before its deployment or during major updates. Responsibilities may include creating security documentation (e.g., System Security Plan, Security Assessment Report) and obtaining the final authorization … controls, access controls, provisioning and deprovisioning, transfers, separation of duties, configuration management, contingency planning, application security, business process controls, interface controls, and data managementsystem controls. The candidate will be responsible for: • Conducting formal assessments and deciding whether the system is authorized to operate • Conducting a formal assessment of the system's … security posture • Evaluating whether security controls meet established standards and are functioning effectively • Documenting results and making recommendations for improving security • Recommending whether the system should be authorized to operate based on assessment outcomes • Ensuring that the system has the necessary security controls to minimize risks Basic Qualifications CANDIDATE MUST BE LOCAL TO ASHBURN, VA - SCHEDULE TBD - EXACT More ❯
security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for … of Agency security policy and enterprise solutions. Supports the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system and … networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its content. Applies system security engineering expertise in one or more of the following to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and More ❯
days a week. Secret clearance (minimum) is required. Salary is in the 130-155k range. What you will do Roles and Responsibilities: Provide cybersecurity expertise to surface combat system program offices. Lead efforts to bring platform information technology systems through the full life cycle of the Risk Management Framework (RMF) process to achieve/… Systems Agency (DISA). This includes but is not limited to Security Technical Implementation Guides (STIG), Security Requirements Guides (SRG). Work with the NAVSEA, PEO IWS, combat system program offices to ensure DOD/DON cybersecurity regulations and best practices are followed in the design, development, and sustainment of the integrated combat systems and weapon systems. Work … to work independently in a fast-paced environment with competing priorities. Technical IT and cyber security background. Excellent written skills since the validator develops and/or updates written system authorization supporting artifacts Excellent verbal skills since the validator works directly with the program offices and leadership to communicate progress, status, recommendations, and related information Excellent teamwork More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and … with developing ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve fidelity … supervision Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation Experience as an ISSO, InformationSystem Security Manager (ISSM), SCA, or Delegated Authorization Official Representative (DAOR)Strong attention to detail Ability to work in a team environment Working knowledge of Microsoft tools; Outlook, Excel, PowerPoint More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and … program. Develop ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve fidelity … supervision Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation Experience as an ISSO, InformationSystem Security Manager (ISSM), SCA, or Delegated Authorization Official Representative (DAOR)Strong attention to detail Ability to work in a team environment Working knowledge of Microsoft tools; Outlook, Excel, PowerPoint More ❯
Enterprises is hiring for a Senior Cybersecurity Engineer in support of the EMERALD program. The Cyber Security Engineer will serve as the primary security lead for the Mission Ground System (MGS) effort within NGA/TIAT. The role focuses on ensuring compliance with agency policies and security guidelines, while supporting all phases of the informationsystem … Act as the Security Engineer for all MGS-related IS within NGA/TIAT. Register all MGS IS with the NGA Designated Approval Authority (DAA). Develop and maintain System Security Authorization Agreement (SSAA) documents to reflect system development and security compliance. Ensure accurate and timely updates in the XACTA Information Assurance web application. Review and … validate system security plans for compliance with NGA policies and Intelligence Community Directives (ICDs). Schedule and oversee Vulnerability Assessment Testing (VAT); track findings in a Plan of Action and Milestones (POA&M). Monitor and respond to Information Assurance Vulnerability Alerts (IAVAs). Maintain ongoing communication with NGA C&A teams (IAO, CE, DAA) regarding systemMore ❯
Job Duties and Responsibilities: PROGRAM PROTECTION PLANNING Develop and update the Program Protection Plan (PPP) Develop and update the Counterintelligence Support Plan (CISP), Integrated Threat Assessment and review the System Threat and Analysis Reports annually, provide written summaries and incorporate threat changes and countermeasures into the PPP. Review and update the Anti-Tamper Plan (ATP) Review and update the … Security Classification Guide (SCG) Review and update the Technology Assessment and Control Plan (TA/CP) Review and update the System Security Engineering Management Plan (SSEMP) Review acquisition documents for compliance with Critical Program Information (CPI) and Critical Components protection requirements Conduct regular contractor site visits to evaluate the design, implementation and verification of system security Evaluate system contractor change proposals, e.g. Engineering Change Proposals (ECPs), Task Change Proposals (TCPs), Configuration Change Proposals (CCPs), waivers and deviations, and provide security assessments. Evaluations shall address cost, schedule, performance and interface impacts/risks, and meet change board documentation requirements and suspense dates Develop, publish and maintain a PPP matrix that identifies current status for More ❯
shooting of financial systems and associated interfaces/integrations Requirements development and implementation for complex to extremely complex systems in the subject matter area Makes recommendations and advises on system improvements in the following specialties: informationsystems architecture; networking; telecommunications; automation; communications protocols; risk management/electronic analysis; software; life-cycle management; software … 8+ years' experience supporting Momentum Financial Management software Bachelor's degree or equivalent experience (6 additional years of experience in lieu of degree) Experience analyzing and documenting system requirements, conducting functional analysis, writing and executing tests Experience leading meetings and owning long term tasks Experience writing and updating functional documentation Understands of the impact of Momentum system settings and knows how to configure a system to mimic the operational environment Preferred Qualifications: Ability to write and execute SQL queries Experience delivering training to end users Knowledge of the SAP (software company) Business Objects tool suite Experience with transitioning manual financial system testing to automated system testing 2 + years of experience working in More ❯