successful candidate will provide strategic and technical leadership in cybersecurity, ensuring the integrity and security of mission-critical systems. This role requires hands-on expertise in cybersecurity, risk management, and compliance, as well as strong team leadership capabilities. The candidate must be based within a commutable distance to Annapolis Junction, MD, and will participate in an on-call … compliance with Homeland Security policies and directives. Develop and implement cybersecurity strategies, frameworks, and policies to enhance the security posture of critical systems. Oversee security risk assessments, vulnerability management, incident response, and threat intelligence activities. Provide guidance and mentorship to cybersecurity engineers and analysts. Lead security architecture reviews and technical assessments to identify and mitigate risks. Collaborate with … Band 7 EEO Statement Maximus is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, sex, age, national origin, disability, veteran status, genetic information and other legally protected characteristics. Pay Transparency Maximus compensation is based on various factors including but not limited to job location, a candidate's education, training, experience, expected quality More ❯
by solving the most daunting challenges facing our customers. Visit to learn how we're keeping people around the world safe and secure. Program Overview Provides IC data management support to modernize mega data repositories, dataflow management, data provenance and compliance validation, and streaming solutions. About The Role Peraton is seeking a Cloud Software Engineer to … Field will be considered equivalent to two (2) years of experience. 16 years of experience will be considered in lieu of a degree. NOTE: A degree in Mathematics, InformationSystems, Engineering, or similar degree will be considered as a technical field. Active TS/SCI security clearance with a current polygraph is required.Cloud Software Engineer qualifications: Full stack More ❯
role on a project, and they are eligible for a benefits package that is competitive for project delivery-focused professionals. Qualifications Required: Bachelor's degree in Computer Science, InformationSystems, or related field. … 7+ years of experience in Salesforce development and architecture. Proven experience leading Salesforce projects in federal or highly regulated environments. Salesforce certified (e.g., Salesforce Certified Technical Architect, Application Architect, System Architect) strongly preferred. Expertise in Apex, Visualforce, Lightning Components, and Salesforce APIs. Experience with integration platforms (MuleSoft, Informatica, etc.) and security protocols (OAuth, SAML). Strong understanding of federal … a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. Information for applicants with a need for accommodation More ❯
in all domain areas but should have a good understanding of how the various layers of an enterprise application stack interact with one another. You will work directly with system admin teams to assist and remediate vulnerabilities and harden environments, while providing recommendations on ways to enhance vulnerability management. Additionally, you will work in a team environment to develop … security assurance divisions to ensure vulnerability findings are understood, remediated or baselined as appropriate. Document & Socialize security findings and remediation solutions in an enterprise knowledge base. Support the Information Assurance Branch and the SOC with scan analysis and partner with development teams to understand and remediate security findings. Qualifications Required: Ability to obtain a U.S. government Security Clearance … analyze DISA STIG audit compliance scan results and provide recommendations for resolution Analyze security environment, provide recommendations Working knowledge of JIRA, Service Now or equivalent Working knowledge of operating system and dynamic application security testing scan tools - Invicti, Web Inspect, DAST/IAST suites Experience using Python to automate tasks Certifications: CEH, GFACT, GPEN, OSCP or other relevant industry More ❯
control environment, benchmark maturity against standards, and report gaps and risks. Review cloud and SaaS services for secure configuration, resilience, and vendor governance, using independent assurance to validate management's remediation. Apply data analytics for population testing and anomaly detection, develop repeatable scripts to increase coverage, report issues with clear severity, and track remediation while updating the IT … This list is not exhaustive and may be added to or amended from time to time. What we're looking for: Bachelor's degree in IT, Computer Science, InformationSystems, Business (or equivalent professional experience). CISA certified - Essential. Minimum 5 years' experience, with at least 3 years in IT audit, IT risk, IT compliance (or equivalent). More ❯
Mitigation planning: Conduct thorough risk assessments to identify potential compliance gaps and vulnerabilities. Develop and execute effective strategies to mitigate risks and ensure ongoing compliance. Policy and Procedure Management: Assist in developing, formalising, and maintaining clear, practical compliance policies, procedures, and standards. Collaborate closely with other business functions to integrate their compliance responsibilities seamlessly and embed into daily … track key performance indicators (KPIs) to measure compliance maturity, programme effectiveness, and progress against organisational, investor, and regulatory commitments. Stakeholder Engagement: Work collaboratively with Legal, People, Operations, Finance, Information Security, and other key stakeholders and sponsors to ensure transparency, consistency, and auditability of compliance processes across the organisation. Training and Awareness: Identify, develop, and oversee compliance training and … from various requirements. Evaluate the effectiveness of the compliance programme and implement necessary enhancements. What you'll bring. Experience: A minimum of Ten years' experience in compliance project management, ideally within the technology scale up sectors. Demonstrated success in establishing or scaling compliance programmes in dynamic, fast-paced, and rapidly evolving environments. Regulatory Knowledge: Good understanding of relevant More ❯
company security policies and procedures. You will thrive in a fast-paced environment with a bias for action. You should be able to build high-trust partnerships with management and other security team members, while being energetic, detail oriented, analytical, and self-starting. You will report to the Security Senior Manager and will: Follow the NISPOM, ICD, and … other industrial security programs to ensure compliance with government and company security policies and procedures. Your duties include support to both collateral level security programs and sensitive compartmented information programs. Primary duties include completion of eAPP/Agency nomination packages, completing DD-254 packages, fingerprinting, preparation of visit authorization letters (VALs), use of DISS, NBIS, and coordination with … customer security representatives to process security clearance requirements. Protect classified government information, monitor security procedures, ensuring compliance with all aspects of the program including personnel, physical and administrative security systems and procedures. Conduct security briefings and conduct security education programs briefings. Investigate losses and security violations and recommend corrective actions. Have the ability and flexibility to move from More ❯
organization's IT infrastructure. As a key member of our team, you will implement and manage robust configuration management processes, tools, and documentation. Your expertise will ensure system stability, compliance, and seamless integration of software and hardware across complex systems. If you are a motivated professional with a passion for configuration management and a drive … Change Control Board. Lead and facilitate Configuration Control Board (CCB) meetings and participate in Engineering Review Boards (ERBs) to address CM-related issues and concerns. Conduct regular audits of system configurations and resolve discrepancies to maintain data accuracy and conformance to CM best practices. Collaborate with development, operations, and security teams to ensure proper configuration across all environments. Develop … Top Secret/SCI DoD Security clearance with polygraph. Desired: Configuration Management certification (e.g., SCCM). ITIL Foundation certification for service management alignment. Experience with system engineering life cycle, including requirements, design, development, integration, testing, and deployment. - What You Can Expect: A culture of integrity. At CACI, we place character and innovation at the center More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Akima
for our Emerging Markets Group (EMG). This role demands a highly motivated, self-starting individual who can drive growth across the full business development lifecycle - identification, capture management, solutions development, proposal writing/reviewing, and post-award handoff. The Director will focus on differentiated high-end IT and technology solutions (cyber, cloud engineering), software development, digital automation … thrived above the Arctic Circle for more than 10,000 years. For our government customers, Akima delivers agile solutions in the core areas of facilities, maintenance, and repair; information technology; logistics; protective services; systems engineering; mission support; furniture, fixtures & equipment (FF&E); and construction. As an Akima employee, you will be surrounded by a challenging, yet supportive work More ❯
developing and integrating AI/ML models with large-scale data repositories. • Experience supporting command-level decision support tools and logistical data systems. • Familiarity with Cyber, Knowledge, and InformationManagement in military/operational environments. • Ability to collaborate with cross-functional and command staff teams. Responsibilities: • Develop and integrate AI/ML models (machine learning, deep … data repositories. • Deliver advanced analytics solutions with geographic visualizations, dashboards, and predictive/prescriptive analytics. • Partner with stakeholders to align AI/ML workflows with Cyber, Knowledge, and InformationManagement processes. • Build predictive models from large datasets for logistics objectives and decision-making. • Design and implement data ingestion/transformation pipelines to connect with enterprise repositories. More ❯
Education and Training Support, Parental Paid Leave, and much more. Join us and make a difference in National Security! Job Summary: Leidos is seeking an experienced, results oriented Information Technology (IT) Enterprise Architecture Modeler to join our team in the Bethesda, Maryland area. You will play a critical role in creating a model of our client's IT … and business analysts. Foster a culture of innovation and continuous improvement. Basic Qualifications: Active TS/SCI security clearance with polygraph B.S. degree in Systems Engineering, Computer Science, Information Technology, or related field (M.S. preferred); and 8 - 12 years of prior relevant experience or Masters with 6 - 10 years of prior relevant experience. May possess a Doctorate in More ❯
Counterintelligence Specialist - Mid This position requires an active TS/Sensitive Compartmental Information (SCI) clearance with the ability to obtain a Counterintelligence polygraph A government contract requires that this position be restricted to U.S. citizens or legal permanent residents. You must provide documentation that you are a U.S. citizen or legal permanent resident to qualify. Cherokee Analytics is … seeking a Counterintelligence Specialist that identifies, monitors, and assesses foreign intelligence efforts attempting collection of sensitive national security information on U.S. persons, activities and interests, including threats posed by emerging technologies to U.S. operations and interests. Compensation & Benefits: Estimated starting salary range: $110,000 - $130,000. Pay commensurate with experience. Full time benefits include Medical, Dental, Vision, 401K … USG responses to adversary action and insider threats by sharing threat indicators and enabling responsive measures from other agencies and services. Develop and operationalize an enterprise security risk management methodology across Government and industry stakeholders. Research, synthesize, exploit, evaluate, and analyze all-source reporting on FIE targeting USG critical technologies, programs, information, and supply chains. Develop More ❯
communicate issues as necessary with other members of the IT Department Perform work duties with minimal supervision Maintaining and managing Enterprise Imagining Solutions. Maintaining and configuring IT service management software. Incorporate customer feedback to continuously improve service delivery. Other duties as assigned. Degree/Education/Certification Requirements: Bachelor's degree in computer science, information technology … Windows OS 10 in a stand-alone and networked environment. • Proficient in the deployment, troubleshooting, and use of Microsoft 365 (MS Office suite). • Familiar with IT service management ticketing systems. • Experience with smart card multi-factor authentication. • Excellent organizational, communication, and customer service skills are a must. • Must be able to work as a productive team member … installation, repair, and configuration. • Experience in using Active Directory for user account and group management. • Experience using Microsoft Exchange for mailbox and distribution group management. • Experience in the management of Virtual Desktop environments (VMWare - Horizon) is preferred. • Must be skilled in the use of image deployment technologies. • Proficient in both networked and local print management. • Knowledge of and More ❯
expense comparisons by analysis of profit and loss statements and income statements. Prepares reports of findings and recommendations to management. Develops, maintains, and establishes operational specifications for financial informationsystems considering such things as information flow, volume, and document format for data processing equipment. May provide analysis on business development and may monitor business performance by More ❯
Our most common opportunities are in the following areas: Software Engineer/Developer: Java, Python, AI/ML DevOps Engineer Reverse Engineer/Embedded Engineer Systems Administration - Linux Information Security Systems Engineer/Officer (ISSE/ISSO) Data Scientist Systems Engineer TechSIGINT Analyst Oracle Database Administration (DBA) And many more technical positions Basic Qualifications: Experience Preferred (and commonly More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Three Saints Bay
letters, reports, electronic messages, requisition forms, and a variety of other Government forms. Prepare investigative financial charts (bank account links, wire transfer analysis). Log and enter pertinent information gleaned from financial analysis and investigative reports into databases. Gather and prepare statistical data. Utilize tools that aggregate data and facilitate analysis. Provide analytical support and case assessments to … agency priority investigations as determined by management; support will include, but not be limited to: FinCEN inquiries, agency internal database searches, open-source database searches, and bank account analysis/processing of grand jury information. Process and organize data (bank statements, financial reports) obtained by the field via the proper legal process in order to provide the field … a minimum of two years' experience working the field of auditing, accounting and/or finance in the private sector Ability to organize and conduct detailed examinations of information generated during complex criminal/civil investigations and information available through alternative sources, for the purpose of conducting financial analyses of personal/business assets of targeted More ❯
Man Group is a global alternative investment management firm focused on pursuing outperformance for sophisticated clients via our Systematic, Discretionary and Solutions offerings. Powered by talent and advanced technology, our single and multi-manager investment strategies are underpinned by deep research and span public and private markets, across all major asset classes, with a significant focus on alternatives. … across multiple offices globally. Man Group plc is listed on the London Stock Exchange under the ticker EMG.LN and is a constituent of the FTSE 250 Index. Further information can be found at . As at 31 March 2025 The Team We are looking for an AI engineer to help us build solutions that utilise the latest GenAI … other legally protected category or status in accordance with applicable federal, state and local laws. Man Group is a Disability Confident Committed employer; if you require help or information on reasonable adjustments as you apply for roles with us, please . Man Group is a global alternative investment management firm focused on pursuing outperformance for sophisticated More ❯
onsite in Huntsville, AL. Responsibilities: • Monitor & Analyze user activity data to detect anomalous behavior and potential insider threats. • Triage & Investigate alerts, documenting findings and reporting them through case management systems. • Develop & Implement countermeasures against known adversarial tactics, techniques, and procedures (TTPs). • Collaborate with cybersecurity, counterintelligence, and law enforcement teams to refine detection strategies. • Conduct Forensic Analysis on … integrating multiple security data sources and refining detection triggers. • Provide Briefings & Reports to leadership on trends, risks, and mitigation strategies. Required Experience: • Education: Bachelor's degree in cybersecurity, information assurance, or related field (or equivalent experience). • Experience: o 3 years relevant experience in UAM or insider threat detection, including bility to develop dashboards, filters, and audit policy More ❯
Saffron Walden, Essex, South East, United Kingdom Hybrid / WFH Options
EMBL-EBI
generating ChEMBL releases which are a mixture of Python and Java). Develop new innovative solutions for enhancing scientific data workflows and support our mission to disseminate scientific information publicly Manage and enhance scientific software tools essential for processing and storing chemical and biological data across the teams services, ensuring adherence to software development best practices. Collaborate with … to integrate computational methodologies into data curation and analysis workflows, including the incorporation of external chemical and bioactivity databases (e.g., BindingDB, PubChem) into the ChEMBL ecosystem. Support database management, including the maintenance and administration of database instances. Document workflows and processes to improve maintainability, efficiency, and reproducibility. Participate in cross functional project meeting with partners on campus (such … willingness to develop expertise and contribute to Java-based pipelines as needed Experience in using AI-based methods, such as NLP, LLM for efficient data processing Other helpful information: Hybrid Working - At EMBL-EBI we are pleased to offer hybrid working options for all our employees. A dedicated desk will be available everyday, but most of our team More ❯
shape our people strategy. Some of the key deliverables for the role will include: Data capture and integrity Ensuring data meets business and legal needs Collaborate with HR and system administrators to improve data accuracy and consistency in Dayforce Define and uphold data quality standard including validation and regular audits Lead initiatives to keep people data clean, Current and … with broader business data sets by working with IT, Finance, and other teams. Act as HR's data conscience, ensuring GDPR compliance and proper handling of personal and management information. Reporting Design tailored HR reports and dashboards for various stakeholders Enable self-service access to HR data and insights Continuously improve reporting processes for accuracy, timeliness and usability … in designing scalable solutions. What we're looking for: Ideally been a HR focused Data Analyst or similar role Previous experience with Dayforce (or any other HR/People System Proven experience with reporting tools such as Power BI, Tableau, SQL Solid experience in using Excel Understanding of data governance, compliance and regulatory reporting (pay, GDPR etc) Benefits include More ❯
Experience with Vistex Chargebacks, Billbacks/Paybacks, Distributor Incentives. Exposure to S/4HANA migration and Vistex upgrade projects. Bachelor's/Master's degree in Computer Science, InformationSystems, or related field. Medline Industries, LP, and its subsidiaries, offer a competitive total rewards package, continuing education & training, and tremendous potential with a growing worldwide organization. The anticipated … without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, age, disability, neurodivergence, protected veteran status, marital or family status, caregiver responsibilities, genetic information, or any other characteristic protected by applicable federal, state, or local laws. More ❯
CISSP, GSLC, or CCISO Salary: $146,000 - $234,000 Clearance: Active TS/SCI security clearance with a current polygraph is required Job Description: Seeking experienced InformationSystem Security Manager (ISSM) professionals to accomplish the following: Provide management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing InformationSystem Security policies, standards, and methodologies. Manage operational security posture for an InformationSystem or program to ensure InformationSystem Security policies, standards, and procedures are established and followed. Provide management of security aspects of the InformationSystem and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing sensitive information. Manage the performance of vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for informationMore ❯
/SCI Poly required Annapolis Junction, MD Information Technology Apply Now Newly awarded contract seeking Senior ISSO with the following skills: Provides aid to the program, organization, system, or enclave's information assurance program. Lends assistance for proposing, coordinating, implementing, and enforcing informationsystems security policies, standards, and methodologies. Maintains operational security posture … for an informationsystem or program to ensure informationsystems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the informationsystem and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for … processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for informationsystem security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and More ❯
perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for … of Agency security policy and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system … Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its content. Support security authorization activities in compliance with NSA/CSS InformationSystem Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes More ❯
Work Location: NIWC PAC, Point Loma, CA Work Schedule: Full-time, onsite Security Clearance: Secret Requisition: ISSM2-001-SD Job Summary: The InformationSystem Security Manager II will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO … C4I. The support will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service Risk Management, Integrated Logistics Support, Technical Oversight of commercial/non-governmental In-Service engineering activities, Configuration Management, Readiness and Life Cycle Analysis, Technical Documentation Development and Reliability/Availability and Maintainability (RAM) reporting and … W-3B1500 (EKMS Manager) or A-4C-1340 (KMI) (or DOD Service equivalent). Knowledge of the following data and communications link equipment and related systems: Communication Data Link System (CDLS) Network Tactical Common Data Link (NTCDL) Tactical Common Data Link (TCDL) Maritime Surface Terminal (MST) Intelligence Carry-On Program (ICOP) systems Naval Tactical Command Support System (NTCSS More ❯