known for their ability to overcome the most advanced technical challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers do more than just work with cutting-edge technology-they ensure the missions succeed for the customers! CODEX offices span the nation and … vision plans, child, elderly and dependent-care programs, mental health resources, tuition assistance, employee discount programs, 401k matching, flexible work schedules (depending on program), a peer recognition and reward system and performance-based bonuses. We seek a qualified engineer that can perform as a team member on activities involved with vulnerability research, reverse engineering, and tool development for complex … Requires advanced knowledge of work area typically obtained through advanced education combined with experience Desired Skills 3+ years of RE/VR experience C/C Python Utilizing full system emulation for research and analysis Embedded system analysis Capture the Flag (CTF) experience Fuzzer development Understanding of network protocols (TCP/IP stacks, wire-level protocols, RF communications More ❯
dedicated individuals. It is an outstanding opportunity for a career in a highly skilled global organization. WHAT WE OFFER You will be part of the Supply Chain Management (SCM)Platform, focused on designing and engineering the SCM platform's foundational capabilities. You will join one of our highly capable scrum teams in the UK/India/Denmark … Software Engineer is a very important "T-Shaped" role demonstrating both depth and breadth across key engineering competencies, e.g. Systems Design, Software Development, Testing, DevOps, Security, Analytics, Lifecycle Management, etc. and successfully collaborate with experts from other subject domains. As a contributing hands-on engineer in the SCM Platform, you will be expected • To actively participate in all … and development practices including automation. • To design, develop, test, deploy, improve and maintain high quality (scalable, reliable, high performant, highly secure) micro services which follows Maersk Architecture principles, Information Models and quality and security standards. • To monitor our business-critical application estate respond to incidents/change request/Bugs, prioritize them, analyze root cause and advise/ More ❯
The Research and Technology Protection (RTP) team develops and provides subject matter expertise in providing day-to-day security classification guidance and assessments of classified and controlled unclassified information GEOINT campaigns and program tools development within the NGA Research Offices and Divisions. RTP is a security risk management process that identifies and safeguards both technical and … programmatic information from concept through transition to a mission partner. RTP analyzes information and processes to ensure security of information and technology to safeguard U.S. Government, National Security, and the Intelligence Community interests against unauthorized disclosure. Additionally … RTP applies operations security and selected countermeasures to the protection of critical information generated by the NGA Research workforce. Responsibilities include, but are not limited to: Provide system security analysis and program documentation and risk assessment analysis in support of the RTP mission. Research and recommend long and short-term program protection strategies and tactics for new More ❯
candidates with a broad and senior Cyber Security skillset who are seeking to further develop their Cyber Security career in an exciting industry. Engineering skills in maintaining Security Information and Event Management (SIEM) platforms and the configuration of our wider security tools are key. We are also seeking candidates with experience leveraging AI to enhance productivity … to identify and promptly respond to security events. Leading the response to major cyber security incidents, collaborating with key business and technical stakeholders during investigations to gather further information and coordinate response actions. Identifying and responding to game related threats like leaks, cheats, piracy, copyright abuse and account compromise. Managing our security operations outsourcing partners to maximise the … Cyber Security tools and platforms to continuously improve our detection and response capability. Supporting the management, administration and support of our SIEM platform, including general infrastructure and system administration, troubleshootingand user access management Maintaining and tuning security detections and alerts within our SIEM platform. Onboarding and managing security log sources for our SIEM platform, including More ❯
We immerse ourselves in the intricacies of finance digitization, subscription management, compliance, and revenue management which gives us the power to make a real impact. Once we understand how an organization works, we can implement software solutions that provide the clarity, confidence, and control they need to drive growth and achieve their ambitions. Aptitude has served … technical support to Aptitude Software's customers regarding the company's product portfolio. Engaging with company's clients through skillful analysis, effective communication, coordination and cooperation with product management and development teams, in order to timely resolve incidents and requests. Maintaining a high level of client satisfaction. Obtaining detailed and accurate information relating to the business … of root cause isolation when needed. Gathering and presenting client insights to teams across Aptitude while adhering to processes that ensure consistent and repeatable results. Liaising with Support management in North America, the UK and Poland. That's all important, true, but in reality the only thing that matters is to (paraphrasing Pratchett's words) " not only to More ❯
initiatives for business impact, like content deals and marketing activations. Game Database Hygiene and Program Development: Accurately enter and maintain comprehensive game data within internal systems, ensuring all information is up-to-date, precise, and correctly formatted. Demonstrate a deep understanding of how your data populates across teams and systems, proactively validating and troubleshooting discrepancies to maintain the … or product management. Strong analytical and problem-solving skills; ability to troubleshoot technical issues with software builds. Excellent written and verbal communication skills, with the ability to tailor information for various audiences and for different goals. Experience with building presentation decks and leading or supporting presentations. Proficiency with Windows devices and a broad familiarity with gaming hardware and … internally and externally. Proven ability to be self-motivated and self-directed, managing multiple tasks with autonomy, and hit deadlines with high attention to detail. Preferred Qualifications Project management experience, with a record of supporting or leading cross-functional initiatives. Familiarity with database systems and workflow automation tools. Experience with or desire to learn processes and systems. Passion More ❯
Counterintelligence Analyst - Mid This position requires an active TS/Sensitive Compartmental Information (SCI) clearance. Cherokee Insights is seeking a CI Analyst in the Analysis Division to provide mid-level CI analytical support to CI AD to identify, assess, and disrupt threats to cleared industry, cleared personnel, DOD, and the Defense Counterintelligence and Security Agency (DCSA). The … DoD, IC, and law enforcement agencies/organizations and for DCSA's CI programs, functions, and mission activities enabling the development and operationalization of an enterprise security risk management methodology across Government and industry stakeholders. Conduct CI analysis at DCSA region and associated field locations to assess FIE threats to cleared industry, cleared personnel, DOD, and DCSA. Analyze … or other type of reports IAW current DCSA SOPs. If a report is warranted, the Contractor shall write the report and input it into the DCSA CI Directorate's system of record, draft the associated CIR, or similar document as required, and forward to the applicable CISA. Assist the collection management officers to generate IIRs from industry More ❯
Sysmon & Auditd) 5 years of experience with the following threat hunting tools: Microsoft Sentinel for threat hunting within Microsoft Azure; Tenable Nessus and SYN/ACK for vulnerability management; NetScout for analyzing network traffic flow; SPUR.us enrichment of addresses Mandiant Threat intel feeds Must be able to work 80% (Monday thru Thursday) onsite at AOUSC office in Washington … and non-cloud-based applications such as: Microsoft Azure, Microsoft O365, Microsoft Active Directory, and Cloud Access Security Brokers (i.e., Zscaler). Review and analyze risk-based Security information and event management (SIEM) alerts when developing hunt hypotheses. Review open-source intelligence about threat actors when developing hunt hypotheses. Plan, conduct, and document iterative, hypothesis based … tactics, techniques, and procedures (TTP) hunts utilizing the agile scrum project management methodology. At the conclusion of each hunt, propose, discuss, and document custom searches for automated detection of threat actor activity based on the hunt hypothesis. Configure, deploy, and troubleshoot Endpoint Detection and Response agents (e.g., CrowdStrike and Sysmon). Collect and analyze data from compromised systemsMore ❯
Institute of Science and Technology Austria (ISTA)
s divisions (in particular, Finance, HR, and Grant Office) as well as external providers and will be responsible for further developing digital solutions for the financial and HR management of the Institute. You will support the planning, decision making, implementation of SAP-related projects, and day-to-day operations of our SAP landscape. Your activities include: Lead, mentor … an alliance with other institutions Foster a positive team environment and drive continuous improvement Managing external subcontractors and consultants Profil Bachelor's degree in Cyber Security, Computer Science, InformationSystems, or a related field Several years of professional experience in cyber security Proven experience in conducting vulnerability assessments and penetration testing In-depth understanding of security principles, practices More ❯
Institute of Science and Technology Austria (ISTA)
s divisions (in particular, Finance, HR, and Grant Office) as well as external providers and will be responsible for further developing digital solutions for the financial and HR management of the Institute. You will support the planning, decision making, implementation of SAP-related projects, and day-to-day operations of our SAP landscape. Your activities include: Lead, mentor … an alliance with other institutions Foster a positive team environment and drive continuous improvement Managing external subcontractors and consultants Profil Bachelor's degree in Cyber Security, Computer Science, InformationSystems, or a related field Several years of professional experience in cyber security Proven experience in conducting vulnerability assessments and penetration testing In-depth understanding of security principles, practices More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digimasters Ltd
and curating stewardship roles across the enterprise Champion data literacy initiatives and promote a culture of accountability around data across the organisation Design and implement processes for metadata management, data lineage tracking, and data lifecycle management Provide hands-on configuration and support of Purview (or similar tools), including metadata scanning, asset classification, glossary management … Purview in enterprise environments, including integration with other Microsoft data services Policy & Framework Development: Experience authoring and implementing data policies, stewardship models, and governance operating models Metadata & Lineage Management: Strong knowledge of metadata standards, data cataloguing practices, and lineage documentation Stakeholder Engagement: Demonstrated ability to work across business and technical stakeholders, driving consensus and adoption of governance practices … Regulatory Compliance Understanding: Solid grasp of compliance frameworks such as G.D.P.R., C.C.P.A., and other data protection legislation. QUALIFICATIONS Bachelor’s degree in Data Management, InformationSystems, Computer Science, or related discipline Minimum of 5 years’ experience in data governance roles, with demonstrable success in policy development and tool implementation Strong expertise in Microsoft Purview; experience with More ❯
to validate functionality. Expand test suite against real tracking data to ensure test suite covers relevant and historical use cases. Collaborate with domain experts, users, development teams, and management to develop against prioritized features.We recognize and appreciate the value and contributions of individuals with diverse backgrounds and experiences and welcome all qualified individuals to apply. Job Qualifications: Typically … requires a bachelors degree, masters degree or PhD in computer science, informationsystems or a related discipline and progressive software development experience as follows; four or more years of experience with a bachelors degree or two or more years of experience with a masters degree. May substitute equivalent experience in lieu of education. Ability to transfer and maintain More ❯
listed below Providing senior level SME support to INSCOM staff to review allocations and their alignment to command priorities and operational requirements, to identify and rectify gaps in information, to determine best analytical approaches for projects, and to review and recommend resulting conclusions. Manpower Programming and Budget; maintaining financial, budgetary, and accounting data in Army standard databases such … as Program Optimization and Budget Evaluation (PROBE) and Training Resource Module (TRM) to ensure accuracy and completeness. Civilian Resource Management and assisting MSCs and staff elements to resolve problems and respond to requests for information. Budget Execution and maintaining data in spreadsheets and preparing draft briefings in electronic format. Providing senior level SME support in the research, analysis … allocation; UFRs and Associate level and DTS/GTC task as needed. Education, Requirements and Qualifications Must have an active TS/SCI clearance. Required General Fund Enterprise Business System (GFEBS) experience Completed Fiscal Law, Planning, Programming, Budgeting, Execution (PPBE) or complete Fiscal Law and PPBE courses within 120 days of arrival. Bachelor's Degree in Finance, Business, Accounting More ❯
in class service to our clients. We are a diverse team of project managers, who enjoy solving complex business problems with proven track records of excellence in project management and the ability to quickly structure and manage work in a dynamic, complex environment. The Impact: As an Operations Project Manager, you will: Partner with Project Sponsors and Functional … Develop high-level milestones during Discovery and develop detailed project schedules during Detailed Planning Works with a high degree of autonomy to apply industry leading project and program management knowledge to refine the resource plan, develop a RACI Matrix, conduct a Key-Person Risk Assessment, and Third-Party Support Needs Assessment as needed Ensure early identification, resolution, and … implementation Confirm achievement of objectives, verify and document project results to formalize acceptance of business & readiness deliverables by the sponsor Facilitate lessons learned for business team and retain information in a central location for future use Minimum Qualifications Bachelor's degree or equivalent experience and expertise 8+ years of project management experience 7+ years of proficiency More ❯
in class service to our clients. We are a diverse team of project managers, who enjoy solving complex business problems with proven track records of excellence in project management and the ability to quickly structure and manage work in a dynamic, complex environment. The Impact: As an Operations Project Manager, you will: Partner with Project Sponsors and Functional … Develop high-level milestones during Discovery and develop detailed project schedules during Detailed Planning Works with a high degree of autonomy to apply industry leading project and program management knowledge to refine the resource plan, develop a RACI Matrix, conduct a Key-Person Risk Assessment, and Third-Party Support Needs Assessment as needed Ensure early identification, resolution, and … implementation Confirm achievement of objectives, verify and document project results to formalize acceptance of business & readiness deliverables by the sponsor Facilitate lessons learned for business team and retain information in a central location for future use Minimum Qualifications Bachelor's degree or equivalent experience and expertise 8+ years of project management experience 7+ years of proficiency More ❯
in class service to our clients. We are a diverse team of project managers, who enjoy solving complex business problems with proven track records of excellence in project management and the ability to quickly structure and manage work in a dynamic, complex environment. The Impact: As an Operations Project Manager, you will: Partner with Project Sponsors and Functional … Develop high-level milestones during Discovery and develop detailed project schedules during Detailed Planning Works with a high degree of autonomy to apply industry leading project and program management knowledge to refine the resource plan, develop a RACI Matrix, conduct a Key-Person Risk Assessment, and Third-Party Support Needs Assessment as needed Ensure early identification, resolution, and … implementation Confirm achievement of objectives, verify and document project results to formalize acceptance of business & readiness deliverables by the sponsor Facilitate lessons learned for business team and retain information in a central location for future use Minimum Qualifications Bachelor's degree or equivalent experience and expertise 8+ years of project management experience 7+ years of proficiency More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯
developing procedures that optimize processes and drive positive outcomes in the Compliance Department. Key Responsibilities: Conduct thorough quality control (QC) testing on all AML team functions, working alongside management to ensure high quality of work, consistency between reviews, and adherence to SLAs, policies, and procedures. Review the work performed by the AML and Compliance functions and assess current … processes to identify opportunities for improvement. Be responsible for the quality control procedure and methodology, together with management, including assessing review timelines and sample sizes to ensure efficient and effective testing. Prepare QC and testing ManagementInformation (MI) reports for DMLRO/MLRO to provide insights and recommendations for enhancements. Support management in performing risk-based assessments, issue reporting and management, preparing board reports, and providing compliance oversight and challenges on self-assessment reviews. Conduct self-assessment reviews on internal AML and Compliance functions, collaborating with the first line of business and conducting interviews to gather necessary information. Keep updated on applicable regulatory changes, and make recommendations based More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯
cloud security threats, vulnerabilities, and best practices, and apply this knowledge to continuously enhance our security strategies Basic Qualifications (Required Skills/Experience): 5+ years of experience with Information Security work Experience in cloud security architecture and design, with a focus on major cloud platforms (e.g., AWS, Azure, GCP) Experience designing and implementing security solutions for cloud-based … systems, including IAM, network security, data protection, and compliance Experience in vulnerability management, risk assessment, and/or security analytics Experience in Infrastructure as Code (IaC) and CI/CD environments Preferred Qualifications (Desired Skills/Experience): Certified Cloud Security Professional (CCSP), Certified InformationSystems Security Professional (CISSP), or cloud platform-specific certifications Experience in an More ❯