Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
and potential buyers to corporates, public sector organisations and SMEs globally. Our journey began in 1997 in Oslo, Norway in 1997, with a revolutionary dream to make business information accessible to all. Twenty-five years later, we’ve not only realised this dream, changed the market for the better, made data intelligence accessible to all businesses big and … small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE TEAM Creditsafe’s Information … Development Plans of team members. • Develop and implement security policies, processes, and procedures to comply with SOC2 and ISO27001 standards. • Participate in Steering groups for Identity and Access Management and Data Protection • Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals • Participate in Quarterly More ❯
Washington, Washington DC, United States Hybrid / WFH Options
General Dynamics Information Technology
Information Security Senior Advisor Your Impact Own your opportunity to work alongside federal civilian agencies. Make an impact by providing services that help the government ensure the wellbeing of U.S. citizens. Job Description We are seeking a qualified, motivated individual to join GDIT as an Information Security Senior Advisor. As part of our DevSecOps Team, you … a continuous basis Report on possible threats or software issues Ability to implement cost-effective solutions to cybersecurity problems Scrum/Agile project lifecycle approach to resolving vulnerabilities Information Security Senior Advisor Duties and Responsibilities Coordinate and schedule application releases across multiple environments (dev, test, staging, production) Ensure each deployment in Azure Gov/Secret clouds follow the … approved change management processes and timelines Oversee CI/CD pipeline execution (in Azure DevOps or Jenkins) Verify that build, test and deployment stages are completed successfully and that any pipeline failures are addressed promptly by the appropriate team members Manage release readiness by confirming all pre-release steps are done: (approved change tickets in ServiceNow, security scans More ❯
scalable solutions to optimize customer service operations. Your Profile Proficiency in implementing enterprise SaaS based Social Relationship Platform, to serve as the infrastructure. Experience in enterprise software deployment management and implementation including Sprinklr CCaaS. Proficiency in scripting and coding with HTML, JavaScript, SQL and CSS. Knowledge of web usability best practices, website navigation design and flow, content classification … and content management methods and systems. Ability to configure Sprinklr changes of high quality in line with Business requirements. Knowledge of various Sprinklr modules e.g. Social Media Management, Messaging, Email Management, Voice Channel, Omnichannel Routing, Analytics and Reporting, and Agent Desktop. Proven experience in implementation of architectures integrating Sprinklr with other systems in the … . Experience with Social Engagement across multiple accounts and channels (Facebook, Twitter, LinkedIn, YouTube, Flickr, Foursquare, Slide-share, and Blogs). Previous experience with assignment workflows, and content management including sourcing, curation and multi-channel publishing. Background in Social Audience Management, including influence and engagement scoring. Skilled in Social Analytics providing granular level channel, campaign reporting More ❯
Ephrata, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
Lincoln, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
George, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
Quincy, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
Palisades, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
Auburn, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
Rock Island, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
White Salmon, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
Trout Lake, Washington, United States Hybrid / WFH Options
Centene
Incident Response Plan. Partners with business units to accomplish enterprise-wide remediation and develops and delivers presentations to senior leadership team. Reviews current configurations of Centene's production informationsystems and networks against compliance standards Prepares the prevention and resolution of security breaches and ensure incident and response management processes are initiated Implements and discuss security … identify security shortfalls Designs of automated scripts, contingency plans, and other programmed responses which are launched when an attack against Centene's systems has been detected Collaborates with Information Security Architects, Information Security Engineers, and software or hardware stakeholders at Centene Notifies internal and/or external teams according to agreed alert priority levels, escalation trees … attack monitoring services and threat reporting services, into internal CIRT (Cyber Incident Response Team) communications systems Performs post-mortem analysis with logs, network traffic flows, and other recorded information to identify intrusions by unauthorized parties, as well as unauthorized activities of authorized users Performs other duties as assigned Complies with all policies and standards Education/Experience: A More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Codescratch LLC
APIs, and UI for data management and visualization tools. Optimize database performance, data modeling, and processing for large-scale applications. Enhance existing back-end architecture to improve system responsiveness, security, and scalability. Develop and maintain CI/CD pipelines for automated testing and deployment. Work alongside program managers, UX designers, software engineers, hardware engineers, subject matter experts … All levels available, so all experience levels are welcome to apply). Compensation varies based on years of experience of the applicant. Bachelor's degree in Computer Science, Information Assurance, or related discipline from an accredited college or university is required. One year of relevant experience may be substituted for each year of required education. Relevant certifications may … understanding of cybersecurity best practices, encryption methods, and secure coding techniques Familiar with observability tools, including Prometheus, Grafana, and the ELK stack Ability to effectively communicate intricate technical information to individuals with non-technical backgrounds and to senior leadership Experience with Machine Learning Analytics Experience with Amazon Web Services (AWS) Experience with asynchronous messaging systems (RabbitMQ, Apache Kafka More ❯
Responsibilities : Develop Power platform based applications using MS Dataverse Will develop and support solutions which address a range of business needs including Apps, workflow, forms, collaboration sites, document management, or business intelligence/reporting Will be the technical lead for existing Power Apps and integration of legacy apps into Dataverse Will review existing Power Platform apps and establish … as release by Microsoft in GCC environment Develop training materials and deliver software training as needed Identify and implement opportunities to improve the end-user experience and/or system processes Required Years of Experience (min) : Minimum 3 years' experience working primarily with Power Platform (Power Apps, Power Automate, Dataverse, and Power BI) and SharePoint Required Degree/Certification … Bachelor's degree in Computer Science, InformationSystems, Engineering, or other related scientific, technical discipline or equivalent. Equivalent experience may be substituted for formal degree in some cases. Preferred Certifications: Microsoft Certified: Power Platform Developer Required Experience : Proficiency in at least one modern programming language such as C#, C++, JSON, Python, JavaScript, SQL, etc. Experience as lead architect More ❯
Job Title: Looking for a TS/SCI cleared Project Engineer to assist with the management of running large information technology projects. The Engineer uses critical thinking techniques that are applied to project planning process and across multiple projects where necessary. The Engineer ensures the project has reliable schedule estimates and achieves project goals on time … risk controls implemented in accordance with Project Delivery Standard and in line with the requirements of our client's processes. Additionally, the Engineer will provide our client's management with quality, forward-looking data and reporting. This program requires employees to have an active TS/SCI clearance. If you have a Full Scope Poly, working this program … dependencies, dates, milestones, resources, and costs Understands boundary effectivity for systems and dependencies within and bordering project scope Perform schedule analysis on projects Responsible for scheduling and dependency management within and across assigned portfolios and providing follow-up checks Lead/participate in schedule audits Interface with Product Owners/Leads to gather data and adjust scheduling parameters More ❯
against planned releases o Facilitate release readiness reviews and ensure that all release-related tasks such as code freezes, build creation, packaging, and deployment, are executed effectively Resource Management o Collaborate with the Project Manager to identify resource requirements and allocate resources effectively o Assist with ensuring that project team members have the necessary tools, information, and support to perform their tasks o Monitor resource utilization and coordinate with the Project Manager to implement needed adjustments Risk Management and Issue Resolution o Identify potential risks, dependencies, and barriers that may impact the release process and assist in developing appropriate mitigation strategies o Monitor and report on the status of identified risks and … the Project Manager o Work closely with appropriate teams to resolve issues that arise during the release cycle, ensuring minimal disruption to the release schedule Change and Configuration Management o Collaborate with the Project Manager to Establish and maintain effective change management processes to govern the release cycle o Collaborate with leadership and any identified advisory More ❯
to join our team in Arlington, Virginia (US-VA), United States (US). The candidate for this role will be responsible for IT Governance activities to include portfolio management, investment management, capital planning, change management, program management, organizational development, strategic planning, enterprise architecture, business analysis, and performance management tasks. It … Duties: • Conduct qualitative and quantitative research to support work assignments for meeting the deliverable objective • Conduct qualitative and quantitative analyses for assigned tasks • Compile research, findings, and other information into written formats such as white papers, reports, presentations, and other forms of technical documentation • Perform IT strategic/organizational planning, organizational development, portfolio and program management, IT investment management, IT governance • Provide Weekly and Monthly Status Reporting • Provide meeting support (facilitate meetings, prepare agenda, prepare project briefings, present to the stakeholders, document and distribute meeting minutes, and track actions) • Support other PMO tasks as assigned • Flexibility is a must, as well as the ability to work in a collaborative team environment • Exceptional More ❯
Press Tab to Move to Skip to Content Link This IT Cyber Security Engineer will report to the Cyber Security Engineering Lead and will work within the InformationSystems directorate based in our Crawley office. You will be a permanent employee. You will attract a salary of up to £70,000.00 - depending on skills, qualifications and experience and … its presence in Microsoft Azure and is enhancing its on-prem OT Mission Critical Systems. It is important that a secure environment is developed for the hosting and management of our critical information assets. We ask that you have a blend of skillsets across cyber security including solution design and implementation, operation, governance, change management … cyber security related incidents to ensure prompt action is taken to prevent incident reoccurrence and strengthen relevant cyber security controls. Provide technical guidance and assurance to the wider informationsystems teams concerning the implementation of cyber security controls within the specified design principles. Establish and maintain relationships with important partners on matters of cyber security that maintain business More ❯
North Point Technology is looking for a TS/SCI cleared Project Engineer to assist with the management of running large information technology projects. The Engineer uses critical thinking techniques that are applied to project planning process and across multiple projects where necessary. The Engineer ensures the project has reliable schedule estimates and achieves project goals … risk controls implemented in accordance with Project Delivery Standard and in line with the requirements of our client's processes. Additionally, the Engineer will provide our client's management with quality, forward looking data and reporting. This program requires employees to have an active TS/SCI clearance. If you have a Full Scope Poly, working this program … dependencies, dates, milestones, resources and costs Understands boundary effectivity for systems and dependencies within and bordering project scope Performing schedule analysis on projects Responsible for scheduling and dependency management within and across assigned portfolios and providing follow-up checks Lead/participate in schedule audits Interfaces with Product Owners/Leads to gather data and adjust scheduling parameters More ❯
North Point Technology is looking for a TS/SCI cleared Project Engineer to assist with the management of running large information technology projects. The Engineer uses critical thinking techniques that are applied to project planning process and across multiple projects where necessary. The Engineer ensures the project has reliable schedule estimates and achieves project goals … risk controls implemented in accordance with Project Delivery Standard and in line with the requirements of our client's processes. Additionally, the Engineer will provide our client's management with quality, forward looking data and reporting. This program requires employees to have an active TS/SCI clearance. If you have a Full Scope Poly, working this program … dependencies, dates, milestones, resources and costs Understands boundary effectivity for systems and dependencies within and bordering project scope Performing schedule analysis on projects Responsible for scheduling and dependency management within and across assigned portfolios and providing follow-up checks Lead/participate in schedule audits Interfaces with Product Owners/Leads to gather data and adjust scheduling parameters More ❯
enforce robust data governance practices, ensuring compliance with regulatory requirements and company policies. Partner with IT security teams to implement secure-by-design data architectures that protect sensitive information and mitigate risks. Team Management: Lead and mentor a team of data architects, platform engineers, and data governance professionals. Foster a culture of innovation, collaboration, and continuous … for data democratization by enabling access to clean, high-quality data for decision-making. What are we looking for? Bachelor's or Master's degree in Computer Science, InformationSystems, Data Engineering, or a related field. 10+ years of experience in data engineering, architecture, or platform management roles, with 5+ years in leadership positions. Expertise in … enterprise-level architecture design and implementation. Hands-on knowledge of database systems (SQL/NoSQL), ETL/ELT processes, and data modeling techniques. Exceptional leadership, communication, and stakeholder management skills. Ability to work in fast-paced, agile environments and balance long-term strategy with short-term execution. Preferred Qualifications: Certifications in cloud platforms (AWS Certified Data Analytics, Azure More ❯
Washington, Washington DC, United States Hybrid / WFH Options
MAGNUS Management Group
Company Description MAGNUS Management Group LLC is a Woman Owned Small Business consulting firm located in Washington DC. We are ISO 9001, ISO 27001, ISO 20000, ISO 56002 & CMMI L3 SVC + SSD certified, and we provide expert consulting services in areas such as Information Technology, Management Consulting, Cyber Security and Data Science. We … the cloud development lifecycle, with flexibility for some remote work. Qualifications Experience in software development and cloud computing Strong knowledge of infrastructure and Linux systems Experience in database management Experience in cloud technology such as AWS, Google Cloud Platform, etc. Understanding of containerization technologies such as Docker and Kubernetes Bachelor's degree in Computer Science or related field … Strong communication and problem-solving skills Experience with DevOps methodology Certifications in AWS, Azure, and/or Google Cloud Platform are a plus MAGNUS Management Group offers a competitive, comprehensive benefits package, which includes: 3 Weeks Paid Time Off 10 Federal Holidays Medical, Dental, and Vision insurance 401K Retirement Plan Long Term Disability Tuition Reimbursement and Professional Development More ❯
Solutions Through Innovative Technologies, Inc. (STI-TEC) specializes in the delivery of professional business and informationmanagement services. STI-TEC offers government and commercial clients a comprehensive portfolio of services that identify, manage, distribute and improve business processes related to entities' most valued resource, information. As a fast-growing solutions provider, established in 2000, total customer … collaborative user community across the military, government, industry, academia, and international partners. To enhance AFSIM's growth, the Department of the Air Force (DAF) is establishing a Model Management Office (MMO). In this cutting-edge new MMO the Business Analyst shall advise or assist the MMO to manage budgets, monitor costs, and provide financial or business analysis … costs throughout the program or project lifecycle, ensuring that projected costs align with budgets and identifying any potential financial risks that may impact schedule and performance Use project management, financial tracking, or forecasting systems mandated by organizational regulation, policy, or convention In coordination with the MMO, the contractor shall monitor the execution of obligation plans and/or More ❯
network spanning approximately 30 countries and regions. By connecting markets East & West, Nomura services the needs of individuals, institutions, corporates and governments through its three business divisions: Wealth Management, Investment Management, and Wholesale (Global Markets and Investment Banking). Founded in 1925, the firm is built on a tradition of disciplined entrepreneurship, serving clients with creative … solutions and considered thought leadership. For further information about Nomura, visit Department Overview We are a Rates focused eTrading Strats team, operating globally in London, New York and Tokyo. We are responsible for the development and operation of automated trading strategies, eBooks and pricing models across client and interdealer electronic venues. Role Overview Supporting data initiatives across Global … Qualities - Strong team player with ability to work in a fast-paced environment - Eager to learn and adapt to new technologies - Proactive approach to problem-solving - Good time management and organizational skills - Ability to communicate complex information clearly Development Opportunities - Exposure to cutting-edge financial technology - Mentorship from experienced professionals - Training in advanced analytics and financial More ❯
workflows Create interactive dashboards depicting a wide array of statistical data Experience creating SharePoint web pages Preferred Education, Experience, & Skills Bachelors degree in a related field (Computer Science, InformationManagement etc) Demonstrated desire for continuous improvement and learning Strong attention to detail and analytical skills Ability to multitask in a fast-paced environment and prioritize the … data visualization tools (Power BI, Tableau, Qlik) Microsoft Certification in one or more of the following products: (must provide current certification evidence): Microsoft 365 Microsoft Power Platform Pay Information Full-Time Salary Range: $77809 - $132275 Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but … an international defense, aerospace and security company which delivers a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. Improving the future and protecting lives is an ambitious mission, but it's what we do at BAE Systems. Working here means using More ❯