London, England, United Kingdom Hybrid / WFH Options
Blockchainclimate
of climate and sustainability, and contribute to the advancement of knowledge and innovation in this domain. You will also gain valuable experience and skills in emerging technologies, project management, and leadership. Responsibilities Define and execute the DLT/Blockchain technology strategy and roadmap for BCI’s projects and initiatives; Build, lead and manage the DLT/Blockchain technology … also about all other aspects that could be necessary to deliver impactful climate actions. Education & Training Bachelor’s or master’s degree (or equivalent) in Computer Science, Engineering, Information Technology, or related field; Fluent in English; and Aptitude in Arabic, Chinese, French, Russian, or Spanish (desirable). Relevant Experience At least 5 years of professional experience in DLT … sections will be invited to attend a phone screening, first interview, and final interview online. Seniority level Seniority level Mid-Senior level Employment type Job function Job function Information Technology Industries Non-profit Organizations Referrals increase your chances of interviewing at Blockchain & Climate Institute by 2x Sign in to set job alerts for “Technology Officer” roles. Kingston Upon More ❯
test data needed for consistent, repeatable test execution. Test Strategy and Planning: Collaborate with cross-functional teams to define the automation testing strategy, including test coverage, test data management, and execution plans. Automation Opportunities: Identify and support opportunities to introduce or expand automation within QA processes. Execution and Reporting: Execute automated test cases, analyse results, and report defects … support knowledge sharing and continuity. Mentorship: Provide guidance, support, and knowledge sharing to QA team members, fostering adoption of automation practices and tools. Requirements Degree in Computer Science, Information Technology, or a related field, or equivalent professional experience. Proven experience as an Automation Tester or in a similar role, with a strong track record working on iOS, web More ❯
responsible for developing and deploying scalable and secure applications, implementing CI/CD pipelines, and managing containerization and orchestration. Preferred Education None Required Technical And Professional Expertise Infrastructure Management: Proficiently use AWS and RHEL to design, build, and manage cloud infrastructure. Expertise in Terraform and Ansible for infrastructure automation is required. Application Development and Deployment: Utilize NodeJS, ReactJS … Ability to work effectively in a remote team environment. Seniority level Seniority level Mid-Senior level Employment type Employment type Full-time Job function Job function Engineering and Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at IBM by 2x Get notified about new DevOps Engineer jobs in Cheltenham, England, United Kingdom More ❯
advanced production practices in the investment bank industry. The successful candidate will have to ensure an optimal Prime Services & Clearing production quality by providing a stable informationsystem, thanks to a technical and functional support across Listed Derivatives perimeter. To remain on the cutting edge of technical and technological informationsystem and due to … Agile principles and best production practices. University degree in computer science with a background in financial markets industry or similar. Ability to diagnose and troubleshoot complex informationsystem problems and leverage tools and resources appropriately to identify solutions that may or may not be already documented. Strong experience with code reading and script languages to automate platform More ❯
experience and operational outcomes. Collaborate with stakeholders to ensure that development aligns with business objectives and user needs. Qualifications Bachelor's degree or higher in Computer Science, Engineering, InformationSystems, or a related field. Minimum of 5 years of software development experience. Experience in Python, .NET (C#), Angular, and Snowflake. Proven track record in architecting scalable, robust software More ❯
Agile is seeking an InformationSystems Security Officer -, responsibilities include the following: Active TS/SCI clearance is required: Certification Requirements: CISM and one of the Following: (CGRC), Certified in Risk and InformationSystems Control (CRISC), InformationSystems Security Management Professional (ISSMP), Certified InformationSystems Auditor (CISA), Certified Cloud Security … inherent resources for effective and efficient mission accomplishment and continuity, introduction of innovation, and enhancement of technical competence. Serve as the principal advisor to the Authorizing Official (AO) and System/Service Owner (SO) on all matters involving informationsystem security. Develop, implement, assess, and maintain system-level informationsystem security controls … in accordance with Department of Justice, NIST 800-53, and other federal regulations. Support data calls, audits, system security assessments & authorizations, continuous monitoring, and ongoing authorizations. Work with the System Owner to categorize the informationsystem, identify the appropriate control baseline, and assess correlating security controls. Create, capture, and maintain artifacts and documented processes to More ❯
Marathon TS is looking for an InformationSystem Security Officer to support our efforts at DISA. Key Responsibilities: • Verify data security access controls based on the Joint Special Access Program Implementation Guide (JSIG). • Implement media control procedures and continuously monitor for compliance. • Verify data security access controls and assign privileges based on need-to-know. • Investigate … assurance and security requirements based on user, policy, regulatory, and resource demands. • Perform vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle. Required Skills: • Per contract requirements candidates must possess an active TS/SCI clearance with the ability to obtain CI Poly. • A Bachelor's degree in … organization and self-management skills with emphasis on self-initiation and follow through. • Proven written and oral communication skills. • Experience in reviewing proposed change requests related to system design/configuration and performing security impact analysis. • The ability to work independently. • Strong familiarity with the Risk Management Framework (RMF), Federal Information Security ManagementMore ❯
and maintain authorization to operate (ATO). Key Responsibilities: • Implement and maintain security controls in compliance with DoD RMF, NIST SP 800-53, and DoDI 8510.01. • Maintain and update System Security Plans (SSPs), Plans of Action and Milestones (POA&Ms), and related security documentation. • Support system Assessment and Authorization (A&A) activities to obtain and maintain Authority to … by government agencies (e.g., DCSA, DISA). • Ensure proper handling, marking, and safeguarding of Controlled Unclassified Information (CUI) and classified information. • Support Continuous Monitoring (ConMon) activities and system patching initiatives. Required Qualifications: • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related discipline. • 3+ years of experience in DoD cybersecurity, including RMF and NIST … Preferred Qualifications: • Top Secret or TS/SCI clearance. • Experience with cloud-based systems (e.g., AWS GovCloud, Azure Government) and FedRAMP requirements. • Familiarity with JSIG, CNSSI 1253, and classified system requirements. • Knowledge of network architectures and system hardening techniques. • Experience with Xacta, Splunk, ACAS, Nessus, and Host-Based Security System (HBSS/ESS). Key Competencies: • Detail More ❯
assessments to verify compliance with required configuration guidance and support A&A testing and validation of security designs. • Conducting risk analysis reviewing ACAS, CVEs, plugins, CWEs, research, collaborate with System Administrators to mitigate identified vulnerabilities and/or author Plans of Actions and Milestones (PO&AM) as needed. • Execution of continuous monitoring efforts responds to data calls, scan requests … technical input. • Support government activities and reporting to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC) • Support security authorization activities in compliance with the customer InformationSystem Certification and Accreditation Process following the NIST Risk Management Framework (RMF), CNSSI No 1243 and other prescribed business processes for security engineering. • Assist architects and systems developers … in the identification and implementation of appropriate information security functionality to ensure uniform application of Agency security policy and enterprise solutions. • Apply system security engineering expertise in one or more of the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the More ❯
Summary The Senior InformationSystem Security Officer (Sr. ISSO) will assist in preparation, development, and maintenance of specialized InformationSystems (IS) security plans used to obtain/retain DCSA accreditation. Essential Duties and Responsibilities may include the following. Other duties may be assigned. Review and revise IS system plans documentation based on analysis of … changes or special security requirements. Provide day-to-day technical support to classified IS including adherence to policies, procedures, and best practices. You will be required to oversee the system compliance, and auditing of the information systems. Oversees the informationsystems readying system configurations for ISSM certification and/or DCSA accreditation/assessment. … and virtualization hosts and any virtualized systems and appliances. Assists in spill containment and cleanup. Participates in investigations relating to any IS security violations and provides "lessons learned" information to the IS community to prevent reoccurrence. Assists the InformationSystems Security Manager (ISSM) and implements informationsystems security tasks, as required for safeguarding, handling More ❯
6UN reporting processes is also required. For a Response, key deliverables are required: InformationManagement and Reporting process flow chart (Standard Process) Document storage (centralized system in place) Impact reporting (contextual, on beneficiaries, and other project-specific factors) Funding updates (including internal and external funding sources) Response InformationManagementSystem … structure for collaboration and smooth flow of information Key Responsibilities INFORMATIONMANAGEMENT Maintain an organized and chronological informationmanagementsystem, which is easy to access at any time according to the global retention policy Design and implement the Office InformationManagement structure for internal and … protection of beneficiary information in line with WV or donor data protection policies & procedures Provide input to ensure that IM systems, assets, capacity building such as training, system licenses, and subscriptions are well planned and budgeted for Implement training on forms and systems for field-staff to ensure adherence to WVI’s standards in Aid Delivery ManagementMore ❯
for the Secretary of the Air Force - Security, Special Program Oversight, and Information Protection Directorate (SAF/AAZ), to include support to the AAZ InformationSystem Security Manager (ISSM). Per sections 1.3.4.1 and 1.3.9.1, specific responsibilities and tasks include but are not limited to: Specific responsibilities include but are not limited to: •Assist with … of cybersecurity related processes and activities for AAZ InformationSystems and related interfaces. The processes include: bare not limited to, Risk Management Framework (RMF) and system authorization, Cyber Incident Handling, System Life Cycle Management Processes (e.g. Engineering Change and Configuration Management), Vulnerability Management, Malware Protection, Security Assessments/… AAZ IT and Security staff to determine IT requirements for office space/daily operational needs. •Assist with production of documentation to support cybersecurity assessments, security impact analysis and system authorization of AAZ informationSystems per ISSM guidance. •Assist with maintaining an Information Assurance Program and ensure compliance with DODO 8510.01 - Risk ManagementMore ❯
Laurel, Maryland, United States Hybrid / WFH Options
TEKsystems c/o Allegis Group
Global Solutions Management - Operations II (GSM-O II) contract at DISA. This contract includes the Operations, Sustainment, Maintenance, Repair, and Defense of the Defense InformationSystem Network (DISN) within the DOD Information Network (DODIN) in support of the Defense InformationSystems Agency (DISA). It also includes support to other key … clearance and Security + are required upon start. Primary Responsibilities: • Excellent written and verbal communication skills a must. • Interact with members of the technical team to understand the current system, subsystems, and component specifications. • Responsible for understanding entire projects or processes spanning multiple technical areas. • Support risk assessment, risk management, security control assessment, continuous monitoring, service design … program support functions. • Support and assist in documentation production using various software tools and applying consistent formatting and style throughout documentation. • Participate in the development, facilitation, and coordination of system documentation such as: System Engineering Plans; Initial Capabilities Documents; Requirements Specifications; and Interface Control Documentation; Assessment and authorization documentation (Body of Evidence) for management and continuous More ❯
Information Assurance, Nessus, RMF, Windows, Linux, WireShark, System Security Plans, Authorization to Operate, Verification and Validation, NIST, PKI, Scripting Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active … last five (05) years). At least fourteen (14) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a … bachelor's degree. Certified InformationSystem Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. More ❯
Marathon TS is looking for an InformationSystems Security Manager to support our efforts at DISA. Key Responsibilities: Information Security Program Development: Develop, implement, and maintain a comprehensive information security program that includes policies, procedures, and guidelines to protect the organization's information assets. Regularly review and update the information security program to ensure it remains effective and aligned with industry best practices and regulatory requirements. Regulatory Compliance: Ensure that the organization's informationsystems comply with all applicable security regulations and standards, including NIST, FISMA, and the Joint Special Access Program Implementation Guide (JSIG). Conduct regular audits and assessments to verify compliance and address … security controls, such as access controls, data encryption, and vulnerability management. Collaborate with IT and other departments to integrate security controls into existing and new systems. Incident Response Management: Manage the organization's security incident response process, including the investigation of security incidents and coordination with internal and external stakeholders to resolve incidents. Develop and maintain an incident More ❯
About the role Please note we're open to considering both Interim and Permanent applications for this opportunity. As the Director ofManagement Information & Business Insights you'll drive the evolution of our data strategy, enabling data-driven decisions that fuel innovation and operational excellence. Based from our Bristol office working on a hybrid basis (3 days in the … strategy, shape the data culture, and make a tangible impact in a dynamic, fast-paced environment. Key areas of responsibility will include: Strategic leadership Defining and executing a managementinformation and analytics strategy that supports Zellis' business goals. Mentoring and developing a high-performing team of analysts and data specialists, fostering a collaborative and innovative work … KPIs) relevant to the software sector, enabling effective tracking of organisational success. Ensuring key metrics are clearly defined. Leveraging predictive analytics to anticipate trends and guide future initiatives. Managementinformationsystems Overseeing the data storage/warehouse strategy and data flows between systems, to ensure robust high quality data is available in real-time. Streamlining reporting More ❯
About the role Please note we're open to considering both Interim and Permanent applications for this opportunity. As the Director ofManagement Information & Business Insights you'll drive the evolution of our data strategy, enabling data-driven decisions that fuel innovation and operational excellence. Based from our Bristol office working on a hybrid basis (3 days in the … strategy, shape the data culture, and make a tangible impact in a dynamic, fast-paced environment. Key areas of responsibility will include: Strategic leadership Defining and executing a managementinformation and analytics strategy that supports Zellis' business goals. Mentoring and developing a high-performing team of analysts and data specialists, fostering a collaborative and innovative work … KPIs) relevant to the software sector, enabling effective tracking of organisational success. Ensuring key metrics are clearly defined. Leveraging predictive analytics to anticipate trends and guide future initiatives. Managementinformationsystems Overseeing the data storage/warehouse strategy and data flows between systems, to ensure robust high quality data is available in real-time. Streamlining reporting More ❯
design, implementation, maintenance, and security of the organization's Linux and Windows server infrastructure. The ideal candidate should possess strong expertise in Linux and Windows operating systems. Key Responsibilities: System Administration: Install, configure, and maintain Linux and Windows servers. Perform routine system monitoring, analysis, and troubleshooting to ensure optimal system performance. Collaborate with cross-functional teams to … design and implement system upgrades, patches, and new applications. Security Management: Implement and maintain security measures to safeguard systems against unauthorized access, vulnerabilities, and data breaches. Conduct regular security audits, vulnerability assessments, and implement corrective actions. Stay updated on the latest security trends, vulnerabilities, and best practices. Scripting and Automation: Develop and maintain scripts using Bash, Python … or PowerShell to automate routine tasks, streamline processes, and improve system efficiency. Create and update documentation for scripts, configurations, and procedures. User Support: Provide technical support to end-users for Linux and Windows-related issues. Collaborate with the helpdesk team to resolve escalated support tickets in a timely manner. Monitoring and Performance Tuning: Implement and maintain monitoring solutions to More ❯
Amherst, Massachusetts, United States Hybrid / WFH Options
University of Massachusetts Amherst
university security policies and industry regulations. Participates in security assessments and vulnerability remediation. Documents and maintains security procedures for automated processes. Operations Support Manages virtual infrastructure to ensure reliable system availability. Provides Tier 2 (L2) support for critical incidents and escalated issues. Assists Endpoint Operations Manager using endpoint managementsystems (Quest K1000/K2000, Microsoft Intune, Microsoft … Defender). Develops automation tools for routine IT services and tasks. Maintains regular communication with stakeholders on system status. Minimum Qualifications (Knowledge, Skills, Abilities, Education, Experience, Certifications, Licensure) Master's Degree in a related field plus two (2) years of relevant experience, or equivalent combination of education and experience: Bachelor's degree in a related field plus four … as PowerShell, Azure CLI, AWS CLI, and Google Cloud SDK. Experience working in a higher education or nonprofit setting; previous work with Financial Aid systems and Department of Education system interfaces a plus. Working knowledge of endpoint management tools. Physical Demands/Working Conditions Some evening and weekend work required for system maintenance. Work Schedule Monday More ❯
Sr Information Technology/Operational Technology Analyst OASYS, INC., a Leading-Edge Government contractor, is seeking applicants for a Sr Information Technology/Operational Technology Analyst position who will serve as a critical asset in supporting the Army customer, directly interfacing with government customer, stakeholders, and cross-functional teams. The ideal candidate brings robust expertise in … coordinate the planning and implementation of the Army's transition to IPv6, support the Windows 11 migration, and optimize Zero Trust principles. Risk Management & Compliance: Consult with system owners to review risk assessments for IT and OT systems, for mitigation strategies in compliance with RMF and NIST standards. Support/excute the full RMF lifecycle to ensure … all artifacts (e.g., SSPs, POA&Ms, C&A packages) are up-to-date and aligned with the Army's and organizations RMF process. Incident Response & Mitigation: Support and advise system owners in responding to security incidents across IT and OT environments. Assessment Analysis & Presentation: Analyze assessments and findings from Cyber Protection Teams (CPTs), Black Start Exercises, and other relevant More ❯
you'll collaborate with cross-functional teams to ensure systems operate effectively and efficiently, contributing to impactful business outcomes. This role will also be responsible for ensuring that the system controls and processes within D365 meet internal controls and SOX compliance requirements. What You'll Do: Analyse business needs and assist in the design and implementation of ERP solutions … using Microsoft Dynamics 365, Navision and related platforms. Collaborate with business users and global Technology team to identify, document, test, and implement ERP system enhancements. Provide hands-on support for ERP-related incidents and deliver timely resolutions. Act as a liaison between technical teams and business stakeholders to align system functionality with organizational goals. Maintain and support legacy … with the global Technology team, Finance team, and external auditing teams to remediate SOX deficiencies. Maintain accurate documentation of change management related to D365 and approvals for system modifications. Monitor user access, segregation of duties (SoD), and configuration changes to ensure compliance. Stay updated on SOX compliance trends and best practices specific to ERP systems. What You More ❯
London, England, United Kingdom Hybrid / WFH Options
Systems & Software, Inc
customer meetings for TechOps responsibilities of upgrades and migrations, both on-prem and cloud Applying out of the box thinking to address customer technical needs Cloud and on-premises system provisioning, network setup and maintenance Working with development team to resolve application related issues Monitoring internal and customer system health Tier 2/3 technical support for internal … and external customers (after hours support rotation required) Diagnosing and resolving operating system issues (performance problems, configuration issues, etc.) Administration of Linux and Windows servers Administration of Site-to-Site VPN tunnels, on-premise networking and cloud networking configuration Deploying changes to customer environments using Ansible Implementing continuous improvement through automation using Ansible/Jira/GitLab/Terraform …/401k matching programs Lifestyle rewards Remote work and more! About us: Since 1973, our unrelenting mission at Systems & Software has been to give quality customer informationsystem (CIS) solutions to municipal and investor-owned utilities. We understand the importance of a committed, engaged group of teammates to achieve this mission. Systems & Software is part of Harris More ❯
to federal regulations. Additionally, in this position you will: Strengthen Our Defense: Perform Security Technical Implementation (STIG) review, Self-Assessment, and participate in Assessment & Authorizations testing to ensure our system stay secure and compliant. Shape Security Policy: use your expertise to apply a comprehensive range of cybersecurity policies, principles, and techniques to maintain the integrity of system processing … identifying, reporting, and helping to resolve security incidents. Contribute to the development and delivery of security awareness training for staff. Drive Risk Management: Perform risk analysis for system changes, contribute to the Risk Management Framework process and recommend security solutions to address any identify gaps. Maintain Security Documentation: Ensure all system documentation is up … tracking remediation efforts, validating closure evidence, prioritizing and communicating risk, and ensuring timely. Oversee Configuration Management: Manage changes to security-relevant software, hardware, and firmware to maintain system security. Basic Qualifications: As a requirement of this position, all candidates must be a U.S. Citizen. In accordance with 8 U.S.C. 1324b(a)(2)(C) , Epsilon will not consider More ❯
to federal regulations. Additionally, in this position you will: Strengthen Our Defense: Perform Security Technical Implementation (STIG) review, Self-Assessment, and participate in Assessment & Authorizations testing to ensure our system stay secure and compliant. Shape Security Policy: use your expertise to apply a comprehensive range of cybersecurity policies, principles, and techniques to maintain the integrity of system processing … identifying, reporting, and helping to resolve security incidents. Contribute to the development and delivery of security awareness training for staff. Drive Risk Management: Perform risk analysis for system changes, contribute to the Risk Management Framework process and recommend security solutions to address any identify gaps. Maintain Security Documentation: Ensure all system documentation is up … tracking remediation efforts, validating closure evidence, prioritizing and communicating risk, and ensuring timely. Oversee Configuration Management: Manage changes to security-relevant software, hardware, and firmware to maintain system security. Basic Qualifications: As a requirement of this position, all candidates must be a U.S. Citizen. In accordance with 8 U.S.C. 1324b(a)(2)(C) , Epsilon will not consider More ❯
Job summary The role provides specialist support for the Trust's Financial Systems, with a focus on eFinancials (EFIN) and reporting tools. The postholder is responsible for maintaining system integrity, managing user access, and supporting end-users across the Trust to ensure smooth financial processes. Key duties include maintaining accurate master data, performing system cleansing, monitoring purchase order … transmissions, identifying opportunities for process automation, and providing frontline system support. The role is essential for maintaining system reliability, data quality, and ensuring compliance with the Trust's Standing Financial Instructions and Scheme of Delegation. The postholder will work closely with Procurement, Accounts Payable, Distribution teams, and suppliers, resolving operational issues and promoting best practice system use. … Additional responsibilities include system testing, reporting, managing data extracts, and maintaining system interfaces. The role requires discretion when handling sensitive information and the ability to manage multiple live systems in a fast-paced environment. Main duties of the job To support the administration and operation of core Finance and Procurement computer-based systems (Financial Systems).To More ❯