Job Title: Sr. Cybersecurity Supply Chain Risk Management Analyst Location: Washington, DC Duration: Full Time/Direct Hire Pay Rate: $95,000 - $120,000 Summary The Supply Chain Risk Manager supports OCIO's focus on the information, communications, and operational technology (ICT/OT) users who rely on a complex, globally distributed, and interconnected supply chain … used to gather and analyze moderate to complex procurement documentation and justifications for high-risk ICT/OT products and services. The position requires tiered supply chain risk management determinations that result in procurement or redirection of assets. Responsibilities - Provides analytical support to manage the increasing risk of supply chain compromise related to cybersecurity, whether intentional or unintentional. … procurements. - Recognizes and identifies potential areas where existing security policies and procedures require change, or where new ones need to be developed,especially regarding future business expansion Provides information security matter expertise to technology teams and projects. - Creates security architecture standards for adoption of new technology - Identifies, quantifies, and recommends mitigation actions for security risks as they relate More ❯
london, south east england, united kingdom Hybrid / WFH Options
Janus Henderson Investors
Diversity Improves Results | Truth Builds Trust If our mission, values, and purpose align with your own, we would love to hear from you Your opportunity Policy Development And Management Develop and maintain comprehensive cybersecurity policies and procedures. Ensure these policies align with industry standards and regulatory requirements. Assist in the integration of security practices and control across various … technical and non-technical departments, enhancing workflow and operational processes. Risk Management Conduct regular risk assessments to help identify vulnerabilities and threats. Collaborate and oversee the implementation of risk mitigation strategies. Monitor emerging threats and evolving technologies to continuously refine risk assessment protocols. Ability to design and evaluate control metrics for assessing the effectiveness of cybersecurity measures. Collaborate … with Enterprise risk management to embed cyber risk into broader risk registers and board-level reporting. Compliance Management Monitor and ensure compliance with internal policies, industry standards, and regulatory requirement. Engage with required stakeholders in Technology, Legal, Compliance and Internal Audit as required Compile and deliver detailed compliance reports to senior management Monitor upcoming More ❯
Job summary This role forms part of the wider Information Governance Team's (IG Team) support and is delivered both internally and externally. The post-holder will be responsible for providing senior and strategic information governance subject matter expertise and insight to programmes and projects to achieve beneficial changes in line with the strategic goals of … trust. The role will deputise for the Head of Information Governance as required. This role will provide thought leadership on information governance requirements in the context of Integrated Care Systems (ICS) and the trust and to include projects concerned with interoperability, large scale analytics, and public facing digital solutions. The Senior Information Governance Manager … will have involvement from a range of organisations, services, stakeholders at a regional and national level. Main duties of the job The main duties for this role include: Management of the Corporate Information Governance team Providing expert advice in all matters relating to Information Governance Advising and leading of complex Data Protection Impact Assessments More ❯
positions. This position requires in office work and travel to locations within the continental United States. Astrion has worked extensively with the Department of Defense executing a Technical Management and Advisory Service contract where it has earned a reputation for on-time delivery of high-quality products tailored to the needs of its clients. REQUIRED QUALIFICATIONS/SKILLS … the government clearance approval process. U.S. Citizenship required. • Relevant technical and/or operational experience with satellite-based communications networks or other satellite-centric operations. • Ability to organize information from multiple sources and distill that into a consolidated/congruent message. • Ability to develop and run test procedures, execute test scripts, and collect data for post-test analysis … and reporting. • Experience developing and authoring documents such as briefings, plans, reports, executive summaries, white papers, staff actions, data management and analysis plans. • Ability to work in a team environment as well as individually without continuous direction (proactive). • Ability to communicate and present technical details both written and verbally. • Ability and willingness to brief senior leadership on More ❯
of Engineering at BAE Systems See what you're missing. Our employees work on the world's most advanced software and electronics - from developing world-class autonomous mission management capabilities to advanced data analytics to support the warfighters and the intelligence community. Spanning air, land, sea, and space, we are developing the technology of tomorrow, delivered today. Drawing … Education, Experience, & Skills Experience with developing and managing requirements Experience with modeling cybersecurity systems that utilize the zero trust framework Experience in Agile software development methodologies and task management tools (e.g. Jira) Experienced in Modeling, Simulation, Visualization and Analysis (MSVA) Machine Learning and Artificial Intelligence (ML/AI) Familiar with Government Reference Architectures (GRAs) and Autonomy solutions Experienced … working in all phases of the engineering product development lifecycle Classroom and on-the-job teaching experience Training material development EW Experience Pay Information Full-Time Salary Range: $130355 - $221603 Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but not limited to: business considerations More ❯
Engineer on a contract providing Network and Cybersecurity services supporting an Intelligence Community customer. All the personnel on the team will work together to support transport and cybersecurity information technology (IT) services on multiple networks and security domains, at multiple locations worldwide, inclusive of new facilities and building constructions to support the IC mission. The right candidate will … solve client problems creatively and quickly. Qualifications Clearance Required: TS/SCI with ability to obtain a CI Poly. Degree and Years of Experience: Bachelor's degree in information technology, business or a related discipline or equivalent experience. A minimum of seven (7) years of experience as a SharePoint Developer and/or SharePoint Designer. 3 years of … developing use cases, presenting design proposal, and managing team assignments, sequencing and scheduling activities to completion. A minimum of five (5) years' experience developing project plans using project management methodologies and tools. Desired Certifications: Microsoft SharePoint MSCA Teamwork Administrator Associate or MCSE Enterprise Administrator Expert a plus. Required Skills: Analyze business processes and data and develop strategies to More ❯
This person shall be located within 50 miles of Bethesda, MD. Required Education, Experience, & Skills Required Skills: Minimum/General Experience: Minimum of six (6) years of document management and configuration control in support of IT and communications to include governance and policy and process development and implementation with a Bachelor's degree. DoDM 8140.03 (former DoD 8570.01 … M) Intermediate (Basic, Intermediate, Advanced) qualification (e.g. Security+ CA) within 6 months of starting position Secret Clearance (Active) Preferred Education, Experience, & Skills Desired Skills: Bachelor's degree in information technology, Cybersecurity, Data Science, InformationSystems, or Computer Science. ITIL v4 AWS certified developer or equivalent SCRUM cert or Agile Pay Information Full-Time Salary … an international defense, aerospace and security company which delivers a full range of products and services for air, land and naval forces, as well as advanced electronics, security, information technology solutions and customer support services. Improving the future and protecting lives is an ambitious mission, but it's what we do at BAE Systems. Working here means using More ❯
Network Problem Management Quality Assurance Lead Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity : We are seeking an experienced ITIL Network Problem Management Quality Assurance Lead to ensure … the effectiveness and efficiency of our network problem management processes. The successful candidate will be responsible for implementing quality assurance measures, conducting audits, and driving continuous improvement in alignment with ITIL best … practices. Responsibilities: Lead the development and implementation of ITIL-based problem management strategies and processes for network operations Oversee regular audits of the problem managementsystem to ensure compliance to customer policies, directives and governance and identify areas for improvement Develop and implement quality assurance processes for network problem management Analyze problem managementMore ❯
We are a new and growing organization looking to implement processes that will grow with us and our customers' evolving demands. We are seeking a Supply Chain Risk Management Specialist. This role is a data-driven subject matter expert that provides matrixed support to operational organizations within the MIB. You will provide day-to-day analytic support to … insights, align on standards, and improve processes. Maintain awareness of DoD supply-chain and acquisition priorities to ensure analytic work supports mission outcomes. Provide program, analytical, and acquisition management support to senior level MIB executives as required. Work with the MIB team, which is spread across the United States focused on workforce development/marketing, supply chain/… sustainment, and technology developments. Assist in drafting information papers in response to Congressional inquiries. Provide input to Report to Congress regarding MIB spend goals and associated return on investment. Travel as required to carry out the duties above. Qualifications To be successful in this roll, you will have: Ability to obtain a SECRET DoD clearance. Must be a More ❯
Description: Knowledge Management & Data Analyst (0043) OCT Consulting is a business management and technology consulting firm that provides support to Federal Government clients. We provide consulting services in the areas of Strategy, Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology. Responsibilities and Duties OCT … currently has an opening for a Knowledge Management (KM) & Data Analyst to work with a technology division within the office of a federal client. This role will require strong interpersonal skills and attention to detail. The contractor shall support various administrative functions for the Section Chief and Assistant Section Chief, as described below. Day to day responsibilities include … interactive dashboards and reports using Power BI. • Streamlining business processes through automation and developing user-friendly applications to support various departments using MS Power Platform tools. • Offer timely information dissemination to personnel (government and contractor); be prepared to provide expert advice and recommendations regarding website development. • Work towards and promote a strategy of centralization, standardization, and "best practice More ❯
Network Incident Management Quality Assurance Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity : We are seeking a detail-oriented ITIL Network Incident Management Quality Assurance Analyst … to support the continuous improvement of our IT network incident management processes. The ideal candidate will work closely with the QA Lead to ensure network incident management practices align with ITIL standards and contribute to the overall quality of IT service delivery. Responsibilities: Assist in developing and maintaining quality assurance standards and procedures for IT network … incident management, aligned with ITIL framework. Conduct regular audits of incident records, documentation, and resolutions to ensure compliance with ITIL standards and internal procedures. Analyze incident data, metrics, and trends to identify areas for improvement in the incident management process. Support the training of IT staff on ITIL network incident management practices and quality More ❯
Are interested in this opportunity. Please forward a copy of your most update resume in word format to The candidate will be responsible for evaluating key points in the System Lifecycle, such as before its deployment or during major updates. Responsibilities may include creating security documentation (e.g., System Security Plan, Security Assessment Report) and obtaining the final authorization … controls, access controls, provisioning and deprovisioning, transfers, separation of duties, configuration management, contingency planning, application security, business process controls, interface controls, and data managementsystem controls. The candidate will be responsible for: • Conducting formal assessments and deciding whether the system is authorized to operate • Conducting a formal assessment of the system's … security posture • Evaluating whether security controls meet established standards and are functioning effectively • Documenting results and making recommendations for improving security • Recommending whether the system should be authorized to operate based on assessment outcomes • Ensuring that the system has the necessary security controls to minimize risks Basic Qualifications CANDIDATE MUST BE LOCAL TO ASHBURN, VA - SCHEDULE TBD - EXACT More ❯
position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management … with developing ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve fidelity … supervision Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation Experience as an ISSO, InformationSystem Security Manager (ISSM), SCA, or Delegated Authorization Official Representative (DAOR)Strong attention to detail Ability to work in a team environment Working knowledge of Microsoft tools; Outlook, Excel, PowerPoint More ❯
position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information Security Management … program. Develop ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program InformationSystem Security Officers (ISSOs) on methods to improve fidelity … supervision Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation documentation Experience as an ISSO, InformationSystem Security Manager (ISSM), SCA, or Delegated Authorization Official Representative (DAOR)Strong attention to detail Ability to work in a team environment Working knowledge of Microsoft tools; Outlook, Excel, PowerPoint More ❯
Description Summary: The IT Architect II is responsible for design of IT systems including system infrastructure, system security, application architecture, software and data life cycle management. Provides enterprise architectural framework for the design, development, and deployment of information/business systems. Proactively drives the prioritization of key technology enablers for achieving enterprise level system objectives … solutions that exceed expectations. This role requires excellent collaboration and communication skills to translate complex requirements into functional architecture. Responsibilities: • Assists in the development of the informationsystem vision and strategy of the organization; assists in the development, implementation, communication, and promotion of strategic and tactical plans • Researches and participates in beta testing of new systems and … technologies in order to better evaluate their suitability to the CHRISTUS environment • Evaluates proposed system acquisitions and provides critical input to the decision-making process relative to compatibility, cost, resource requirements, operations, and maintenance; develops plans and recommendations to improve the performance and efficiency of assigned systems; addresses all aspects of assigned systems, including hardware, software, outside services, etc. More ❯
integrity of IT systems by running their Endpoint Security with experience in Trellix and Microsoft Defender. Administrator will also be responsible in applying Security Technical Implementation Guides (STIGs), managing system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate … consideration Key Responsibilities: Responsible for migration from Trellix to Microsoft Defender Cloud experience since InTune, which will manage MDE Continuous upkeep, monitoring, analysis, and response to InformationSystem, network and security events using Endpoint Security tools such as Trellix and Microsoft Defender. STIG Application and Compliance: Implement and maintain Security Technical Implementation Guides (STIGs) on Endpoint Security … Tools. Conduct regular STIG compliance checks using tools like SCAP Compliance Checker and STIG Viewer. Document STIG configurations and remediation actions to ensure audit readiness. Patching and System Updates: Manage and deploy operating systems and application patches in accordance with federal patch management policies. Coordinate patch schedules to minimize operational impact while meeting compliance deadlines. Verify patch More ❯
InformationSystem Security Engineer (ISSE) 3 is primarily responsible for conducting informationsystem security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into informationsystems … the development team designing and developing organizational informationsystems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an informationsystem including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Duties may include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize More ❯
InformationSystem Security Engineer (ISSE) 2 is primarily responsible for conducting informationsystem security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements are effectively integrated into informationsystems … the development team designing and developing organizational informationsystems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an informationsystem including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of informationsystem security program policy; special emphasis placed upon integration of existing SAP network infrastructures Perform analysis of network security, based upon the Risk Management Framework (RMF) with emphasize More ❯
strategists across the NGA enterprise. Tools of the Trade: Gain hands-on experience with best-in-class tools like Jira, Confluence, Cameo, DOORS Next Gen, Baseline ManagementSystem, and ServiceNow. Skills and Experience: Required: Bachelor's degree or higher in Engineering, Computer Science, Information Technology, ManagementInformationSystems, or related STEM … degree. 6 years of working experience in government or industry in database management or Big Data analysis. Familiarity with Architecture Artifacts (e.g., DoDAF Architecture Views - Service and System) Use of Cameo Systems Modeler tool to develop Architecture artifacts such as System and Service views. TS/SCI clearance adjudication or ability to obtain SCI and pass … e.g., Requirements, Use Case, CONOPS, and/or Epic development; Risk, Configuration, and/or Schedule Management) Familiarity with Architecture Artifacts (e.g., DoDAF Architecture Views - Service and System) Hands-on experience with the NGA RFC process Knowledge of Government Financial Managementsystems and workflows Hands-on experience with Jira and Confluence Training, certification, and hands More ❯
Responsibilities: Perform tasks delegated by the ISSM in support of information assurance programs, including security authorization activities in compliance with RMF policies and procedures. Develop and maintain System Security Plans (SSPs), Risk Assessment Reports, A&A packages, and Security Controls Traceability Matrix (SCTM). Ensure that operational security posture is maintained by establishing and enforcing security policies … standards, and procedures. Conduct vulnerability/risk assessments to support the Assessment & Authorization (A&A) process. Analyze system audit logs to identify anomalous activities and potential threats to network resources. Perform vulnerability scans and identify weaknesses in security systems, recommending necessary actions. Ensure that cybersecurity-enabled products or other compensating security controls mitigate identified risks to acceptable levels. Apply … reviews and identify gaps in security architecture, offering recommendations to mitigate risks. Collaborate with government customers to respond to computer security incidents and ensure vulnerability compliance. Input and maintain system documentation into government record-keeping systems such as Xacta. Provide Configuration Management for security-relevant informationsystem software, hardware, and firmware. Perform risk analysis More ❯
of intricate software systems and analytics. This includes interaction with extensive data sets and business managementinformationsystems while creating relevant algorithms. Navigate complex projects, system problems and organization with familiarity of IT systems under governing guidelines. Provide solutions to technical problems within workflows established with a team of system engineers. Responsibilities - Direct software … Preferred Qualifications - Software engineering foundation- Digital Logic, Circuit Analysis and Embedded Systems programming - Cloud (e.g. AWS) & Infrastructure as Code (e.g. Terraform) - Relational databases (e.g. SQL, Oracle) - IT asset management principles - Knowledge of LANs, VPNs routers, network protocols, data encryption - Agile development - Security+ CE certification More ❯
Steps 1 through 6) with in-depth familiarity and understanding of Navy Information Technology (IT) sites, systems, and infrastructure. • Recommend cybersecurity protection capabilities, and, in collaboration with system owners, advising implementation strategies as guidance and threats change. • Consult with System ISSEs and/or System Owners regarding incorporation of cybersecurity best practices into system … RMF for assigned programs, organizations, and systems. • Conduct comprehensive assessments of the management, operational, and technical security controls employed within or inherited by an informationsystem to determine the overall effectiveness of the controls. • Perform annual security reviews, annual testing of Information Assurance (IA) controls. Travel • This position includes a low level of … experience. • Experience: • Minimum of seven years of directly related experience in securing and validating DoD systems. • At least five years of relevant experience in the following areas: • RMF process • System analysis and audits • CISCO IOS • Microsoft Windows/Server • Linux • Network and system monitoring tools • IA compliance models and tools • IA control validation • Risk management and More ❯
support to end users, diagnosing and resolving hardware, software, and network issues efficiently while maintaining exceptional customer service standards. You will utilize remote support tools and an automated ticketing system to track, manage, and document all service requests. When necessary, you will conduct on-site visits to perform hands-on troubleshooting, system maintenance, and user training. The ideal … to delivering high-quality, customer-focused IT support. Key Responsibilities The Computer User Support Specialist will: Provide technical support and troubleshooting for computer systems, software, and hardware, including operating system configuration, user account management, and system backup/recovery Configure, install, and manage end-user devices such as computers, laptops, printers, and scanners Perform hands-on … Maintain clear and effective communication with customers to ensure issues are resolved efficiently and relationships are maintained Ensure all work adheres to established Service Level Agreements (SLAs) Apply information security principles and follow established security protocols and standards Required Skills and Experience The Computer User Support Specialist must have: Active Secret clearance Minimum of 5 years of professional More ❯
be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, and alignment with market data. Description The Cyber Security Analyst/InformationSystem Security Officer (ISSO) will be a member of a small team focusing on developing services and applications in a DevSecOps based environment in support of the Defense Intelligence Agency … DIA). Engineering will be performed on Joint Worldwide Intelligence Communications System (JWICS) and National Security Agency Network (NSANet) connected systems. As a Cyber Security Analyst/ISSO, this position is responsible for supporting the InformationSystem Owner to complete security assessment, continuous monitoring, and configuration management responsibilities. Responsibilities include, but are not limited … events, data transfers, etc. Performing security assessments of DoD Family of Systems in accordance with National Institute of Standards and Technology (NIST), Navy, and NAVINTEL IA guidance, working with system engineers to take corrective action to resolve identified problems Becoming a NAVINTEL IA ICOP Trusted Agent within 6-months Performing Site Based Security Assessments (SBSAs) of systems and recommending More ❯
Operate (ATOs) and other Risk Management Framework (RMF) functions, reviewing, analyzing, and interpreting cybersecurity policies, while also guiding and tracking the integration of cybersecurity engineering principles throughout system lifecycles. The incumbent will act as a trusted consultant to leadership, bridging the gap between compliance requirements, operational readiness, and technical solutions. Clearance Required: Active SECRET clearance. Responsibilities : Review … series, Clinger Cohen Act, and various Defense Acquisition polices. Advise program leadership on emerging cybersecurity directives, regulatory and statutory changes, and policy impacts to mission systems. Monitor and track system authorization (ATO) efforts under the NAVSEA Risk Management Framework and provide early warnings of issues or when progress may be off track. Monitor and track various data … calls for compliance in accordance with specific directives (OPORD, TASKORD, etc.). Conduct and review system and program risk assessments to identify cybersecurity risks and provide strategies for remediation and mitigation. Lead strategic initiatives to strengthen cybersecurity posture across programs, balancing operational effectiveness with security imperatives. Represent the program office in high-level working groups, interagency forums, and technical More ❯