elay is hiring an Exploitation Analysts (EA) to support a brand new contract! The EA have many of the same skills of Digital Network Exploitation Analyst (DNEA), but their primary mission is more focused on exploitation. In addition to maintaining DNEA-level understanding of adversary networks, exploitation analysts have to understand network defenses and vulnerabilities to create exploitation … plans and make operational adjustments. There are multiple levels available for the Digital Network Exploitation Analyst: Exploitation Analysts Level 1 Exploitation Analysts Level 2 Exploitation Analysts Level 3 Exploitation Analysts Level 4 Years' Experience by Degree Type: Exploitation Analysts Level 1 Bachelor Degree with 2 years of experience. Exploitation Analysts Level 2 Bachelor Degree with 5 years of experience. … Bachelor Degree with 11 years of experience. Other degrees may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computer architecture (not networkarchitecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Certifications: 18 semester hours of military training More ❯
/cybersecurity support to weapons and space cybersecurity assessments • Agnostic of threat, help translate adversarial mindset, threat intelligence into actionable mitigations within possible areas of CNO and CND (Computer Network Defense), System design, Networkarchitecture/administration, Continuity of Operations. • Evaluate different vulnerability findings and determine conceptual mitigations/next steps • Support Risk Management and other business … design, development, and implementation and maintenance of computer networks and systems • An ACTIVE TS/SCI with Full Scope Polygraph required Preferred Qualifications- • Working knowledge of the DoD Information Network (DODIN), DoD IT system and network certification and accreditation processes (i.e., RMF), to include system security authorization agreements and current and emerging cybersecurity threats • Zero Trust preferred • Possess … working knowledge of DoD's IT systems and network certification and accreditation processes to include system security authorization agreements More ❯
/cybersecurity support to weapons and space cybersecurity assessments. Agnostic of threat, help translate adversarial mindset, threat intelligence into actionable mitigations within possible areas of CNO and CND (Computer Network Defense), System design, Networkarchitecture/administration, Continuity of Operations. Evaluate different vulnerability findings and determine conceptual mitigations/next steps. Support Risk Management and other business … and maintenance of computer networks and systems An ACTIVE TS/SCI with Full Scope Polygraph(MPO) required (CI under 6 yrs) Preferred: Working knowledge of the DoD Information Network (DODIN), DoD IT system and network certification and accreditation processes (i.e., RMF), to include system security authorization agreements and current and emerging cybersecurity threats. Zero Trust preferred. Possess … working knowledge of DoD's IT systems and network certification and accreditation processes to include system security authorization agreements. Clearance: Active TS/SCI Full Scope Clearance required. More ❯
For a complete understanding of this opportunity, and what will be required to be a successful applicant, read on. The ideal candidate will possess a deep understanding of complex networkarchitecture, firewalls, and WAN technologies, alongside demonstrable experience in thriving withi... JBLK1_UKTJ More ❯
/cybersecurity support to weapons and space cybersecurity assessments Agnostic of threat, help translate adversarial mindset, threat intelligence into actionable mitigations within possible areas of CNO and CND (Computer Network Defense), System design, Networkarchitecture/administration, Continuity of Operations. Evaluate different vulnerability findings and determine conceptual mitigations/next steps Support Risk Management and other business … Analyzing needs, deriving system level requirements, and contributing to the design, development, and implementation and maintenance of computer networks and systems Desired Qualifications Working knowledge of the DoD Information Network (DODIN), DoD IT system and network certification and accreditation processes (i.e., RMF), to include system security authorization agreements and current and emerging cybersecurity threats Zero Trust preferred Possess … working knowledge of DoD's IT systems and network certification and accreditation processes to include system security authorization agreements Salary Range: $185,000.00 - $215,000.00 Company Perks 200 hours of PTO annually 6% 401k Contribution Competitive Health Care Options Short Term/Long Term/Life Insurance Annual Training Budget More ❯
experienced Systems Engineer to support weapons and space cybersecurity assessments. In this role, you will analyze threat intelligence, evaluate vulnerabilities, and develop actionable mitigations to strengthen system security and network architecture. You will collaborate with cross-functional teams to ensure resilient, mission-critical systems, support Risk Management Framework (RMF) processes, and bridge the gap between technical risks and operational …/cybersecurity support to weapons and space cybersecurity assessments • Agnostic of threat, help translate adversarial mindset, threat intelligence into actionable mitigations within possible areas of CNO and CND (Computer Network Defense), System design, Networkarchitecture/administration, Continuity of Operations. • Evaluate different vulnerability findings and determine conceptual mitigations/next steps • Support Risk Management and other business … contributing to the design, development, and implementation and maintenance of computer networks and systems Desired: • Familiarity with weapons systems or large scale systems • Working knowledge of the DoD Information Network (DODIN), DoD IT system and network certification and accreditation processes (i.e., RMF), to include system security authorization agreements and current and emerging cybersecurity threats • Zero Trust preferred • Possess More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Bayer AG
to make a real difference, there's only one choice. Principal Enterprise Security Architect This role leads and contributes technically in defining and assessing Bayer's security strategy, technical architecture and security practices. They translate business objectives and risk management strategies into specific security controls enabled by security technologies and services. Provide advanced technical security architectural design for complex … applications and platforms. The Principal Enterprise Security Architect leads the development of a holistic security architecture framework that supports the entirety of the global business. The ideal candidate is a strategic thinker and hands-on executor, with a passion for cybersecurity, and a deep understanding of organizational best practices. YOUR TASKS AND RESPONSIBILITIES Design, develop and maintain a robust … enterprise-ready Architectural Security Controls Framework to ensure the specification of Security Solutions across Bayer is done in a controlled and rational way over applicable technical domains, such as network, cloud, application, platform and AI security Lead the design and development of tailored cybersecurity designs that address specific threats, oversee the selection and deployment of security technologies, ensuring proper More ❯
experience Cost estimation and budgeting Site surveys and assessments Core Technical Knowledge: Infrastructure Design Structured cabling systems Telecommunications rooms/spaces Pathways and spaces Grounding and bonding Firestopping systems Networkarchitecture Data center design Audio/visual systems Security systems design Codes & Standards ANSI/TIA standards ISO/IEC standards National Electrical Code (NEC) Local building codes … IEEE standards BICSI standards and manuals Technical Skills: Design & Documentation AutoCAD or similar CAD software Network infrastructure design Technical writing and documentation Specialized Knowledge: Infrastructure Types Copper cabling systems Fiber optic systems Wireless systems DAS (Distributed Antenna Systems) Smart building technologies IoT infrastructure Soft Skills: Written and verbal communication Problem-solving abilities Attention to detail Project coordination Stakeholder management More ❯
experience Cost estimation and budgeting Site surveys and assessments Core Technical Knowledge: Infrastructure Design Structured cabling systems Telecommunications rooms/spaces Pathways and spaces Grounding and bonding Firestopping systems Networkarchitecture Data center design Audio/visual systems Security systems design Codes & Standards ANSI/TIA standards ISO/IEC standards National Electrical Code (NEC) Local building codes … IEEE standards BICSI standards and manuals Technical Skills: Design & Documentation AutoCAD or similar CAD software Network infrastructure design Technical writing and documentation Specialized Knowledge: Infrastructure Types Copper cabling systems Fiber optic systems Wireless systems DAS (Distributed Antenna Systems) Smart building technologies IoT infrastructure Soft Skills: Written and verbal communication Problem-solving abilities Attention to detail Project coordination Stakeholder management More ❯
technology (OT) systems telecommunications and other communications systems. Duties: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment … and described in Joint Publication 3-13 Information Operations and 3-12 Cyberspace Operations, DoDI 8500.1and DoD 8570.01 and 8570.01-M. Other Requirements : Possess a working knowledge of computer networkarchitecture and network diagraming. Possess a working knowledge of Computer Network vulnerability/compliance analysis software. (Desired) Prior experience supporting DoD Nuclear Command, Control & Communications (NC3 More ❯
/11, Windows Server), including administration and security management Familiar with Active Directory, Group Policy Objects (GPOs), and Entra ID Experience with M365 and Microsoft Intune Basic knowledge of networkarchitecture, VPNs, and security EU citizenship More ❯
The primary role of Networks Engineers Authority will be to oversee the performance and management of the Marshall IP network, management of third-party network providers and be responsible of ‘in service’ change management related to Network services. The secondary role is to provide technical support to the service design team, providing system design support to the … including the creation of supporting documentation Support the initial provisioning of spares, specialist tooling and test equipment. Occasional site visits to complete hands-on Fault finding and/or Network configuration tasks. Technical Advice (Primary Role) Provide design/engineering guidance to management on assets within the Technical Service threads. Provide verbal and written support to operators and maintainers … is assessed, and that agreed change is captured in the requirements baseline of the contract utilising other functions as required. REQUIREMENTS The role requires technical knowledge and experience of networkarchitecture and solutions. Demonstrate suitable professional qualifications such as CCNA/CCNP/Juniper JNCIA OR provide relevant evidence of minimum of 3 years’ experience in designing, delivering More ❯
to the production and review of assurance artefacts, including security cases, risk registers, control implementation evidence, and compliance documentation. Provide expertise on OT protocols, SCADA systems, field devices, and networkarchitecture relevant to the client's operational landscape. Engage regularly with client stakeholders, suppliers, and technical teams to ensure effective collaboration and secure outcomes across the delivery lifecycle. … Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK CNI expectations. Additional certifications or practical experience in Secure by Design, systems assurance, or control systems architecture are advantageous. Evidence of continued professional development aligned with OT security trends, critical infrastructure resilience, and systems assurance practices. Essential skills In-depth understanding of operational technology (OT) environments … including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems within large engineering or infrastructure programmes. Experience integrating cybersecurity into engineering lifecycles, including More ❯
software selection and development, system integration, testing, operations and maintenance (O&M). Perform system integration, hardware and software installation, configuration and upgrades of servers to support an operational networkarchitecture Perform product and component management to ensure technical viability and cost-effectiveness. Evaluate product usability, affordability, functionality, security, and performance to assess suitability for integration into delivery … system environments. Plan and coordinate complex network software and hardware for enterprise release. Ensure systems conform to architectural objectives. Evaluate complex systems' production readiness and supportability. Perform complex system problem identification and resolution Basic Qualifications (Required Skills/Experience): Active Counterintelligence polygraph (CIP) is required with ability to obtain Full Scope polygraph (FSP) post-start. 3+ years of experience … certification. Experience developing system design artifacts using CAD or Visio; signal flow diagrams, equipment elevations, BOM's, and configuration guides. Experience uploading and troubleshooting control system files (Cisco Hyperflex, Network Virtualization, Crestron, Thinklogical). Experience uploading, modifying, and troubleshooting audio Digital Signal Processor files (Biamp, QSC, ). At Encode, we believe that our employees are our greatest asset, and More ❯
Prestatyn, Clwyd, United Kingdom Hybrid / WFH Options
NRL
August 2025 Contract Type: Contractor (Inside IR35), Full-time (5.5 days/week) Key Responsibilities Supervise the installation of IT infrastructure with external vendors to establish a stable domain network and server environment Support external providers during setup of Wi-Fi access points, switches, printers, and other on-site IT assets Troubleshoot software and hardware issues using diagnostic tools … helpdesk operations once a team is in place What We're Looking For Education: Technical diploma or degree in Computer Engineering (or related field) Experience: 4-6 years in networkarchitecture, infrastructure operations, and application maintenance Skills: Proven knowledge of networking installation and infrastructure maintenance Strong problem-solving mindset and ability to work independently Excellent communication and coordination More ❯
server data integrity by evaluating, implementing, and managing appropriate software and hardware solutions. Assist in Configuration Control Board (CCB) documents for technical accuracy and make corrections if needed (e.g. NetworkArchitecture Drawing, CCB Questionnaire) Facilitate new system upgrades, and/or hardware refreshes for clinical equipment. Act as the technical SME during clinical implementations. Requirements Supervisory Responsibility: No More ❯
Required Skills & Experience 5+ years of experience in Risk Management and/or Information Security Proven experience conducting application-level security risk assessments Strong understanding of: Secure software and networkarchitecture Risk management frameworks (eg ISO 3100X, NIST 800-30/37/39, ENISA, EBIOS, OCTAVE, FAIR) OWASP Top 10, encryption, data classification, and secure data flows More ❯
City of London, London, United Kingdom Hybrid / WFH Options
WNTD
Required Skills & Experience 5+ years of experience in Risk Management and/or Information Security Proven experience conducting application-level security risk assessments Strong understanding of: Secure software and networkarchitecture Risk management frameworks (eg ISO 3100X, NIST 800-30/37/39, ENISA, EBIOS, OCTAVE, FAIR) OWASP Top 10, encryption, data classification, and secure data flows More ❯
Warwickshire, England, United Kingdom Hybrid / WFH Options
Pontoon
of delivering complex projects Projects to cover Breach Attack Scenarios and Post Quantum Cryptography (nice-to-have) Experience managing a third party delivering the work; Hardening Implementation Strategy and NetworkArchitecture Candidates will ideally show evidence of the above in their CV in order to be considered.Please be advised if you haven't heard from us within More ❯
the Academy and what do Mason Advisory do? Not only do we advise businesses regarding their IT transformation needs, we also provide advice to businesses regarding business operating models, networkarchitecture and cyber security to name a few. The Academy will train you to understand our business, the role of a Consultant and the Consulting Industry as a More ❯
the Academy and what do Mason Advisory do? Not only do we advise businesses regarding their IT transformation needs, we also provide advice to businesses regarding business operating models, networkarchitecture and cyber security to name a few. The Academy will train you to understand our business, the role of a Consultant and the Consulting Industry as a More ❯
on Fridays) Duties include: Design of control system solutions including PLC's, networks, SCADA/HMI and telemetry systems. Authoring and configuring system design documentation, networkarchitecture drawings, electrical drawings and general arrangements. Aiding in the production of detailed design specifications including Functional Design Specifications (FDS) and System Design Specifications (SDS). Identification and procurement scheduling of electrical More ❯
on Fridays) Duties include: Design of control system solutions including PLC's, networks, SCADA/HMI and telemetry systems. Authoring and configuring system design documentation, networkarchitecture drawings, electrical drawings and general arrangements. Aiding in the production of detailed design specifications including Functional Design Specifications (FDS) and System Design Specifications (SDS). Identification and procurement scheduling of electrical More ❯
federation, performance, and IT security is advantageous. Additionally, you should have: Advanced proficiency in SQL Comprehensive knowledge and hands-on experience with Microsoft operating systems In-depth understanding of networkarchitecture and protocols Excellent communication skills with fluency in English (both written and verbal) Additional Information Join Unit4 and you'll be part of one of the most More ❯
hold and maintain a security clearance, therefore U.S. citizenship is required. Responsibilities: Assist in building and implementing new networks and application services to satisfy business need. Document and maintain network architecture. Contribute to ongoing policies and procedures defined to maintain and improve the network environments. Monitor, protect, and tune network traffic using standard logging and management tools. … Ensure staff equipment (i.e. laptops and workstations) are patched and performant. Ensure printers, scanners, and other network infrastructure is accessible to staff. Conduct regular compliance audits to ensure network assets are patched and maintained. Ensure the availability for applications that require network connectivity. Provide expertise in multiple operating systems (Linux/MacOS/Windows/VMWare). … Qualifications: Must have at minimum an active secret clearance. Competence on Linux command line (5+ years). Familiarity with basic Linux commands, troubleshooting tools, and network administration configurations. Experience (5+ years) in network administration including design, maintenance, monitoring, and upgrading. Competent experience (2+ years) in virtualization technologies (VLAN configuration, vCenter, etc). Ability to work independently, and demonstrate More ❯