SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 115K Background Relevant experience must be in signals analysis, including protocol analysis Demonstrated experience in network troubleshooting, network traffic characterization, and/or networksecurity analysis Requirements Bachelor's degree in Engineering, Mathematics, Computer Science, Physical Science, or a related technical field More ❯
technologies. The Protocol Analyst shall possess the following capabilities: The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Requirements Position requires active Security Clearance with appropriate Polygraph A Bachelor's degree and More ❯
streamline OPIR data ingestion, scale data streams, and develop predictive analytic products • Standardize process, scalability with local teams, and monitoring and maintenance of operational metrics. • Facilitate data collection, cyber security compliance, and communication • Collaborate with cross-functional teams including data scientists, analysts, network engineers, and software engineers to understand data requirements and develop scalable data solutions • Develop, maintain … ensure the timely and accurate movement of data from source systems to data warehouses and other storage solutions • Oversee and maintain the day-to-day operation of Linux-based network servers, cloud-based environments, and virtual environments • Implement, administer, and troubleshoot security, data recovery, and network infrastructure solutions • Configure and troubleshoot hardware and software issues related to … operative systems, network devices, and custom applications • Identify, analyze, and resolve system issues • Perform routine network startup and shutdown procedures and monitor system performance • Monitor networksecurity and implement security policies • Work with vendors and contractors to resolve outstanding issues • Develop and implement system backup and recovery policies and procedures • Ensure system and data securityMore ❯
Experience must be in computer or info systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint … Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Degree must be in Computer Science More ❯
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of networksecurity capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of networksecurity capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Do you want to work for a UK Bank that are going through a digital transformation? Our client is seeking a highly skilled and motivated Infrastructure Security Manager. Reporting into the head of security, You will play a leading role in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks … This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics … related to networksecurity, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in networksecurity, including firewalls, micro-segmentation, DDoS protection, WAF, and NAC. Familiarity with open-source frameworks such as OWASP, CVSS, etc. Experience with security products More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of Cyber Security Consultant sits within the Cyber Security team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and Enterprise domains to enable the business to deliver its outcomes in a secure manner, building customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. In this role you will have a broad and challenging remit, you will therefore need to be flexible and agile in your … approach, switching between different security disciplines within the team as necessary. You will be engaging in the delivery of multiple business initiatives by introducing baseline and enhanced security requirements and supporting their implementation through guidance and advice. You will also be recommending security solutions and then providing design input and technical approvals, assurances, and governance of deliveries More ❯
Network Architect 6 Month contract initially Based: Hybrid - Maximum of 3 days p/w - Coventry Rate: £450 - £550 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. … We have a great opportunity for a highly experienced Network Architect to join the team. The NetworkSecurity Architect will consider the HD architecture and the culture of the organisation along with the operating model and factor this into their solution selection and design. They will challenge themselves to strive to find the right solution and not … deliver the textbook happy-path solution. Key Responsibilities: The NetworkSecurity Architect will look at the wider networksecurity roadmap and network roadmap and look at how their solution sits within that wider architecture challenging the need and the approach taken for their solution looking for efficiencies with wider changes to consolidate technology platforms, to More ❯
SharePoint Online (SPO) and other enterprise, cloud-based or shared storage services. Work closely with Product Owners, Scrum Masters, and other team members to solve technical problems at the network, system, and application levels. Have a significant role in the evaluation and support of application architectures across platforms to ensure alignment to cloud and application modernization strategies, capabilities and … schedules utilizing DevOps and CI/CD tool sets. Work across multiple projects and systems to develop user stories, system design document, implementation plan document, and SOPs. Understanding technical security best particles and guidelines within the cloud platform. knowledge of and experience with security policies, networksecurity, data security and security event management to … adopt cloud security services Required Qualifications Secret Clearance Minimum of a Bachelor's degree in Science, Technology, Engineering and Math (preferred) with 8 - 12 years' experience or Master's degree with 6 - 10 years of experience (additional years of directly applicable experience may be accepted in lieu of a degree). Salary More ❯
innovators. The ingenuity of our developers, engineers, cyber experts, linguists, and analysts are dedicated to empowering our clients, fulfilling The Mission, and remaining trusted leaders and advisers in national security and technology solutions. We are looking for a Exploitation Analysts (EA) to join a robust team in the following locations: Annapolis Junction, MD Augusta, GA Salt Lake City, UT … The EA will have deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems … At least 11 years of demonstrated experience within the Department of Defense (DoD) as an Exploitation Analyst. Technical Bachelor's Degree Relevant Certifications: Sec+, Net+, CEH, JCAC course Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration More ❯
Roles and Responsibilities: • Ability to perform log analysis and use IDS, Intrusion Prevention System (IPS), and/or other signature technologies. • Provides 1st and 2nd level troubleshooting support for security applications and appliances. • Provides threat and vulnerability analysis security advisory services. • Performs information security assessments or audits of internal networks and systems. • Serves as team leader for … Cyber Defense Analysts. • Assists in the expansion and growth of the Cloud Cybersecurity Defense Center. • Collaborate with client technical teams for issue resolution and mitigation. • Integrates information and networksecurity solutions. • Analyzes various methods of controlling information security problems, determines the strengths and weaknesses of each method, and implements the Government chosen solution. • Identifies weak links in … information security products and determines how to mitigate the control deficiencies. Basic Qualifications: • Certified Information Systems Security Professional (CISSP) certification or equivalent experience. • Foundational Cloud Certification • ITIL v3 Foundation Certification or equivalent • DoD 8570.01 Cyberspace Workforce Qualification and Management Program/8140.01, Cybersecurity Certification Information Assurance Technical 3 (IAT Level 3) certified Certification Requirement: • CISSP Security Clearance More ❯
Experience supporting military or intelligence community customers. • Experience with open source, publicly available information (PAI) data sources and/or forensic media. • Experience developing predictive algorithms. • Experience supporting cyber security or networksecurity operations. • Familiarity with social network analysis, supply chain analysis, forensic accounting, and other analytical methodologies. Major Duties/Tasks: • Analyze and assess software More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 2 primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment … will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Duties may include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … Program Implementation Guide (JSIG) authorization process Advise customer on RMF assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Lead Network Engineer - Freelance (Long-term) Start date : ASAP Duration : 6 months to start with, possibly extendable for much longer time - Fulltime or part-time depending on candidate availability In the context of an Aruba network implementation at one of our major customers located in the neighbourhood of Brussels, we are looking for a Lead Network Engineer … the three languages. Certifications : Customer is requiring the following 2 Aruba certifications + Cisco or Alcatel one ACP-CA: Aruba Certified Professional - Campus Access ACP-NS: Aruba Certified Professional - NetworkSecurity Cisco Certified Network Professional (CCNP) Routing & Switching of CCNP Enterprise of Alcatel Certified Field Expert (ACFE More ❯
Information System Security Manager (ISSM) 1's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 1's - This is a future position that may come open in the future. We are currently building our pipeline. The ISSMs primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs … will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Duties may include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … SAP Implementation Guide (JSIG) authorization process Advise customer on RMF assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Role: Integrated Network Services Engineer Location: London or Sunbury-on-Thames, UK Travel: Limited travel, but some oversees travel maybe required Salary: Negotiable (depending on experience), plus large company benefits and personal development opportunities Interview Process: 2 Stage; with one virtual and one face to face Hours: Monday - Friday: 9am - 5.30 pm (with some flexibility available) Kinly is a … collaboration technology solutions that deliver real business value and exceptional user experiences. Currently we have a new opportunity to join the expanding Integrated Networks team at Kinly. The Integrated Network Services Engineer role plays a pivotal role across projects, service, and global support teams, providing critical network support for both our UK and international clients. You will be … involved in network design, live network troubleshooting and security assessments, utilising a wide range of network hardware and software tools to ensure the optimal performance of Kinly's AV integrations. Additionally, you will contribute to establishing industry-leading AV network standards, reinforcing Kinly's commitment to excellence in the AV sector Key Responsibilities: Provide consultation More ❯
Role: Integrated Network Services Engineer Location: London or Sunbury-on-Thames, UK Travel: Limited travel, but some oversees travel maybe required Salary: Negotiable (depending on experience), plus large company benefits and personal development opportunities Interview Process: 2 Stage; with one virtual and one face to face Hours: Monday - Friday: 9am - 5.30 pm (with some flexibility available) Kinly is a … collaboration technology solutions that deliver real business value and exceptional user experiences. Currently we have a new opportunity to join the expanding Integrated Networks team at Kinly. The Integrated Network Services Engineer role plays a pivotal role across projects, service, and global support teams, providing critical network support for both our UK and international clients. You will be … involved in network design, live network troubleshooting and security assessments, utilising a wide range of network hardware and software tools to ensure the optimal performance of Kinly's AV integrations. Additionally, you will contribute to establishing industry-leading AV network standards, reinforcing Kinly's commitment to excellence in the AV sector Key Responsibilities: Provide consultation More ❯
AWS Security Engineer Our client is looking for an AWS Security Engineer. You will have indepth experience across AWS technology focusing on security to design implement and maintain scalable security solutions. Technology includes: AWS services, including AWS WAF, AWS Shield Advanced, AWS Secrets Manager, Amazon Inspector, Amazon Macie, Amazon GuardDuty, Amazon Detective, AWS CloudTrail, and AWS … Security Hub. Responsibilities: * Develop and maintain Infrastructure as Code (IaC) using AWS CloudFormation or Terraform for automated deployment and configuration management. * Configure and optimize security measures, including IAM policies, networksecurity groups, and encryption protocols. * Monitor security alerts and incidents using AWS security tools and respond to threats in real-time. * Perform regular security assessments and audits to ensure compliance with industry standards and best practices. * Collaborate with IT and development teams to integrate security services and maintain secure production environments. The role is for 2 months initially based from home with 1 -2 days per month on site in London. To be considered for the position please send your CV over. More ❯
Employment Type: Contract, Work From Home
Rate: £400 - £450 per day + Negotiable - inside IR35.
Do you have the problem-solving skills to guide and support business units in maintaining a strong, compliant security environment? Are you skilled in leading security implementations and monitoring to defend against emerging threats? About Us LexisNexis, a part of RELX, is a leading global provider of legal, regulatory, and business information. We help customers increase productivity and … making and outcomes. Our 10,500 experts and innovative tools help us shape a better world for our customers and communities. About The Role We are seeking an Information Security Engineer to implement and monitor the security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical … experience in various information security responsibilities, such as vulnerability management, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance More ❯