Relevant experience must be in signals analysis, related to comms signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Degree in Eng, Math, Comp Sci, Phys Sci or related tech field. Level 1 - 6 years or AA + 4 years or BS + 0 years; Level More ❯
Coventry, West Midlands, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
Contract Opportunity: NetworkSecurity Architect - Coventry (Hybrid, 3 days on-site) ?? We're looking for an experienced NetworkSecurity Architect to join a fast-paced, enterprise environment on a 6-month contract. You'll influence key security design decisions and help shape the future network landscape. ?? Location: Coventry (Hybrid, 3 days in office) ?? Day … Rate: £500 Inside IR35 ? Duration: 6 months ?? Start: ASAP Key Responsibilities: Develop high- and low-level networksecurity designs Research and present solution options for strategic initiatives Provide architectural governance across multiple projects Align solutions with enterprise architecture and security roadmaps Collaborate with delivery teams to ensure successful implementation Key Skills: Expertise in network architecture and … security tooling Hybrid cloud (On-Prem and Multi-Cloud) network design Strong knowledge of NAC, ZTNA, SD-WAN, and segmentation Experience with next-gen firewalls and OT network design Excellent communication and stakeholder engagement skills Apply today to make an impact on cutting-edge security architecture projects More ❯
binley, midlands, united kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
Contract Opportunity: NetworkSecurity Architect - Coventry (Hybrid, 3 days on-site) ?? We're looking for an experienced NetworkSecurity Architect to join a fast-paced, enterprise environment on a 6-month contract. You'll influence key security design decisions and help shape the future network landscape. ?? Location: Coventry (Hybrid, 3 days in office) ?? Day … Rate: £500 Inside IR35 ? Duration: 6 months ?? Start: ASAP Key Responsibilities: Develop high- and low-level networksecurity designs Research and present solution options for strategic initiatives Provide architectural governance across multiple projects Align solutions with enterprise architecture and security roadmaps Collaborate with delivery teams to ensure successful implementation Key Skills: Expertise in network architecture and … security tooling Hybrid cloud (On-Prem and Multi-Cloud) network design Strong knowledge of NAC, ZTNA, SD-WAN, and segmentation Experience with next-gen firewalls and OT network design Excellent communication and stakeholder engagement skills Apply today to make an impact on cutting-edge security architecture projects! JBRP1_UKTJ More ❯
leicester, midlands, united kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
Contract Opportunity: NetworkSecurity Architect - Coventry (Hybrid, 3 days on-site) ?? We're looking for an experienced NetworkSecurity Architect to join a fast-paced, enterprise environment on a 6-month contract. You'll influence key security design decisions and help shape the future network landscape. ?? Location: Coventry (Hybrid, 3 days in office) ?? Day … Rate: £500 Inside IR35 ? Duration: 6 months ?? Start: ASAP Key Responsibilities: Develop high- and low-level networksecurity designs Research and present solution options for strategic initiatives Provide architectural governance across multiple projects Align solutions with enterprise architecture and security roadmaps Collaborate with delivery teams to ensure successful implementation Key Skills: Expertise in network architecture and … security tooling Hybrid cloud (On-Prem and Multi-Cloud) network design Strong knowledge of NAC, ZTNA, SD-WAN, and segmentation Experience with next-gen firewalls and OT network design Excellent communication and stakeholder engagement skills Apply today to make an impact on cutting-edge security architecture projects! JBRP1_UKTJ More ❯
EU Passport is needed to apply for this role Fujitsu is looking for a Network Operations Specialist to work on a project within the EU Institutions in Brussels . Main tasks Network automation engineer to implement solutions and integrations with technologies and platforms Network support engineer for 2nd level support and troubleshooting Firewall configuration, routers, switches Support … lifecycle management activities for network services Top 5 most important technical skills: Programming skills (REST API, ansible, python, terraform) Network virtualization (NSX-T, Kubernetes) Networksecurity (Checkpoint) Networksecurity (Fortinet) F5 BIG-IP LTM, F5 BIG-IP ASM (WAF) Certifications Certification in Cisco DevNet (or a comparable vendor-neutral DevOps/automation program) would … be a distinct advantage Holding a CCIE (particularly in Security) is a significant advantage Languages: English Location: Brussels Contract: Employee or Freelance - YOU DECIDE More ❯
Experience must be in the design/development of computer or information systems, programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, and/or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will … count as 6 months of experience). Degree in network/systems eng, Info Tech, or related (Gen Engineering, Comp Eng, Elec Eng, CS, Cyber Security, etc.) Level 1 - AA + 4 years or BS + 2 years; Level 2 - AA + 7 years or BS + 5 years or MS + 3 years; Level 3 - AA + More ❯
with POLY Work Arrangement: On-site Job Location: Fort Meade MD Salary: 105K -162K Background Relevant experience must be in signals analysis, including protocol analysis, and also include network troubleshooting, network traffic characterization, and/or networksecurity analysis Requirements Bachelor's degree in engineering, mathematics, computer science, physical science, or a related technical field … degree plus 4 years of relevant experience Need deep understanding of data link layer of OSI model, also with sonet and optical net Preferred Must be able to understand network architectures More ❯
SCI with POLY Work Arrangement: On-site Job Location: HI Wahiawa Salary: 65K -125K Background Relevant experience must be in signals analysis, including protocol analysis, and also include network troubleshooting, network traffic characterization, and/or networksecurity analysis Requirements Bachelor's degree in engineering, mathematics, computer science, physical science, or a related technical field More ❯
SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 115K Background Relevant experience must be in signals analysis, including protocol analysis Demonstrated experience in network troubleshooting, network traffic characterization, and/or networksecurity analysis Requirements Bachelor's degree in Engineering, Mathematics, Computer Science, Physical Science, or a related technical field More ❯
technologies. The Protocol Analyst shall possess the following capabilities: The Protocol Analyst works directly with signals analysis, preferably related to communications signals (e.g., bitstream analysis, waveform analysis, protocol analysis), network troubleshooting, network traffic characterization, and/or networksecurity analysis. Requirements Position requires active Security Clearance with appropriate Polygraph A Bachelor's degree and More ❯
streamline OPIR data ingestion, scale data streams, and develop predictive analytic products • Standardize process, scalability with local teams, and monitoring and maintenance of operational metrics. • Facilitate data collection, cyber security compliance, and communication • Collaborate with cross-functional teams including data scientists, analysts, network engineers, and software engineers to understand data requirements and develop scalable data solutions • Develop, maintain … ensure the timely and accurate movement of data from source systems to data warehouses and other storage solutions • Oversee and maintain the day-to-day operation of Linux-based network servers, cloud-based environments, and virtual environments • Implement, administer, and troubleshoot security, data recovery, and network infrastructure solutions • Configure and troubleshoot hardware and software issues related to … operative systems, network devices, and custom applications • Identify, analyze, and resolve system issues • Perform routine network startup and shutdown procedures and monitor system performance • Monitor networksecurity and implement security policies • Work with vendors and contractors to resolve outstanding issues • Develop and implement system backup and recovery policies and procedures • Ensure system and data securityMore ❯
Experience must be in computer or info systems design/development, programming, information/cyber/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint … Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). Degree must be in Computer Science More ❯
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of networksecurity capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Transport/IP (TRIP) NOC Technician Location: Scott AFB, IL and Hill AFB, UT. Potential for Telework: No - 100% onsite Certification: Security+ CE Currently possess an active Secret security clearance Description We have a career opening for a Network Controller at both Scott AFB, IL, and Hill AFB, UT. PROGRAM SUMMARY: Our customer, Defense Information Systems Agency (DISA … provides, operates, and assures command and control of the Defense Information System Network (DISN) services to the warfighter, national leaders and other mission and coalition partners across the department of Defense (DoD) and national security organizations. Our Network Operations Center (NOC) team provides 24 7 global DoD information network (DoDIN) operations and incident management support. We … support key missions which include: JRSS (Joint Regional Security Stack) enterprise system, which provides a centralized network suite of equipment that provides a host of networksecurity capabilities. Enterprise SATCOM Gateway Services (ESGS), providing 24/7/365 technical and operational support to tactical customers accessing DoD Gateway facilities. Airborne Intelligence, Surveillance, Reconnaissance operations support. More ❯
Do you want to work for a UK Bank that are going through a digital transformation? Our client is seeking a highly skilled and motivated Infrastructure Security Manager. Reporting into the head of security, You will play a leading role in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks … This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics … related to networksecurity, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in networksecurity, including firewalls, micro-segmentation, DDoS protection, WAF, and NAC. Familiarity with open-source frameworks such as OWASP, CVSS, etc. Experience with security products More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of Cyber Security Consultant sits within the Cyber Security team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and Enterprise domains to enable the business to deliver its outcomes in a secure manner, building customer trust in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. In this role you will have a broad and challenging remit, you will therefore need to be flexible and agile in your … approach, switching between different security disciplines within the team as necessary. You will be engaging in the delivery of multiple business initiatives by introducing baseline and enhanced security requirements and supporting their implementation through guidance and advice. You will also be recommending security solutions and then providing design input and technical approvals, assurances, and governance of deliveries More ❯
Network Architect 6 Month contract initially Based: Hybrid - Maximum of 3 days p/w - Coventry Rate: £450 - £550 p/d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can really make a difference. … We have a great opportunity for a highly experienced Network Architect to join the team. The NetworkSecurity Architect will consider the HD architecture and the culture of the organisation along with the operating model and factor this into their solution selection and design. They will challenge themselves to strive to find the right solution and not … deliver the textbook happy-path solution. Key Responsibilities: The NetworkSecurity Architect will look at the wider networksecurity roadmap and network roadmap and look at how their solution sits within that wider architecture challenging the need and the approach taken for their solution looking for efficiencies with wider changes to consolidate technology platforms, to More ❯
SharePoint Online (SPO) and other enterprise, cloud-based or shared storage services. Work closely with Product Owners, Scrum Masters, and other team members to solve technical problems at the network, system, and application levels. Have a significant role in the evaluation and support of application architectures across platforms to ensure alignment to cloud and application modernization strategies, capabilities and … schedules utilizing DevOps and CI/CD tool sets. Work across multiple projects and systems to develop user stories, system design document, implementation plan document, and SOPs. Understanding technical security best particles and guidelines within the cloud platform. knowledge of and experience with security policies, networksecurity, data security and security event management to … adopt cloud security services Required Qualifications Secret Clearance Minimum of a Bachelor's degree in Science, Technology, Engineering and Math (preferred) with 8 - 12 years' experience or Master's degree with 6 - 10 years of experience (additional years of directly applicable experience may be accepted in lieu of a degree). Salary More ❯
innovators. The ingenuity of our developers, engineers, cyber experts, linguists, and analysts are dedicated to empowering our clients, fulfilling The Mission, and remaining trusted leaders and advisers in national security and technology solutions. We are looking for a Exploitation Analysts (EA) to join a robust team in the following locations: Annapolis Junction, MD Augusta, GA Salt Lake City, UT … The EA will have deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/networksecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems … At least 11 years of demonstrated experience within the Department of Defense (DoD) as an Exploitation Analyst. Technical Bachelor's Degree Relevant Certifications: Sec+, Net+, CEH, JCAC course Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration More ❯
Roles and Responsibilities: • Ability to perform log analysis and use IDS, Intrusion Prevention System (IPS), and/or other signature technologies. • Provides 1st and 2nd level troubleshooting support for security applications and appliances. • Provides threat and vulnerability analysis security advisory services. • Performs information security assessments or audits of internal networks and systems. • Serves as team leader for … Cyber Defense Analysts. • Assists in the expansion and growth of the Cloud Cybersecurity Defense Center. • Collaborate with client technical teams for issue resolution and mitigation. • Integrates information and networksecurity solutions. • Analyzes various methods of controlling information security problems, determines the strengths and weaknesses of each method, and implements the Government chosen solution. • Identifies weak links in … information security products and determines how to mitigate the control deficiencies. Basic Qualifications: • Certified Information Systems Security Professional (CISSP) certification or equivalent experience. • Foundational Cloud Certification • ITIL v3 Foundation Certification or equivalent • DoD 8570.01 Cyberspace Workforce Qualification and Management Program/8140.01, Cybersecurity Certification Information Assurance Technical 3 (IAT Level 3) certified Certification Requirement: • CISSP Security Clearance More ❯
Experience supporting military or intelligence community customers. • Experience with open source, publicly available information (PAI) data sources and/or forensic media. • Experience developing predictive algorithms. • Experience supporting cyber security or networksecurity operations. • Familiarity with social network analysis, supply chain analysis, forensic accounting, and other analytical methodologies. Major Duties/Tasks: • Analyze and assess software More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military … to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯
Information System Security Manager (ISSM) 2 primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment … will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and SAP activities. Duties may include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of networksecurity … Program Implementation Guide (JSIG) authorization process Advise customer on RMF assessment and authorization issues Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all More ❯