Reviews and evaluates system performance against cybersecurity-related specification requirements, monitors and assesses field performance, and assesses the risk of meeting user and specification requirements. Prepares and evaluates cybersecurity security strategies for requested programs. Perform security analyses and risk/vulnerability assessments. Execute day-to-day certification and accreditation activities for a project team. Has the breadth of … US citizen Minimum Required Qualifications Clearance: Secret Education: MS in Cybersecurity, Computer Science or Information Science Years of Experience: At least 20 years of experience Certifications: Certified Information Systems Security Professional (CISSP) Technical Skills Extensive experience in operational cybersecurity accreditation and certification of embedded systems accredited at Secret level and below. Extensive understanding of AR 25-2 and the … RMF and the Enterprise Mission Assurance Support Service (eMASS) software. Extensive experience preparing recommended IA approval and supporting information documentation. Understand systems engineering processes. Possesses extensive experience as a NetworkSecurity Architect. Extensive understanding of the DoD standards guiding cybersecurity policy development, requirements, integration, engineering, and certification and accreditation. Interpersonal Skills Excellent customer service skills Ability to manage More ❯
Risk Management Framework Coordinator - Level 2 Job Category: Security Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: The Opportunity: We are seeking a skilled and motivated individual to join our team in providing critical support for the integration of risk management activities … into the system life cycle process. This role is pivotal in supporting the government's cybersecurity mission efforts by managing and mitigating risks across information systems, including security, enclave, and organizational risks. The selected candidate will be responsible for driving the development and execution of risk mitigation plans, strategies, and progress tracking across Technical Task Orders (TTOs), ensuring timely … delivery of mission priorities. By managing risk throughout the system life cycle, the candidate will ensure that information systems are developed, maintained, and decommissioned with a robust security posture, while staying within budget and deadlines. This position offers the opportunity to directly contribute to the success of the government's cybersecurity objectives, playing an essential role in safeguarding critical More ❯
JSON Experience with Mongo, ElasticSearch, and Redis Experience with containerization, including Docker or Podman, or container orchestration, including Swarm or Kubernetes Experience operating with AWS Experience with computer and networksecurity and penetration testing Experience with dataflow integration such as Apache NiFi Experience writing source code for new applications or generating and enhancing code samples for existing applications … models, data structures, data transformations, and data processing pipelines Ability to work with automated testing tools to perform testing and maintenance Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; TS/SCI clearance with polygraph is required. Compensation At Booz Allen, we celebrate your contributions More ❯
Experience in integrating and testing and analysis of embedded processing systems to the software/hardware level. Knowledge and experience in communications systems, software languages/software testing, networks, networksecurity, power systems, antennas, RF, and/or mechanical design and analysis. Experience with requirements analysis and verification. Experiencing in developing test strategies, plans, reports, etc. Experience with More ❯
and basic networking fix steps The ability to solve issues with log feeds, search time, and field extractions The ability to solve problems related to data solutions. Desired Qualifications: NetworkSecurity Operations Center (SOC) experience Experience and talent in date correlation Experience creating workflows for Incident Response within a SIEM Tool GIAC Certified Incident Handler Certification GIAC Cyber More ❯
NetworkSecurity Engineer Montgomery, AL - 100% ONSITE Maxwell AFB/Gunter Annex Secret clearance is required to start Must be Security+ certified Must get Palo Alto certification within 90 days of hire Different shifts available: 7am - 3pm 3pm - 11pm 11pm - 7am Requirements: • 5+ years' experience with Enterprise DOD boundary protection and CSSP operations. • Install, monitor, configure, troubleshoot, upgrade … patch, harden, maintain, and operate intrusion detection/prevention systems, firewalls, load balancers, and web proxies to protect AFNet resources from both internal and external threats according to DoD security standards. • Perform complex analytics on boundary protection systems to protect system assets from compromise, data loss, and other requirements. • Perform DCO and DODIN operations. • Must have an active Secret … clearance or higher Certifications Required: • Must be Security+ certified • Must obtain one of the following certifications within 90 days of hire: Palo Alto NetworkSecurity Professional or Palo Alto Networks Certified NetworkSecurity Administrator (PCNSA) (Certification retired but still valid if not expired More ❯
NETWORKSECURITY ANALYST: Senior Level Location: Chantilly, VA US Security Clearance Requirement: TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is searching for NetworkSecurity Analysts to work on our red team to identify target network infrastructure and vulnerabilities. You will work closely with penetration testers … and other team members to map out target networks (SIGDEV) using many different network artifacts. You will assist with identifying target objectives, understanding internal network connections and architectures, lateral movement, and any internal security mechanisms (IDS/IPS, host-based agents, etc). You will also analyze data collected from the target and assist with drafting operational … reports of your findings. You will help scope, guide and analyze network exploitation activities and risks. You will be responsible for mapping out target networks, identifying opportunities for expansion and assisting Penetration Testers in planning out next steps. You can also assist the Penetration Testers to better hone their operational security, evade detection and find new ways to More ❯
Multiple Opportunities Available Title: NetworkSecurity Engineer II Location: On-site at Gunter Annex, Montgomery, AL Clearance Required: Active Secret Clearance Hours: 2 Day Shift (6:30 AM - 2:30 PM) 1 Afternoon Shift (2:30 PM - 10:30 PM) Certifications Required: IAT-II & Infoblox: Core DDI Administration OR Infoblox: Core DDI Troubleshooting. Salary Range … depending on experience DLS Engineering is seeking a NetworkSecurity II (Boundary) DNS professional for a full-time position in support of the Air Force Intranet Control (AFINC) support program at Gunter Annex in Montgomery, Alabama. As part of AFINC, the mission of the 26th Network Operations Squadron (26 NOS) is to provide mission assurance to the … warfighter through the operation, management, and defense of the Department of Defense Information Network (DODIN). In the execution of its mission, the 26 NOS maintains network infrastructure, to include routers, switches, proxies, firewalls, servers, workstations, printers, Storage Area Networks (SAN) and test labs, to provide maneuverability and defense of both classified and unclassified networks. A day in More ❯
Key Responsibilities Consult with large enterprise clients on product integration and secure network architecture design. Lead the implementation, migration, upgrade, and optimization of advanced security solutions in complex network environments. Develop method of procedures (MOPs), low-level design documentation, and implementation plans based on customer requirements. Design and execute test plans for new features and security solutions prior to production deployment. Perform advanced troubleshooting and issue resolution related to security infrastructure. Support production cutovers and go-lives, including availability for after-hours work as needed. Deliver technical training sessions and workshops to clients on security technologies and best practices. Collaborate with cross-functional teams including sales, engineering, and technical support to ensure customer … satisfaction and successful project delivery. Qualifications 8+ years of hands-on experience with IP networking, networksecurity, and architecture design. Strong knowledge of TCP/IP, cybersecurity principles, and protocols. Deep understanding of core infrastructure components such as routing, switching, load balancing, and networksecurity solutions (e.g., firewalls, VPNs, intrusion prevention, antivirus, application control). Proficient More ❯
Outside IR35 Contract - £500/day - London/Remote An excellent contract opportunity has arisen for a skilled CrowdStrike Firewall Consultant to join a leading organisation on a major security improvement project. This contract role offers £500 per day, is outside IR35, and will run for an initial period of 6 months, with strong likelihood of extension based on … ownership of a full end-to-end deployment of CrowdStrike Firewall across Windows Servers and Windows 11 laptops and desktops. The main objective of the project is to improve networksecurity while ensuring system stability and business continuity throughout the implementation process. The successful candidate will be responsible for analysing inbound and outbound network traffic across the … You must have proven experience implementing CrowdStrike Firewall within live enterprise environments, including deep knowledge of Windows Server environments and Windows 11 desktop operating systems. A strong understanding of network defence, micro-segmentation, ports and protocols, and network interconnectivity is essential. In addition, you will require hands-on experience using CrowdStrike Query Language (FQL), combined with excellent problem More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Platform Recruitment Limited
to £80,000 Farnborough (Hybrid) An exciting opportunity for an experienced Senior Services Engineer to join a cutting-edge technology company, working on the deployment and support of advanced network intelligence solutions. Location: Farnborough, Hampshire (Hybrid, minimum 3 days onsite) Salary: £50,000£80,000 (dependent on experience) Travel: 2550% UK and international travel required Security Clearance: Must … hold or be eligible to obtain clearance Driving Licence: Required Key Responsibilities: Install, maintain, and support Linux-based network intelligence products Troubleshoot complex technical issues and support critical infrastructure Provide remote and onsite support for customer deployments Assist in new product introductions, upgrades, and training Work closely with engineering and implementation teams Participate in 24/7 on-call … Requirements: Strong experience with Linux (RedHat or similar), IP networking, and packet-level protocols Familiar with tools such as Wireshark and scripting languages (e.g., Bash, Python) Solid understanding of networksecurity, virtualization (VMware, Docker), and cloud/Kubernetes environments Experience in telecoms, ISPs, or law enforcement/intelligence systems is a plus Excellent communication and problem-solving skills More ❯
Outside IR35 Contract £500/day London/Remote An excellent contract opportunity has arisen for a skilled CrowdStrike Firewall Consultant to join a leading organisation on a major security improvement project. This contract role offers £500 per day, is outside IR35, and will run for an initial period of 6 months, with strong likelihood of extension based on … ownership of a full end-to-end deployment of CrowdStrike Firewall across Windows Servers and Windows 11 laptops and desktops. The main objective of the project is to improve networksecurity while ensuring system stability and business continuity throughout the implementation process. The successful candidate will be responsible for analysing inbound and outbound network traffic across the … You must have proven experience implementing CrowdStrike Firewall within live enterprise environments, including deep knowledge of Windows Server environments and Windows 11 desktop operating systems. A strong understanding of network defence, micro-segmentation, ports and protocols, and network interconnectivity is essential. In addition, you will require hands-on experience using CrowdStrike Query Language (FQL), combined with excellent problem More ❯
London, Billingsgate, United Kingdom Hybrid / WFH Options
Ganymede Solutions
Outside IR35 Contract – £500/day – London/Remote An excellent contract opportunity has arisen for a skilled CrowdStrike Firewall Consultant to join a leading organisation on a major security improvement project. This contract role offers £500 per day, is outside IR35, and will run for an initial period of 6 months, with strong likelihood of extension based on … ownership of a full end-to-end deployment of CrowdStrike Firewall across Windows Servers and Windows 11 laptops and desktops. The main objective of the project is to improve networksecurity while ensuring system stability and business continuity throughout the implementation process. The successful candidate will be responsible for analysing inbound and outbound network traffic across the … You must have proven experience implementing CrowdStrike Firewall within live enterprise environments, including deep knowledge of Windows Server environments and Windows 11 desktop operating systems. A strong understanding of network defence, micro-segmentation, ports and protocols, and network interconnectivity is essential. In addition, you will require hands-on experience using CrowdStrike Query Language (FQL), combined with excellent problem More ❯
a renowned, global Construction Company based in Derby, Derbyshire. As an IT Infrastructure Engineer, you will play a vital role in enhancing the company's IT infrastructure, ensuring reliability, security, and efficiency. You will be working closely with the Infrastructure Team, Lead Infrastructure Engineers and Infrastructure Manager to ensure the smooth running of the IT Infrastructure, in addition to … the company's IT infrastructure. • Collaborate with cross-functional teams to identify technology needs and implement projects. • Oversee hardware and software configuration, troubleshooting, and maintenance. • Develop and implement IT security policies and procedures. • Provide technical support and mentorship to junior team members. • Manage vendor relationships and procurement processes. • Stay updated on emerging technologies and industry trends. Technical Skillset: • Windows … Active Directory, DNS, DHCP, Group Policy • Office 365 – Teams, Sharepoint, Exchange, Intune • Virtualisation Technologies (Hyper-V, VMWare, Nutanix) • Networking – TCP/IP, VLANS, Switching/Routing (Cisco, Cisco Meraki) • NetworkSecurity – Firewall Admin, NetworkSecurity Technologies (Darktrace, MFA) • Azure/Azure Active Directory If you're a talented IT professional looking to take the next step More ❯
a renowned, global Construction Company based in Derby, Derbyshire. As an IT Support Engineer, you will play a vital role in enhancing the company's IT infrastructure, ensuring reliability, security, and efficiency. You will be working closely with the Infrastructure Team, Lead Infrastructure Engineers and Infrastructure Manager to ensure the smooth running of the IT Infrastructure, in addition to … the company's IT infrastructure. • Collaborate with cross-functional teams to identify technology needs and implement projects. • Oversee hardware and software configuration, troubleshooting, and maintenance. • Develop and implement IT security policies and procedures. • Provide technical support and mentorship to junior team members. • Manage vendor relationships and procurement processes. • Stay updated on emerging technologies and industry trends. Technical Skillset: • Windows … Active Directory, DNS, DHCP, Group Policy • Office 365 – Teams, Sharepoint, Exchange, Intune • Virtualisation Technologies (Hyper-V, VMWare, Nutanix) • Networking – TCP/IP, VLANS, Switching/Routing (Cisco, Cisco Meraki) • NetworkSecurity – Firewall Admin, NetworkSecurity Technologies (Darktrace, MFA) • Azure/Azure Active Directory If you're a talented IT professional looking to take the next step More ❯
Our client, the UK's trusted Ministry of Defence partner, is seeking an experienced SOC Threat Detection Analyst to join the cyber security operations centre (SOC) within Information Management (IM). The successful candidate will support Senior SOC analysts in addressing the challenges of countering cyber threats, driving a proactive ethos in a dynamic environment, and providing robust threat … the UK InfoSec Team, and the IM Domains (Customer Support and Infrastructure/Information Systems). Responsibilities cover analysis, monitoring, reporting, alerting, and investigation activities using a variety of security platforms, including AI/ML and behavioural analytics, SIEM (Security Information Event Management), Network Packet Capture, Anti-Malicious Code, and Threat Detection technologies across the UK Network … incident response team with investigations that need to be escalated to an embedded staff member. The SOC Analyst key responsibilities are: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with the maintenance of MBDA Security technologies Assisting the SOC Solutions Lead with project More ❯
Employment Type: Contract
Rate: £45.00 - £85.00/hour In IR35 (PAYE & Umbrella) available
successful implementation. Key Responsibilities: Lead and manage networking-related projects from initiation to completion, ensuring timely delivery and alignment with business objectives. Work closely with cross-functional teams, including network engineers, system architects, and developers, to design and implement scalable networking solutions. Develop detailed project plans, allocate resources, and monitor progress to ensure milestones and deliverables are met. Provide … technical guidance on networking protocols, infrastructure design, and security best practices. Identify potential risks, develop mitigation strategies, and ensure compliance with industry standards and regulatory requirements. Collaborate with stakeholders to translate business requirements into technical solutions and facilitate smooth project execution. Optimize network performance and troubleshoot technical issues in collaboration with the engineering team. Prepare reports, documentation, and … stakeholders, ensuring transparency and effective communication. What We're Looking For: Technical Skills: Strong understanding of networking protocols (TCP/IP, BGP, OSPF, MPLS, VPN, etc.). Experience with network infrastructure, including routers, switches, firewalls, and load balancers. Hands-on experience with cloud networking (AWS, Azure, Google Cloud) and SDN (Software-Defined Networking). Knowledge of networksecurityMore ❯
Role: Cyber Security Consultant Location: Leeds, West Yorkshire Salary: £60,000 - £75,000 PLUS 25 Days Holiday, Vendor Certifications, International Travel, Private Pension About the Company: Our client, a global leader in Sustainability Consulting, is looking for a Cybersecurtiy Consultant to join their growing Information Security Team. This exciting role provides an opportunity to shape and strengthen security … a strong technical background, and thrive in a fast-paced environment, we want to hear from you. Position Overview: As a Cybersecurity Consultant, you will collaborate with the IT Security Team to advise, develop, and maintain security processes and policies. Your expertise will guide the organization in enhancing security capabilities across its global infrastructure. This role offers … a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving More ❯
A large enterprise organisation is seeking an experiencedLevel 3 SOC Analyst for an initial 6-month rolling contract. This is a key role within a mature and well-established Security Operations Centre, offering the opportunity to work on complex threats and contribute to a high-performing cybersecurity function. This is a challenging, rewarding role for a seasoned SOC professional … make a tangible impact. Apply now to join a team focused on protecting enterprise assets against evolving cyber threats. Key Responsibilities: Lead investigations and response efforts for high-severity security incidents. Conduct proactive threat hunting using Microsoft Sentinel and the Defender suite. Develop and fine-tune analytic rules, workbooks, and automation playbooks in Sentinel. Perform deep-dive analysis of … malware, phishing, and lateral movement techniques. Collaborate with engineering teams to optimise Microsoft security tool integrations. Maintain and enhance incident response procedures and documentation. Skills/Must have: Over 5 years of experience in cybersecurity, including a minimum of 2 years in a Level 3 SOC or equivalent role. Expert-level proficiency with Microsoft Sentinel, including KQL, custom analytic More ❯
The goal is to deliver a seamless, high-quality, and interactive experience for both internal teams and external clients. You'll be working on challenges such as data synchronization , network performance optimization , and video stream security . xSTUDIO is already in daily use by over 7,000 artists, producers, and supervisors across DNEG. Now, we're pushing the … Degree in Computer Science, Engineering or similar, or equivalent experience Strong programming skills in modern C/C++ (2011, 2017) A good understanding of networking technologies, protocols and physical network infrastructure Knowledge of networksecurity and data encryption Ability and enthusiasm for learning new technologies and APIs rapidly Interpersonal: Excellent written, verbal, and graphical communication Experience drafting … technical documentation Working experience in the Agile Development model Knowledge of product development best practices Nice to have: Familiarity with video codecs, encode/decode APIs (e.g. ffmpeg) and network video streaming Experience of software development in a Linux environment (shells, version management etc) Experience of cross platform development including exposure to MacOS and Windows environments An understanding of More ❯
IT Service Desk Engineer (1st Line) Full-time Company Profile An exciting, forward-thinking and innovative provider of complete, bespoke, managed IT, communication and networksecurity solutions for businesses of all sizes for over 10 years. Now hiring for multiple talented IT Support Engineers to join the team due to continued growth and expansion in customer base and … demand. They offer and encourage development and progression, with the opportunity of great career with unrivalled job security and stability. Job Profile The job will suit skilled IT support engineers with a minimum of 1 year proven and demonstrable experience within a Managed Service Provider (MSP) environment. The successful candidates will need a customer focused approach and a commitment More ❯
success, driving adoption, value realization, and customer satisfaction while partnering closely with Sales, Technical Services, Product, and Engineering. You'll combine relationship management with a strong grasp of IT security infrastructure to guide customers through successful adoption and expansion. Reporting to: VP, Global Customer Success Location : UK (Home office) Direct employment Responsibilities: Drive Customer Adoption: Identify adoption gaps, build … Internally: Represent the customer's voice and ensure their needs are championed across the organization. Requirements: 5+ years in Customer Success or similar roles within enterprise software, preferably in security or systems integration. Proven experience managing strategic and enterprise-level customers with measurable success. Strong understanding of networksecurity, governance, audit, risk, and compliance practices. Customer-first … mindset, highly proactive, and comfortable with client-facing engagements (calls/visits). Excellent consulting, project management, and data-driven decision-making skills. Solid knowledge of security tech (firewalls, IDS/IPS, SDN, compliance) and APIs (Java, REST). Familiarity with infrastructure, cloud (public/private/hybrid), and networking (LAN/WAN). Resilient and adaptable in dynamic More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
CACI Limited
You will play a pivotal role in designing, implementing, and overseeing advanced cloud infrastructure solutions for mission-critical systems. In this role, you will use your deep knowledge of security architecture on cloud platforms to provide technical leadership and strategic direction in building scalable, secure, and resilient cloud-native systems based on AWS, Kubernetes, Kafka, microservices, Java, and event … cloud-based systems and solutions, utilising AWS and modern architectural patterns such as microservices, event-driven architectures, and serverless computing to meet both current and future business needs. • Cloud Security: Develop and implement robust security architectures for cloud solutions, ensuring data protection, regulatory compliance, and alignment with industry best practices (e.g., AWS IAM, encryption, VPC, security monitoring … with a focus on Java-based backend services. • Technical Leadership: Provide technical leadership and mentorship to architecture and development teams, guiding them through complex technical challenges and architectural decisions. • Security & Compliance: Ensure that cloud architectures are compliant with industry regulations (e.g., GDPR, HIPAA) and company security policies, and implement security controls across the infrastructure. • CI/CD More ❯
Functions. Monitor system health and performance using tools like Prometheus, Grafana, or Datadog or NewRelic. Collaborate closely with development teams to automate builds, performance tests, and deployments. Ensure system security, compliance, and best practices are followed in deployment pipelines. Ensure networksecurity with VCN across deployments and infrastructure for public and private access control. Troubleshoot infrastructure and … version control (e.g., Git). Preferred qualifications: Certifications (e.g., OCI Certified, Certified DevOps Engineer). Experience with service mesh, Helm, or advanced Kubernetes features. Understanding of networking, firewalls, and security best practices. Exposure to agile and DevOps cultures and methodologies. Design, implement, and maintain container orchestration systems such as Kubernetes or ECS. Experience with container orchestration i.e, Kubernetes or More ❯
vendors. Coordinate plans for SCADA hardware and software changes and enhancements with other stakeholders. Develop necessary policies, procedures and methodologies to support and maintain SCADA infrastructure, including adequate OT networksecurity for SCADA systems. Ensure that SCADA infrastructure is adequately documented. Ensure internal process documentation is adequate. Develop, update and assure conformance to documentation standards required by policy. … technical experience is required.) A minimum of seven years of experience with SCADA systems. A minimum of three years of direct people management experience. Advanced technical knowledge of SCADA, network and telecommunication technologies, and a thorough understanding of enterprise OT environments including hardware configurations, energy management systems, and disaster recovery practices. Knowledge of SCADA, utility and information technology terms More ❯