computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include … and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks throughout the program life cycle. Contributes to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Reviews certification and accreditation (C&A) documentation, providing feedback on completeness and compliance of its … to : system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
security vulnerabilities and threats through automation and proactive monitoring. Define and enforce security policies and best practices for cloud usage across the organization. Conduct regular security assessments, audits, and riskanalysis on cloud-based systems. Collaborate with DevOps to integrate security into CI/CD pipelines (DevSecOps). Manage identity and access controls (IAM) to enforce least privilege … principles. Respond to security incidents and lead root cause analysis for cloud-related security breaches. Stay current with the latest cloud security trends, threats, and technologies. Required Qualifications Bachelors degree in Computer Science, Cybersecurity, or a related field (or equivalent experience). 3+ years of experience in cybersecurity with at least 2 years focused on cloud security. Hands-on More ❯
Risk Management Framework (RMF), NMAP, PKI, Wireshark, auditing, penetration testing, scripting, IASAE, CISSP, ISSEP, NISCAP Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph Bachelor's degree in Computer … Five (05) years of experience with Defense in Depth Principals/technology including access control, authorization, identification and authentication, public key infrastructure, network and enterprise security architecture and applying risk assessment methodology to system development. Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience. Must have experience applying Risk Management Framework. … Certification. Computer Information Systems Security Professional CISSP Certification. Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, riskanalysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design, and More ❯
applications and dashboards. • Develop Security Test Procedure (STP), conducts self-assessments to verify compliance with required configuration guidance and support A&A testing and validation of security designs. • Conducting riskanalysis reviewing ACAS, CVEs, plugins, CWEs, research, collaborate with System Administrators to mitigate identified vulnerabilities and/or author Plans of Actions and Milestones (PO&AM) as needed. … reporting to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC) • Support security authorization activities in compliance with the customer Information System Certification and Accreditation Process following the NIST Risk Management Framework (RMF), CNSSI No 1243 and other prescribed business processes for security engineering. • Assist architects and systems developers in the identification and implementation of appropriate information security functionality … to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
Offered: Full-time, Permanent, Onsite working. Working Hours/Shifts: 40 hours per week, Monday to Friday. What does this role involve? This role is responsible for network security analysis, monitoring and incident response, as well as maintenance and configuration of network security tools. Security Analysts will work with the latest technologies to detect, analyse, and limit intrusions and … in a fast-paced environment. Demonstrable Experience in implementing security in cloud platforms (M365, Defender/Endpoint/Identity, Conditional Access, etc). An understanding of approaches of: ISMS, riskanalysis, the CIA triad, attack vectors including social engineering. Strong understanding of Cyber Security controls and Security concepts. Cyber/Cloud Security certification (e.g. AZ-500, SC More ❯
and requirements, such as: Working with AWS Cloud Infrastructure team to secure our cloud infrastructure Working with the development team in embedding security in the SDLC Provide assistance in risk management activities Support security-related incidents Support our log monitoring operations Take part in threat modelling sessions Support the teams in riskanalysis of technical vulnerabilities Support More ❯
ongoing threat detection and response. Integrate Security in SDLC: Collaborate with product and engineering teams to integrate security into every stage of the software development lifecycle. Threat Modeling and RiskAnalysis: Perform structured threat modeling using frameworks such as STRIDE and PASTA to proactively mitigate security risks. Champion Developer Education: Promote secure development practices by educating engineers on More ❯
London, England, United Kingdom Hybrid / WFH Options
Freetrade
ongoing threat detection and response. Integrate Security in SDLC: Collaborate with product and engineering teams to integrate security into every stage of the software development lifecycle. Threat Modeling and RiskAnalysis: Perform structured threat modeling using frameworks such as STRIDE and PASTA to proactively mitigate security risks. Champion Developer Education: Promote secure development practices by educating engineers on More ❯
performance strategy and ensuring best practices Participate actively in functional, system and regression testing activities Capture quality assurance data and metrics to provide insights and conclusions Estimate and perform riskanalysis for quality delivery Should contribute in programming using Python/C#/Java or Tosca Design and develop the automated tests using automation tools using Pyraft/ More ❯
ensure the secure use of cloud services • Define and maintaine the cloud security processes as part of the cloud operating model and support both cloud governance topics and cloud risk management • Carry out security assessments, protection requirements and risk analyzes of cloud platforms • Create individual concepts to improve the security level and create decision templates for risk treatment (in particular definition of measures to reduce risk) • Engage with a new cloud technologies and participate in their secure implementation • Participate in the development of DevSecOps concepts and work closely with other IT teams • Ensure compliance with industry standards and regulations. Qualifications: • Bachelor's degree in Information Systems or Computer Science and/or equivalent combination of … cloud platforms. • Hands-on experience with cloud security tools and technologies such as AWS Security Hub, Azure Security Center, or Google Cloud Security Command Center. • Experience conducting security assessments, risk analyses, and developing security concepts. • In-depth understanding of cloud computing concepts and architectures (IaaS, PaaS, SaaS). • Proficiency in implementing and managing cloud security controls, including identity and More ❯
Fareham, England, United Kingdom Hybrid / WFH Options
Leidos
to a solution architect and Chief Engineer for developing and delivering the relevant elements of the solution, whilst understanding the whole. You will have a complete understanding of cyber risk and treatment approaches. Based on a strong ability to communicate risk and its proportionate management, you will know how this issue is addressed both in traditional ‘on-premise … cloud environments. You will be required to develop high- and low-level security architecture designs for systems intended for secure/sensitive environments, with appropriate security based on detailed risk analysis. What does Leidos need from me? Due to the sensitive nature of the work, sole British National and DV clearance are a must, along with significant experience in … producing security bid artefacts (such as security responses to PQQ/ITN questions, creation of Project Security Management Plan, System Security Architecture Design, Through Life Security Management Plan, Cyber Risk Assessments) Experience of network and boundary protection technologies (firewalls, mail gateways, load balancers, anti-virus), including cross domain technologies. Experience of authentication and authorisation technologies (SAML, LDAP, PKI, etc More ❯
Whiteley, England, United Kingdom Hybrid / WFH Options
00139 LEIDOS INNOVATIONS UK LTD
to a solution architect and Chief Engineer for developing and delivering the relevant elements of the solution, whilst understanding the whole. You will have a complete understanding of cyber risk and treatment approaches. Based on a strong ability to communicate risk and its proportionate management, you will know how this issue is addressed both in traditional ‘on-premise … cloud environments. You will be required to develop high- and low-level security architecture designs for systems intended for secure/sensitive environments, with appropriate security based on detailed risk analysis. What does Leidos need from me? Due to the sensitive nature of the work, sole British National and DV clearance are a must, along with significant experience in … producing security bid artefacts (such as security responses to PQQ/ITN questions, creation of Project Security Management Plan, System Security Architecture Design, Through Life Security Management Plan, Cyber Risk Assessments) Experience of network and boundary protection technologies (firewalls, mail gateways, load balancers, anti-virus), including cross domain technologies. Experience of authentication and authorisation technologies (SAML, LDAP, PKI, etc More ❯
employees' religious practices and beliefs, as well as mental health or physical disability needs. Visit our FAQs for more information about requesting an accommodation. Job Description As a Technology Risk and Controls Lead in our Corporate and Investment Banking division, you will play a crucial role in identifying and managing data-related risks whilst ensuring alignment to our strategic … objectives. You will utilize your expertise in risk management, data protection, and data management to effectively communicate complex technical information to senior management and support global stakeholders in understanding and executing their data related risk and controls obligations. Your ability to influence and collaborate across all organizational levels will be essential in driving our data risk management … regulatory engagements, you will ensure our compliance with industry standards and regulations. You will identify, assess, and monitor risks while ensuring effective cyber and technology controls. Your contributions to risk identification, control evaluation, and governance will be vital in enhancing the firm's data risk posture. Through your technical aptitude, customer first mindset, organizational and analytical skills, you More ❯
assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include … implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, riskanalysis, risk management, certification and awareness activities for system and networking operations. Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its … content. Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering. The Level 2 Information Systems Security Engineer shall possess the following capabilities: • Participate as the primary security More ❯
Systems Engineer 4 Job Responsibilities: Provide technical direction for the development, engineering, integration, interfacing, and testing of complex hardware and software systems. Perform requirements elicitation, detailed analysis, and functional allocation. Conduct comprehensive systems requirements reviews. Develop concepts of operation, interface standards, and detailed system architectures. Perform technical and non-technical assessments and management activities, including end-to-end flow … Department of Defense Architecture Framework (DoDAF) standards. Provide subject matter expertise and leadership for Cyber Mission Management and Cyber System Development initiatives. Oversee integration of systems such as Signal Analysis Knowledge Base (SAKB) into broader community systems, ensuring compliance with information assurance and cybersecurity standards. Collaborate within Integrated Product Teams (IPTs) and Configuration Control Boards to review interface control … acquisition lifecycle. Required Experience: Minimum 10 years of relevant professional experience; preference for candidates with 20+ years in Cyber and Systems Engineering. Proven experience developing and deploying Cybersecurity and Risk Management strategies within DoD and DHS frameworks. Extensive knowledge and practical application of Risk Management Framework (RMF) procedures. Demonstrated history in supporting major government cybersecurity initiatives, including DHS More ❯
Research Analysts, Senior to join our team. This role requires a dynamic professional who understands Air Force supply chain processes, including retail and wholesale supply, and excels in data analysis, database management, and system support. The ideal candidate will provide critical support to government functional managers, oversee key program management tools, and contribute to process improvements for mission success. … Duties/Responsibilities Logistics and Supply Chain Management Oversee wholesale and retail inventory management Analyze and optimize Air Force supply chain processes Support budget forecasting and financial analysis for supply chain programs Implement process improvements for the Suspended Assets Program System Support and Data Management Maintain and update Microsoft Access databases for logistics tracking Develop and execute system data … for D035 Stock Control System Support system change management and integration for CSWS DE program Extract, analyze, and report on supply chain data from legacy systems Audit, Compliance, and Risk Management Conduct riskanalysis and compliance audits for supply chain operations Support Financial Improvement and Audit Remediation (FIAR) compliance Monitor, validate, and report on Government Furnished Property More ❯
of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. • Validate and verify system security requirements definitions, analysis, and establish system security designs • Validate proposed software, hardware, firmware, and infrastructure comply with security guidelines, policies, and procedures • Apply knowledge of IA policy, procedures, and workforce structure to … control concepts (e. g. SE Linux extensions to RHEL, PitBull, and Windows), Oracle/MS SQL database security, and Apache/IIS Web server security. • Support security planning, assessment, riskanalysis, and risk management. • Identify overall security requirements for the proper handling of Government data. • Contribute to the security planning, assessment, riskanalysis, risk … following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication, and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control); and security More ❯
for this role will be responsible for IT Governance activities to include portfolio management, investment management, capital planning, change management, program management, organizational development, strategic planning, enterprise architecture, business analysis, and performance management tasks. It is desirable that the candidate possess the following skills and attributes: Job Duties: • Conduct qualitative and quantitative research to support work assignments for meeting … related field or technical discipline is desired or equivalent combination of education and work experience • Minimum 15 years of experience in program management/consulting, which should include business analysis, investment management, and other relevant experience • Secret security clearance required Preferred Qualifications: • A Project Management Professional (PMP) and/or PMI Professional in Business Analysis (PMI-BPA) credential … in an operational environment the principles of the nine primary knowledge areas and the five process groups defined by the Project Management Body of Knowledge • Experience in Organizational Development analysis to support As-is and To-be models with recommendations to improve the organizations efficiencies and effectiveness in full utilization of resources and delivering quality products to the customer More ❯
Associates have collaborated with our consultancy division to help in their search for an Information Security GRC Manager. You will work towards refining the entire GRC programme - frameworks, audits, risk assessments, stakeholder communication - across a regulated environment. You'll also work with vendors and internal teams to ensure compliance and strong governance. Key Responsibilities: Build and refine information security … governance and risk frameworks Lead audits (internal/external) and drive compliance (ISO 27001, GDPR, NIST) Own vendor risk, supplier assurance, and contract governance Communicate risks and policies across the business Support KPI development and risk strategy planning Requirements: Degree in Computer Science/IT or relevant industry certifications such as CISA, CRISC, CISMP, ISO 27001 Lead … legal/security needs in housing association sector and its regulatory environment Solid grasp of ISO 27001, NIST, GDPR, and PCI-DSS Proven experience in GRC leadership Skilled in riskanalysis, audit reporting, and policy writing Excellent stakeholder management and communication skills Understanding of cloud security and Microsoft tools If you are interested, please apply immediately as first More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and … analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Build Cybersecurity into systems deployed to operational environments. Assist architects and systems developers in the identification and More ❯
training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration … Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and … analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements. Build Cybersecurity into systems deployed to operational environments. Assist architects and systems developers in the identification and More ❯
london, south east england, united kingdom Hybrid / WFH Options
bp
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bp's Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bps Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python , SQL … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bps Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python , SQL … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯
to the following: Manage, optimize and maintain ownership of core credit reporting processes, documentation and tools with the aim to deliver timely, accurate and insightful data to senior management, risk management, regulators, treasury, accounting teams. Contribute to the development of current and new Credit MI, metrics, dashboards and decision tools in order to gain accurate and timely insight into … bps Credit Risk drivers. Develop strong understanding of bp Credit Risk frameworks, quantitative approach, and risk metrics as well as acquire strong commercial awareness. Support various technology and systems initiatives, including automation, data integrity and data integration. Create, implement, and support credit risk quantitative models leveraging mathematical and computer science methods and tools including Python , SQL … verbal and written, to understand data needs and communicate report results. Remain up to date with the latest technology, techniques and methods. Stay curious and enthusiastic about exploring new risk modelling concepts, algorithms and data exploration methods to solve problems and enthuse others to see the benefit of your work. Essential Experience & Job Requirements Prior experience in financial riskMore ❯