large engineering projects, supporting multiple sponsors, and contributing to advanced security concepts in classified environments. Key Responsibilities: Develop, implement, and oversee classified information system security programs. Ensure compliance with Risk Management Framework (RMF) policies, including System Security Plans (SSPs), RiskAssessment Reports, and Security Controls Traceability Matrix (SCTM). Maintain operational security posture, conduct vulnerability assessments, and … support Assessment & Authorization (A&A) activities. Mentor junior ISSOs and collaborate with engineers and stakeholders to enhance cybersecurity processes and policies. Lead efforts to improve cybersecurity risk posture, respond to Cyber Operational Readiness Assessments, and develop strategic plans. Provide subject matter expertise on cybersecurity concerns and protection of advanced technologies. Basic Qualifications: Active Top Secret security clearance. Minimum More ❯
development of high level security compliant architecture and contribution to the design of the preliminary and detailed designs of the solution: it includes the study of alternatives and a riskassessment Consult on potential security components architectures (e.g. SIEM, IAM, gateways, detection and deception capabilities ) Evaluate architectures against Business Line policy and major cyber security standards & regulation frameworks … a specific user community, taking into account their existing knowledge and training needs based upon the required learning outcomes. Collaborate/interact with cyber suppliers/vendors for technical assessment of cyber products in order to select a suitable one PROFILE: Ideally you have graduated in Engineering or Computer Science or hold relevant industry certifications (CISSP, Cisco, CCP, etc … You are proficient with Infrastructure Security Design, Security Supervision Design, and Information Systems Security (ISS) You can advise and give support to the rest of the team Familiar with Risk Analysis, Network Security, Cryptography, Identity & Access Management (software/hardware development, the NIST Cybersecurity Framework, cloud technologies) Able to monitor and measure risk as well as compliance You More ❯
and deployment of hardware. Assist in performing Quality Assurance ( QA ) analyses to ensure hardware systems being acquired by the USG can be produced by controlled manufacturing processes at manageable risk to cost, schedule, or user satisfaction. Assists in conducting special studies and analyzing broad QA issues common to all USG acquisition programs, including: discrete investigations of particular issues using … fully integrated, manufactured, sustained, configuration managed and operationally safe, suitable and effective throughout their life cycle Apply OSS&E and a irworthiness processes, as well as assist in providing risk assessments, safety analysis and recommendations, and addressing high priority safety issues Apply knowledge of systems engineering in support of system definition, development, integration, verification methods, sustainment, risk modeling … efforts, interoperability requirements, and airworthiness certification across a wide range of hardware and software systems, including ground based systems Systems Safety Engineer Accomplish system safety engineering tasks to include riskassessment and s ystem s afety p rogram for the assigned program(s) to ensure all systems procured are safe to operate and maintain. Review and assist with More ❯
and adaptable solutions. Support AI model lifecycle management, including selection, training, testing, evaluation, deployment, and sustainment, while integrating robust network, infrastructure, and data security practices. Contribute to system design, riskassessment, and continuous improvement across the full development lifecycle, ensuring alignment with mission objectives and operational requirements. Greystones Group is a fast-growing woman-owned small business supporting … and adaptable solutions. Support AI model lifecycle management, including selection, training, testing, evaluation, deployment, and sustainment, while integrating robust network, infrastructure, and data security practices. Contribute to system design, riskassessment, and continuous improvement across the full development lifecycle, ensuring alignment with mission objectives and operational requirements. Hybrid schedule at Wright-Patterson Air Force Base in Dayton, Ohio … and model continuous integration and continuous deployment (CI/CD). Provide expertise to prepare requirements and specifications through testing. Evaluate results, support developmental test and evaluation to reduce risk throughout the operational test and evaluation to operate the actual or simulated environment by typical users, of a system under realistic operational conditions. Qualifications: Bachelors Degree in Computer Science More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Proactive.IT Appointments Limited
proactive and organised IT Change Analyst on a permanent basis. This is a remote role with occasional travel to site. The ideal candidate will bring experience in Release Management , RiskAssessment , and Change Coordination , along with excellent communication and stakeholder management skills. This is a great opportunity to join a collaborative and forward-thinking IT team where soft … initiatives across IT and business functions Release Management - Plan, execute, and coordinate software/infrastructure releases Stakeholder Engagement - Maintain clear and consistent communication with technical teams and business stakeholders Risk Management - Identify potential risks and develop mitigation strategies to ensure successful delivery Collaboration - Work closely with cross-functional teams across IT and the wider organisation Experience & Skills Required: Proven More ❯
the information system and performs day-to-day security operations of the system. Evaluate security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/riskassessment analysis to support certification and accreditation. Provide configuration management (CM) for information system security software, hardware, and firmware. Manage changes to system and assesses the security impact … of those changes. Prepare and review documentation to include System Security Plans (SSPs), RiskAssessment Reports, Certification and Accreditation (C&A) packages, and System Requirements Traceability Matrices (SRTMs). Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF). You'd like to do this: Provide support to More ❯
supportable, and effective systems are delivered to the customer. Responsibilities: Assist program managers in developing program documentation, creating program schedules, tracking program status, evaluating operational and technical alternatives, performing riskassessment, and managing integrated product teams. Advise in the interpretation and tailoring of DoD acquisition regulations/memorandums, and ensure affordable, supportable, and effective systems are delivered to … and Baseline exemption Requests (BERs). Provide program managers with assistance in developing program and acquisition documentation, creating program schedules, tracking program status, evaluating operational and technical alternatives, performing riskassessment and managing integrated product teams (e.g. Test and Evaluation Master Plan (TEMP), Initial Capabilities Document (ICD), Capabilities Development Document (CDD), Capabilities Production Document (CPD), Analysis of Alternatives More ❯
/subject involved to include new sampling and analytical procedures; Assist with facilitating formal quality-related reviews; Conducts quality assurance assessments via on site and desk review processes; Establishes riskassessment methodologies and oversees the riskassessment process; Establishes methodologies to track incoming work and throughput and prepares briefing material to show any changes in inputs More ❯
to ensure solution integrity, alignment with business objectives, and delivery milestones are met. This role demands deep knowledge of Microsoft technologies, cloud services, network infrastructure, and strong capability in riskassessment and mitigation related to data security and system architecture. Key Responsibilities: Design and implement scalable, secure cloud-based IT architectures across hybrid environments. Validate and deploy enterprise … Collaborate with stakeholders across the Alliance to ensure alignment of IT strategy and delivery. Assess new technologies for integration potential and business value within the Sizewell C programme. Oversee risk identification and mitigation in relation to IT infrastructure and data security. Drive continuous improvement in IT processes, documentation, and governance compliance. Maintain clear communication channels between IT and business … expertise in designing and deploying Microsoft-centric enterprise architectures. Strong knowledge of cloud platforms (Azure preferred) and hybrid infrastructure design. In-depth understanding of IT security standards, compliance, and risk management frameworks. Experience leading complex IT projects within multi-stakeholder environments or joint ventures. Excellent problem-solving skills with ability to influence technical decisions and strategic planning. Ability to More ❯
installation, configuration, administration, support, and maintenance of networks, including associated hardware and cloud resources. Update to new technologies, tuning performance, and prioritizing the implementation of critical system patches. Performs riskassessment, risk mitigation analysis, vendor trade studies, and appropriate documentation to ensure network services are available according to established Service Level Agreements (SLA). Ensures continuity of More ❯
all our services and solutions. We strive to instill an appreciation for security in everyone. You work in a committed team focused on all aspects of Cyber Defense, including riskassessment of IT architectures, security design evaluations, and integration of various security products. You research new cyber trends, write white papers, and provide thought leadership. You combine technical … at KPMG. You are an active listener, translating customer needs into valuable design recommendations. Skills & Qualifications: You have 3+ years of professional experience in the Cyber Defense field, Cyber Risk Management, and architectural security design. You are open and honest about your successes and failures, recognizing that learning is an essential part of the job. You have an entrepreneurial More ❯
their work to ensure quality and accuracy. Develop detailed reports on penetration test results, vulnerabilities, attack paths, and recommended remediations, and present findings to clients with expert guidance on risk mitigation strategies. Stay informed on emerging cybersecurity threats, vulnerabilities, and attack methods while researching and developing new methodologies and tools to enhance penetration testing capabilities. Work with cybersecurity teams … techniques for penetration testing. Strong leadership skills with a passion for mentoring junior team members. Excellent communication and presentation skills. In-depth knowledge of cybersecurity technologies, best practices, and riskassessment methodologies. Proven ability to think critically and strategically to identify vulnerabilities and risks. Benefits: Career development program Certification sponsorship Remote working Salary More ❯
TSCM tactics, techniques, and procedures Ensure all personnel assigned to the TSCM mission are trained in accordance with National standards for the conduct of TSCM operations Prepare specialized technical riskassessment products, TSCM reports of inquiry, after action reports, tailored briefings, and other administrative communication necessary to support the CI mission Assist Certified TEMPEST Technical Authority (CTTA) with … technical security plans, policy and execution; assess electronic processing equipment for security vulnerabilities Prepare specialized technical riskassessment products, TSCM reports of inquiry, AAR, tailored briefings and administrative communication necessary to support construction project Have telephone security experience (i.e. with Telephone Security Group (TSG) requirements) Participate in one equipment specific training and one cyber security training each calendar More ❯
Sensing. The role involves ensuring compliance with cybersecurity and information assurance (IA) requirements. The candidate will work collaboratively with cross-functional teams to implement and maintain cybersecurity measures, conduct risk assessments, and ensure adherence to DoD and Army cybersecurity standards. The ideal candidate will have 5+ years of experience in the field, strong knowledge of Army cybersecurity policies, and … Army cybersecurity regulations, including DoD Directive 8140.01, DoDM 8140.03, and AR 25-2. Maintain certifications required for the role and ensure all systems meet IA compliance standards. Conduct risk assessments to identify vulnerabilities and implement mitigation strategies. Develop and maintain cybersecurity plans, policies, and procedures. Design, implement, and monitor security measures for information systems. Ensure systems are protected … degree in Computer Science , Information Technology, Cybersecurity, or a related field. Experience with DoD and Army cybersecurity standards and practices. Strong knowledge of cybersecurity frameworks and tools. Proficiency in riskassessment, vulnerability management, and incident response. Excellent communication and collaboration skills. Must meet certification requirements for the role. Relevant certifications may include CISSP, CISM, CEH, Security+, or equivalent. More ❯
subcontracting policies and procedures are being implemented. Responsibilities Interface with subcontractors, SBU, and subsidiary operations Aid with any new request for quotation (RFQ) activities, review RFP/RFQ for riskassessment, the Subcontract Agreements, Consulting Agreements, Modifications, Teaming Agreements, and Non-Disclosure Agreements. Negotiate prices, terms, schedules, and other provisions of service purchase orders and acquisition contracts. Evaluate … and facilitate negotiations for terms and conditions for purchases in a timely manner. Provide interpretation, guidance, and riskassessment to management on matters of a contractual nature. Ensure compliance with internal subcontracting policies. Assist in the preparation of proposals to the customer. Research and resolve subcontract issues, disputes, and terms/conditions, etc. Prepare and process service purchase More ❯
compliance with industry standards and company policies. - Documentation: Create and maintain comprehensive validation documentation, including validation plans, protocols, and reports in accordance with SOP-1705 and other relevant SOPs. - RiskAssessment: Perform risk assessments to identify potential validation issues and develop mitigation strategies. - Testing: Lead and participate in the execution of CSV testing activities, including installation qualification More ❯
FUNCTIONS Assist in collecting, organizing, and trending aviation safety data for performance analysis. Support preparation of Aviation Safety Documents (ASDs) and Aviation Safety Reviews (ASRs). Participate in pre-assessment planning and post-assessment documentation. Track and document corrective actions in collaboration with federal ASO. Maintain hazard logs, safety metrics dashboards, and reporting schedules. Prepare drafts of safety … staff, program offices and field elements. MINIMUM QUALIFICATIONS Bachelor's degree in safety, aviation management, or a related field. 2-4 years of relevant experience in aviation, safety, or riskassessment roles. Ability to obtain Federal Aviation Administration certifications awarded from accredited civilian aviation programs Familiarity with FAA/DOE aviation regulations and safety protocols. Proficient in Microsoft More ❯
Retford, Nottinghamshire, East Midlands, United Kingdom
pib Group
Technical Product Manager PIB Risk Management have an excellent opportunity for a Technical Product Manager within the Head Office based in Retford, for our online health, safety and risk management platform that can reduce third party organisations complexity and cost of managing health and safety. xCenta is an exiting software platform integrating with third party organisations and covers … area from RiskAssessment, Incidence Reporting, e-Learning, Staff management, Task & Diary Organisation to Audit & Inspections. Responsibilities of the Technical Product Manager: To maintain the smooth running of the xCenta System on a day-to-day basis from a technical perspective To ensure systems and procedures are maintained and to contribute to the development of new products, systems More ❯
knowledge of foreign adversaries' intelligence capabilities including cyber/technical, information operations, and HUMINT Understanding of offensive and defensive counter-intelligence methods Familiarity with the concepts involved in CI risk analysis including insider threat detection Knowledge of and experience in the fundamentals of intelligence operations to include riskassessment BA/BS Degree or equivalent years of More ❯
is developed, maintained, reviewed, and updated on a continuous basis Provide liaison support between the system owner and other IS security personnel. Conduct required IS vulnerability scans according to riskassessment parameters. Develop Plan of Action and Milestones (POAMs) in response to reported security vulnerabilities Manage the risks to ISs and other FBI assets by coordinating appropriate correction … system owner concurrence for correction or mitigation actions. Monitor security controls for FBI ISs to maintain security Authorized to Operate (ATO) Upload all security control evidence to the Governance, Risk, and Compliance (GRC) application to support security control implementation during the monitoring phase Ensure that changes to an FBI IS, its environment, and/or operational needs that may More ❯
Nexxis Solutions is supporting current and near-term efforts to provide information and system security engineering, life cycle solutions, system security testing, riskassessment, and continuous monitoring. We are looking for candidates to provide Cybersecurity expertise to systems and projects to ensure that the appropriate security features and safeguards are designed, integrated, and implemented for all information systems. … security tools to help mitigate security vulnerabilities and automate repeatable tasks Perform support and consulting of the company's personnel about security incidents and measures Prepare detailed reports including assessment-based findings, outcomes and propositions for further system security enhancement Degree Requirements: A B.S. in Cybersecurity, Information Technology, or a related field is required for most positions. A Master More ❯
and client requirements Work proactively to identify control gaps and weaknesses, determine root cause, and escalate and propose viable solutions to the risks and weaknesses identified, working to mitigate risk With the support of the Head of Compliance Monitoring, agree action plans with the business as a result of monitoring work and; follow up with the business to ensure … are adequately mitigated and closed in line with agreed action plans and for evidencing and recording rationale for closure. Highlight any delivery concerns Provide input into the annual Compliance RiskAssessment Process to inform the annual Compliance Monitoring Programme and actively keep compliance risks under review Make or assist with the delivery of relevant reporting and MI to … inform Management of the compliance risks and their status. This includes supporting the Head of Compliance with information for reports to Servaada's Risk and Compliance Committee, the Board and its clients as required Monitor regulatory developments and maintain an up-to-date knowledge of current issues and future trends and their likely impact on the company's riskMore ❯
performance metrics, identifies trends, and recommends improvements. Primary Responsibilities: Ensure compliance with all applicable OSHA, EPA, and other federal, state, and local safety and environmental regulations. Coordinate and conduct risk assessments, job hazard analyses (JHAs), and site safety/environmental audits. Develop, implement, and deliver EHS training programs covering topics such as safety procedures, environmental compliance, hazardous materials, and … with 10-13 years of relevant experience. In-depth knowledge of occupational health and safety regulations (e.g., OSHA, ANSI, NIOSH) and industry best practices. Demonstrated experience in hazard analysis, riskassessment, and accident investigation. Proven ability to develop and implement safety standards, preventive actions, and safety assurance plans across complex industrial or technical environments. Expertise in industrial safety … CIH) Certified Hazardous Materials Manager (CHMM) Professional Engineer (P.E.) in a relevant safety discipline Experience designing and integrating safety devices, engineering controls, or protective equipment in industrial or high-risk environments. Background in toxicology, radiation safety, or hazardous material management. Familiarity with enterprise-level EHS software platforms or safety data management systems. Experience advising on or developing organizational safety More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
documentation and work with other test organizations to integrate T&E programs. The key responsibilities of this role include assisting with test planning and execution, conducting performance analysis and riskassessment, and developing and applying modeling and simulation for T&E. Additionally, the Test Engineer analyzes performance data and estimates confidence and performance, plans and executes data collection … possess technical skills such as knowledge of government test and evaluation concepts, engineering, acquisition, and operations activities, modeling and simulation, data analysis and management, test planning and execution, and riskassessment and mitigation. Overall, the Test Engineer plays a critical role in ensuring the success of Offensive Cyber Missions. Why Join Us: Your Health, Your Wealth, Your Life More ❯
performance metrics, identifies trends, and recommends improvements. Primary Responsibilities: Ensure compliance with all applicable OSHA, EPA, and other federal, state, and local safety and environmental regulations. Coordinate and conduct risk assessments, job hazard analyses (JHAs), and site safety/environmental audits. Develop, implement, and deliver EHS training programs covering topics such as safety procedures, environmental compliance, hazardous materials, and … with 10-13 years of relevant experience. In-depth knowledge of occupational health and safety regulations (e.g., OSHA, ANSI, NIOSH) and industry best practices. Demonstrated experience in hazard analysis, riskassessment, and accident investigation. Proven ability to develop and implement safety standards, preventive actions, and safety assurance plans across complex industrial or technical environments. Expertise in industrial safety … CIH) Certified Hazardous Materials Manager (CHMM) Professional Engineer (P.E.) in a relevant safety discipline Experience designing and integrating safety devices, engineering controls, or protective equipment in industrial or high-risk environments. Background in toxicology, radiation safety, or hazardous material management. Familiarity with enterprise-level EHS software platforms or safety data management systems. Experience advising on or developing organizational safety More ❯