Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
are seeking Cybersecurity Software Evaluators to assess and analyze the security of software applications used in high-security government environments. This role involves conducting cyber evaluations, security testing, and risk assessments on software applications to ensure compliance with Department of Defense (DoD) cybersecurity standards. This position is initially for a few months with the potential for long-term employment … experience in cybersecurity, penetration testing, or software security evaluation. • Certifications such as CISSP, CEH, OSCP, or GIAC GWEB are highly preferred. • Experience with secure coding practices and software vulnerability assessment tools (e.g., Nessus, Burp Suite, Fortify, SonarQube). • Familiarity with secure software development lifecycle (SSDLC) methodologies. • Strong knowledge of encryption protocols, authentication mechanisms, and network security. • Ability to work … security teams to enhance software security postures. Preferred Qualifications: • Experience conducting cybersecurity assessments in DoD or government environments. • Understanding of container security and DevSecOps principles. • Familiarity with threat modeling, riskassessment frameworks, and security controls testing. • Knowledge of cloud security best practices (AWS, Azure, GovCloud). Work Environment & Requirements: • Location: Colorado Springs, CO - On-site presence required. • Potential More ❯
and tailor the security control baseline with applicable overlays. Assist with development, maintenance, and tracking of the SP. Lead the security control implementation and testing efforts. Perform vulnerability-level riskassessment on the POA&M/RISKAssessment Worksheet. Assist with any security testing required as part of A&A or annual reviews. Assist in the … desktop/workstations, dedicated and virtual servers, Microsoft Active Directory. Self-motivated and the ability to multi-task and balance multiple goals and priorities. Must be familiar with DoD Risk Management Framework (RMF) policies, standards, procedures and have relevant experience with associated tools (e.g., eMASS, XACTA 360, Assured Compliance Assessment Solution (ACAS), Anchore, DISA Security Technical Implementation Guides More ❯
City of London, London, United Kingdom Hybrid / WFH Options
fs talent
for someone who thrives in fast-paced, international environments and is passionate about keeping financial services ethical, transparent, and accountable. 🔍 What You’ll Do Design and deliver a global, risk-based compliance monitoring programme aligned with our regulatory obligations Conduct thematic reviews , identify gaps or weaknesses, and recommend practical improvements Maintain a dynamic monitoring plan and compliance riskassessment that reflects the firm’s risk appetite Prepare reports for senior management highlighting key findings, risk trends, and remediation status Manage and mentor a team of compliance professionals, ensuring consistency and quality in review work Work closely with local compliance teams, marketing, internal audit, and risk functions to drive compliance culture Track and assess More ❯
for someone who thrives in fast-paced, international environments and is passionate about keeping financial services ethical, transparent, and accountable. 🔍 What You’ll Do Design and deliver a global, risk-based compliance monitoring programme aligned with our regulatory obligations Conduct thematic reviews , identify gaps or weaknesses, and recommend practical improvements Maintain a dynamic monitoring plan and compliance riskassessment that reflects the firm’s risk appetite Prepare reports for senior management highlighting key findings, risk trends, and remediation status Manage and mentor a team of compliance professionals, ensuring consistency and quality in review work Work closely with local compliance teams, marketing, internal audit, and risk functions to drive compliance culture Track and assess More ❯
Role is based in Farnborough - 1/2 days on site per week For more details please call me on or email WHAT WILL THE SECURITY ARCHITECT BE DOING? Risk Management within a Defence and Security Sector; Security/Cyber architectures are proportionate to the GSC of the systems; Security architectures are delivered in conjunction with other IT Architects … of a serious criminal record, a right to work and live in UK and, preferably, a record of 5 years' UK residency), SKILLS andamp; EXPERIENCE DESIRED: Able to perform Risk management using industry approved methodologies (such as NIST 800-53). Identification of suitable risk management activities (technical, physical, or procedural) to treat/mitigate the identified risks … that merit consideration when conducting various activities in the field of cyber security; Creation of security documentation to support the development of a system, these could include: security Aspects, RiskAssessment, Risk Management, Security Policies, Security Test Plans/Results, Evaluation documents; Knowledge of JSP 604/453 and creation if assurance artefacts; and High standards in More ❯
consistent and repeatable project management processes while maintaining an effective balance between customer satisfaction and project results. This includes having an understanding of basic construction and electrical design principles, riskassessment, budget and schedule tracking and analysis. What You'll Be Doing: The PM is responsible for following a consistent and repeatable project management processes while maintaining an … effective balance between customer satisfaction and project results. This includes having an understanding of basic construction and electrical design principles, riskassessment, budget and schedule tracking and analysis. PM must maintain a professional demeanor, demonstrating excellent oral and written communication skills to resolve issues with all stakeholders. What Required Skills You'll Bring: Active Top Secret security clearance More ❯
the development and subsequent execution of strategic plans that align with threat intelligence and operational realities, ensuring assessments are comprehensive and based on real-world risks. Threat Intelligence and RiskAssessment Leverage threat intelligence to scope and prioritize projects, ensuring that assessments address true operational risks and are not limited by arbitrary system boundaries. Support risk-based … government customer critical systems, networks and infrastructure to uncover potential vulnerabilities that could impact missions. Maintain up-to-date knowledge of the threat landscape and integrate this information into assessment and response activities. Threat Hunting Oversight Support proactive threat hunting efforts to identify weaknesses and vulnerabilities to emerging threats on the government customer networks and systems. Recommend best practices … continuous improvement in threat detection, mitigation, and response capabilities. Promote cross-training between team members to maintain flexibility. Reporting and Communication Prepare detailed reports and briefings for stakeholders on assessment outcomes and security improvements. Translate technical findings into actionable recommendations that can be understood by both technical and non-technical audiences. Continuous Improvement and Innovation Promote continuous evaluation and More ❯
Sex Offender treatment at the Delaware Department of Corrections facilities. SEX OFFENDER TREATMENT PROGRAM CLINICIAN ESSENTIAL FUNCTIONS: Performs group therapy interventions and individual treatment planning for clients. Performs Sexual RiskAssessment Interviews and writes Sexual Risk and Needs Assessments. Completes Discharge Summaries for client's post-treatment participation. Assists in planning and implementing the goals and objectives … OFFENDER TREATMENT PROGRAM CLINICIAN PREFERRED EXPERIENCE: Experience providing clinical therapy to individuals who have engaged in sexual offending behavior or individuals who have experienced sexual harm. Experience with Sexual Risk Tools such as Static99r, STABLE-2007, and ISORA. Experience with implementing Cognitive Behavioral Therapy in a therapeutic setting. If preferred experience is not met, applicant must be licensed and More ❯
Sex Offender treatment at the Delaware Department of Corrections facilities. SEX OFFENDER TREATMENT PROGRAM CLINICIAN ESSENTIAL FUNCTIONS: Performs group therapy interventions and individual treatment planning for clients. Performs Sexual RiskAssessment Interviews and writes Sexual Risk and Needs Assessments. Completes Discharge Summaries for client's post-treatment participation. Assists in planning and implementing the goals and objectives … OFFENDER TREATMENT PROGRAM CLINICIAN PREFERRED EXPERIENCE: Experience providing clinical therapy to individuals who have engaged in sexual offending behavior or individuals who have experienced sexual harm. Experience with Sexual Risk Tools such as Static99r, STABLE-2007, and ISORA. Experience with implementing Cognitive Behavioral Therapy in a therapeutic setting. If preferred experience is not met, applicant must be licensed and More ❯
Old Down, Gloucestershire, United Kingdom Hybrid / WFH Options
Matchtech
a collaborative, high-impact environment - this is your chance to make a real difference. Key Responsibilities Define and embed security requirements throughout the product development lifecycle. Conduct threat modelling, risk assessments, and drive mitigation strategies. Advise on solution architecture, minimising security risks and ensuring compliance. Collaborate with cross-functional teams to implement security best practices. Support incident response and … MOD-specific guidelines (e.g. JSP, Def Stan 05-138/139). Familiarity with HMG security and assurance frameworks is a strong plus. Comfortable using threat modelling tools and riskassessment methodologies. Key Competencies: Excellent communicator - confident, clear, and influential. Proactive problem-solver with critical thinking skills. Organised, resilient, and delivery-focused. Strong team player and stakeholder engager. More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Morson Talent
and Azure networking principles. Certifications (Preferred) CISSP – Certified Information Systems Security Professional CCSP – Certified Cloud Security Professional CISM or SSCP – Highly desirable Bonus Skills & Knowledge Awareness of compliance and risk frameworks such as ISO 27001, NIST, and CIS Benchmarks. Ability to support threat modelling, cloud riskassessment, and incident response planning. Exposure to Infrastructure-as-Code (IaC More ❯
s suite of corporate tools to report/track mission systems security information including LatteArt, Xacta, SEAR, Biscotti, UAM, CYBORGBUNNY, etc. Experience preparing documentation for System Security Plans (SSPs), RiskAssessment Reports, System Requirements Traceability Matrices (SRTMs), and Certification and Accreditation packages Experience using Git Source Control System Position Desired Skills Experience with the Atlassian suite of tools More ❯
systems that support us in achieving excellent outcome KPI's. Boston Place also has a 5/5 inspection rating from the HFEA. Key Responsibilities: • Establishing and managing quality, risk and governance strategies within the clinic and its satellites • Maintaining the HFEA licence • Developing and monitoring the quality policy, quality objectives and quality indicators • Internal and external auditing, user … QMS Qualifications and Training: • Degree or equivalent post graduate diploma and/or experience • Recognised management qualification and/or healthcare experience • Using and managing Quality Management Systems and Risk Management processes and practice, including riskassessment and incident investigation • Conducting and preparing for audit • Experience in using QMS software • Document control experience • Proven competency in managing More ❯
to Line and Project Managers. Documentation: Complete and submit all required paperwork within SLA. Technical Tasks: Fault finding, installation of metalwork, fibre and cable pulling, copper termination, and testing. Risk Management & Safety: Manage RiskAssessment and Method Statement documentation, and maintain SHEQ standards. Skill Development: Develop fault diagnosis skills using OTDR and Ethernet/OSA testing. Vendor More ❯
and other collaborative efforts. Documentation & Compliance: Develop, update, and manage schedules, contract requirements, action items, meeting minutes, and presentation materials while ensuring adherence to national, DoD, and USSF policies. Risk Identification: Track mission hardware and software development, identify potential risks, and analyze technical and schedule concerns. Launch Campaign Support: Assist with launch preparation activities, including facility support, crew training … and readiness reviews. Program RiskAssessment: Evaluate ongoing and planned acquisition activities, identify risks, and provide recommendations for risk mitigation strategies. We're looking for a professional with the following qualifications: Minimum Qualifications: At least five years of space-related experience in program management, acquisition support, or engineering. Experience with orbital and suborbital space launch systems and More ❯
Fluent in English - both written and spoken Demonstrable experience as a Security Architect or similar role Strong knowledge of security standards, protocols, and best practices Experience with threat modelling, riskassessment, and incident response Familiarity with security tools (e.g., Snyk, OWASP ZAP) Excellent communication and collaboration skills Self-learner and ability to execute tasks without supervision Ability to … maintain the highest level of professionalism Activities Assess and design secure system architectures Define and enforce security policies and best practices Conduct threat modelling and risk assessments Collaborate with development teams to ensure secure coding practices Review and recommend security tools and technologies Respond to security incidents and perform root cause analysis Acquired Experiences and Demonstrable Skills Potential skills More ❯
obligation balance accuracy by providing written analysis of obligation balances on a 30-day cycle. At a minimum, the contractor shall analyze 45 obligations per month based on a riskassessment updated monthly based on prior month testing and a minimum of 200 once per quarter utilizing a statistically driven sample, or as otherwise agreed upon, to help … of aged obligations, and improving the accuracy of obligation balances. Maintain and update analytical tool in SharePoint or any software within CG IT enterprise that identifies and prioritizes high-risk obligations for CG-834 management review REQUIRED QUALIFICATIONS: Bachelor's degree in accounting or bachelor's degree with an active Certified Public Accounting (CPA) certification, and 7 years of More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
documentation and work with other test organizations to integrate T&E programs. The key responsibilities of this role include assisting with test planning and execution, conducting performance analysis and riskassessment, and developing and applying modeling and simulation for T&E. Additionally, the Test Engineer analyzes performance data and estimates confidence and performance, plans and executes data collection … possess technical skills such as knowledge of government test and evaluation concepts, engineering, acquisition, and operations activities, modeling and simulation, data analysis and management, test planning and execution, and riskassessment and mitigation. Overall, the Test Engineer plays a critical role in ensuring the success of Offensive Cyber Missions. Why Join Us: Your Health, Your Wealth, Your Life More ❯
On, Team-Customized, including SS&C University Extra Perks: Discounts on fitness clubs, travel and more! What You Will Get To Do: Develop and lead the delivery of a risk-based operational and IT audit plan and advisory engagements aligned with regulatory requirements and organizational risk priorities. Build trusted relationships with senior leadership to facilitate ongoing consultation, active … participation in key risk and compliance committees, and coordinated assurance activities with external parties. Actively contribute to the Global Internal Audit function, exercising initiative and independent judgment to enhance audit activities and outcomes. Assist in assessing the impact of new and changes in business on internal controls and evaluating impact to internal audit plan and control environment. Manage all … aspects of the audit lifecycle, including riskassessment, scoping, planning, and resource allocation and achievement of department quality and productivity targets. Work collaboratively with management to communicate audit observations and develop value added, realistic and achievable audit recommendations. Develop and mentor our Internal Audit professionals, fostering continuous improvement. Participate in the preparation and presentation of Audit Committee materials More ❯
Managing Safely certification. Relevant crane/service lift training or equivalent experience. Procedural Frameworks The role operates within a structured procedural environment, including but not limited to: Lifting Operations RiskAssessment Accident & Incident Reporting Emergency Response PUWER Compliance Working at Height Document Control CoSHH Assessment Contractor and Project Procurement Management of Change More ❯
and local authorities. Some of the multi-disciplinary services you'll work on will include civil engineering, highways design and earthworks strategies, utilities, energy planning and coordination, drainage, flood risk and SuDS, site appraisal, due diligence, and strategic planning advice. What's on offer Hybrid/Flexible working Enhanced training and development ICE mentoring programme Large global projects High … Being active on several varied multi-disciplinary project/client accounts at any given time. What you need to succeed Experience in highway design, drainage strategy and design, flood riskassessment and management, utility design and planning as well as a working knowledge of the Development Industry An appreciation of hydraulics, hydrology, geotechnics and building structures as well More ❯
address such gaps as identified by CT strategies. Research and analyze program requirements and issues, and provide analysis and advice on programs using a range of qualitative and quantitative assessment methods in order to improve program effectiveness management processes. Collect, compile, and organize data, as well as provide presentations of results/findings with the goal of refining or … Chair technical evaluation panels and/or take notes at review panel sessions. Assist with drafting and clearing program scope of work and other pre-award documents(action memo, riskassessment, risk register, monitoring plan, etc.). Support grants closeout by supporting GOR, GO, and FMO with the reconciliation process Maintain traceability of oversight through properly documented More ❯
the Iomart service desk portfolio. The role ensures that service impacting issues are effectively managed, root causes are identified and resolved, and changes are controlled and communicated with minimal risk to service quality. This role requires close collaboration with service desk teams, technical support groups, account management, and client stakeholders to drive service stability and continuous improvement. The successful … the problem register, ensuring problems are prioritized and progressed appropriately. Collaborate with technical teams to analyse incident trends and proactively identify potential service risks. Change Management Support the planning, riskassessment, and execution of changes within the managed cloud environment. Act as a gatekeeper in CAB (Change Advisory Board) meetings to ensure changes meet compliance and operational standards. More ❯
Operating Systems. Experience of working in production environments against SLAs. Not mandatory but need to understand/know the process of SLAs. E.g. Zero downtime procedure during data migration, RiskAssessment, support, troubleshooting. Demonstrated acumen for understanding applications, network environments and web technologies. Common security technologies and practices. Storage Platforms technologies (RAID, SAN, NAS, tape libraries). High More ❯