Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
ClearSky Logic
efficient approach to project delivery. Cultivate a Collaborative Culture: Foster an environment that embraces teamwork, innovation, and agility, inspiring and motivating team members to achieve outstanding results. Optimise Resource Management: Evaluate and strategically allocate resources across squads, considering skills, capacity, and project needs to maximise efficiency and project success. Engage Senior Stakeholders: Serve as a key point of contact … within a technology services or software development environment. Demonstrable experience in leading and developing high-performing delivery teams and fostering a positive team culture. Strong understanding of various project management methodologies, including Agile and Waterfall. Excellent communication, interpersonal, and stakeholder management skills, with the ability to build strong relationships at all levels. A strategic mindset with the ability … to translate business objectives into effective delivery strategies. Experience in managing budgets, resources, and project financials. A proactive and solutions-oriented approach to problem-solving and risk management. Familiarity with the Edinburgh and wider Scottish tech landscape is advantageous. Room to Grow: This is a pivotal leadership role within our expanding organisation, offering significant opportunities for professional growth and More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
architectures. Design and integrate IA/security systems across multi-enclave environments with varying classification levels. Collaborate with architects and developers to embed security functionality into system designs. Lead risk analysis, threat mitigation, and security planning throughout the system lifecycle. Review and provide feedback on Certification & Accreditation (C&A) documentation. Evaluate and test security solutions, software, and configurations to … for a bachelor's degree. DoD 8570 compliance with IASAE Level 3 is required. Both Information Systems Security Engineering Professional (ISSEP) and CISSP Certifications are required. Demonstrated expertise in: RiskManagement Framework (RMF) Security policy formulation and assessment Vulnerability testing and mitigation Security tools (e.g., Nessus, NMAP, Wireshark) Secure OS configurations and system hardening Strong communication skills and More ❯
for a future role, rest assured we will reach out once that role becomes available. Feel free to check back with our Careers site too ) Exciting Opportunity for a Risk Mitigation Maverick: (ISSO) Are you ready to embark on a thrilling journey into the realm of cutting-edge cyber solutions? Praxis Engineering invites you to join our dynamic team … Adherence to DoD 8570 compliance standards, showcasing your dedication to excellence. - A dynamic ability to collaborate seamlessly with clients and fellow project trailblazers. - Battle-hardened experience in security planning, risk assessment, risk analysis, and proactive risk management. - A knack for conjuring holistic system-level solutions that triumph over security challenges. - Prowess backed by a BS in fields … to solve complex problems. With over 50 contracts (Prime + SubK), Praxis brings together world class engineers with proven engineering best practices, domain expertise, commercial technologies and proven agile management approaches to create high value solutions aimed at helping our customers meet their most critical business and mission objectives. Praxis Engineering is a wholly owned subsidiary of General Dynamics More ❯
or IBM Cloud. • Evaluate and advise on cross-domain solutions and architecture compliance with Sponsor requirements. • Guide project teams on security posture and architecture enhancements. • Perform scan analysis and risk evaluation using tools like Nessus, Rapid7, and Qualys. • Track and resolve POA&M items to ensure ongoing compliance and system health. • Utilize compliance platforms such as Xacta 360, RSA … Cloud, IBM Cloud). • Hands-on experience working within a Sponsor or specific A&A process and managing A&A artifacts in Xacta 360. • Strong understanding of the NIST RiskManagement Framework (RMF) and common control provider concept. • Proven ability to assess security compliance and enforce regulatory requirements across complex systems. • Expertise in analyzing and remediating security vulnerabilities More ❯
active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned, Service-Disabled Veteran Owned Small Business with a specialization in technology and management consulting committed to solving intricate and sensitive technology issues facing corporations and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment … and support of key systems. With a proven track record in information security, project management, systems/network engineering, security riskmanagement, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our customers need for results that exceed expectations. CTP staff have worked closely with both government engineers and managementMore ❯
positive difference to the lives of our clients, customers, colleagues, shareholders, and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses, interactive investor (ii), Investments, and Adviser … driving data-driven decision-making and supporting innovation within the company to facilitate growth. The successful candidate will play a crucial role in ensuring the integrity, security, and effective management of an organisation's data assets. They will be responsible for developing and implementing data governance frameworks, policies, and procedures to ensure data quality and compliance with regulatory requirements. … and best practices. Additionally, they oversee data stewardship activities, conduct data audits, and provide guidance on data-related issues to support strategic decision-making and enhance the overall data management capability of Aberdeen Adviser. This opportunity is perfect for an ambitious data governance expert who wants to make their mark on the way our business operates, is comfortable with More ❯
IAT Level II or higher certification within 6 months of hire. Preferred Qualifications: • Understanding of federal Cyber Security Guidance such as NIST SP 800-37 - Guide for Applying the RiskManagement Framework (RMF) to Federal Information Systems and NIST 800-137 - Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations. • Ability to function in a fast … time. • Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. • The person in this position frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations. • Must be able to detect information on a computer screen. More ❯
Software Engineer develops, maintains, and enhances complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems) based upon documented requirements. Works individually or as part of a team. Reviews and tests software components for adherence to the design requirements and documents test results. … active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned, Service-Disabled Veteran Owned Small Business with a specialization in technology and management consulting committed to solving intricate and sensitive technology issues facing corporations and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment … and support of key systems. With a proven track record in information security, project management, systems/network engineering, security riskmanagement, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our customers need for results that exceed expectations. CTP staff have worked closely with both government engineers and managementMore ❯
as an IT Engineer in programs and contracts of similar scope, type and complexity is required. Bachelor's degree in System Engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is required. A Master's degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline may be … active Security Clearance with appropriate Polygraph. About us: Founded in 2007, Columbia Technology Partners is Woman-Owned, Service-Disabled Veteran Owned Small Business with a specialization in technology and management consulting committed to solving intricate and sensitive technology issues facing corporations and federal agencies. Since its inception, CTP has been instrumental in the technical design, engineering development, operational deployment … and support of key systems. With a proven track record in information security, project management, systems/network engineering, security riskmanagement, vulnerability assessments, and mobile security implementation; our employees have the experience, expertise, and innovative thinking our customers need for results that exceed expectations. CTP staff have worked closely with both government engineers and managementMore ❯
efficient approach to project delivery. Cultivate a Collaborative Culture: Foster an environment that embraces teamwork, innovation, and agility, inspiring and motivating team members to achieve outstanding results. Optimise Resource Management: Evaluate and strategically allocate resources across squads, considering skills, capacity, and project needs to maximise efficiency and project success. Engage Senior Stakeholders: Serve as a key point of contact … within a technology services or software development environment. Demonstrable experience in leading and developing high-performing delivery teams and fostering a positive team culture. Strong understanding of various project management methodologies, including Agile and Waterfall. Excellent communication, interpersonal, and stakeholder management skills, with the ability to build strong relationships at all levels. A strategic mindset with the ability … to translate business objectives into effective delivery strategies. Experience in managing budgets, resources, and project financials. A proactive and solutions-oriented approach to problem-solving and risk management. Familiarity with the Edinburgh and wider Scottish tech landscape is advantageous. Room to Grow: This is a pivotal leadership role within our expanding organisation, offering significant opportunities for professional growth and More ❯
and communications hardware/software in both lab and field environments. Cybersecurity and Compliance: Ensure all communication and network systems adhere to security protocols and compliance requirements, including DoD riskmanagement frameworks and cybersecurity standards. Troubleshoot and Maintain Systems: Perform ongoing maintenance, monitoring, and troubleshooting of communication systems and networks, ensuring the systems operate at optimal performance levels. … Document network configurations, processes, and performance metrics, and provide regular status reports to leadership and other stakeholders. Collaboration: Work with engineers and program managers to define communication requirements, interface management, and operational concepts for new and existing projects. Qualifications Required Qualifications: Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of More ❯
Reston, Virginia, United States Hybrid / WFH Options
CGI
Programming skills (Java, Groovy, JavaScript, Node.js, Python). DevOps concepts and related technologies such as containers and orchestration, in particular, Docker and Kubernetes. Designing and deploying Identity and Access Management systems. Required qualifications to be successful in this role: 3-5 years' experience with PingFederate and PingAccess including design, implementation, and integration in large-scale, complex environments.PingFederate and PingAccess … certifications 5+ years designing and deploying Identity and Access Management systems. Familiarity with Ping Identity's PingOne technologies such as PingOne for Customers, PingOne for Workforce, PingID, as well as their Davinci (Orchestration), Fraud Detection, RiskManagement, MFA, and Identity Verification capabilities. Experience with IAM concepts such as Role-Based Access Control (RBAC), Attribute-Based Access Control More ❯
assurance engagement teams across the GT network Review of data and evidence obtained in the field, including reviews for completeness, consistency and clarity. Evaluate cybersecurity risks and advise on risk mitigation activities. Engagement with compliance colleagues, Technology and Business leaders, including the delivery of reporting material and presentations. Tracking and coordination of follow up remediation cycles for those firms … the ability to initiate and lead conversations with senior stakeholders Ability to prioritise and manage a varying workload Experience - Desirable Experience with using GRC solutions as part of a riskmanagement programme. Understanding of cyber security best practices including knowledge of the general cyber threat landscape and common security controls architecture. Due to the global scope of the More ❯
emerging cybersecurity trends, IC, DOD, and NIST policies and guidelines. Develop and maintain critical program documentation that may include Corrective Action Plans, Plans of Action and Milestones (POA&Ms), RiskManagement Framework (RMF) materials, system ATO requests. Provide innovative recommendations for improving cyber network defense capabilities. Distribute and analyze trusted industry security advisories. Collaborate with cross-functional teams … related field; 4 years relevant experience with PhD or Juris Doctorate in related field; or High School Diploma or equivalent and 13 years relevant experience. Strong background in configuration management procedures and documentation. Demonstrated experience developing and maintaining Standard Operating Procedures (SOPs). Excellent analytical and communication skills. Active TS w/SCI Eligibility. Bonus points for Active TS More ❯
connectivity to USMC networks. Support travel to meet with the customer 1-2 times annually. Responsibilities: Collaboratively monitor and report the security posture for mission critical systems, including communicating risk and recommended mitigations. Collaborate with development, system administration, and test teams to maintain secure applications and environments. Perform RiskManagement Framework (RMF) tasking in support of system More ❯
IT security professional to join our team and provide specialized recommendations and security solutions to complex technical challenges. In this role, you will integrate IT security processes into a risk-driven, coordinated approach to ensure the protection of all data, systems, and enclaves as outlined in System Security Plans (SSPs). You will work closely with stakeholders to ensure … responsible for ensuring the appropriate operational security posture is maintained for information systems (IS) by continuously monitoring and assessing compliance with established security measures. Key responsibilities include: Security Posture Management: Regularly assess and monitor the security posture of information systems to ensure they meet established security measures and policies, identifying and addressing any potential gaps or vulnerabilities. Cybersecurity Engineering … risks and vulnerabilities stemming from within the organization. Reporting and Documentation: Develop and present clear hypotheses and conclusions from security assessments, producing comprehensive reports to support decision-making and risk management. Security Guidance Development: Create and update security guidance and recommendations for various IT domains, ensuring alignment with best practices, compliance standards, and organizational security requirements. Project Participation: Participate More ❯
analysis tools, and container security platforms. Identify potential security risks and vulnerabilities in applications, infrastructure, and processes, and work with relevant stakeholders to implement appropriate mitigations. Provide guidance on risk assessment, riskmanagement, and compliance with industry standards and regulations. Collaborate with cross-functional teams to share knowledge and promote continuous learning related to DevSecOps practices. Create More ❯
analysis tools, and container security platforms. Identify potential security risks and vulnerabilities in applications, infrastructure, and processes, and work with relevant stakeholders to implement appropriate mitigations. Provide guidance on risk assessment, riskmanagement, and compliance with industry standards and regulations. Collaborate with cross-functional teams to share knowledge and promote continuous learning related to DevSecOps practices. Create More ❯
Who Is Nisos? Nisos is the human riskmanagement company specializing in unmasking threats before they escalate. We are a trusted advisor who operates as an extension of security, intelligence, legal, and human resource teams to protect their people and business. Our intelligence-led solutions help enterprises make critical decisions, manage human risk, and drive real world More ❯
integration, and cybersecurity. Leverage tools such as GitLab, Jira, or Azure DevOps to support Agile workflows, CI/CD pipelines, and visibility into team activities. Assist with roadmap planning, riskmanagement, and cross-team coordination. Required Qualifications Bachelor's degree in Computer Science, Engineering, or a related technical field 10-15 years of progressive experience in Agile project More ❯
integration, and cybersecurity. -Leverage tools such as GitLab, Jira, or Azure DevOps to support Agile workflows, CI/CD pipelines, and visibility into team activities. -Assist with roadmap planning, riskmanagement, and cross-team coordination. Required Qualifications -Bachelor's degree in Computer Science, Engineering, or a related technical field -10-15 years of progressive experience in Agile project More ❯
efficiency Responsibilities: Serve as the subject matter expert providing testing expertise for complex to highly complex software/hardware applications within NMMES Direct and participate in all phases of riskmanagement assessments and software/hardware development, emphasizing user requirements analysis, test design, and test tools selection Ensure test design and documentation support all applicable client, agency, or More ❯
years of experience in cloud architecture and implementation experience - Integration of cloud services with on-premise technologies (i.e. Microsoft, IBM, Oracle, HP, SAP) and experience with IT compliance and riskmanagement requirements (eg. security, privacy, SOX, HIPAA etc. - 5+ years of cloud based solution (AWS or equivalent), system, network and operating system experience - Current, active US Government Security More ❯
guides/supports the development of verification efforts to ensure the cybersecurity protections/capabilities are functional, effective, and complete. A CSSE supports the definition of security governance, and risk management. As a Cyber Systems Engineer on this team, you will have the following responsibilities: Work within the Cybersecurity Engineering Group to provide technical decisions and guidance to enable … and related tools such as DOORS and Cameo Knowledge of Cyber Security Engineering practices, network technologies, DoD system development life cycles and methodologies, and insight into information technology infrastructure management/monitoring and applications Expertise with containerized software systems in accordance with DoD DevSecOps Reference Design Experience innovating in Cybersecurity Accreditation processes and procedures in a multi-certification (Cyber More ❯
guides/supports the development of verification efforts to ensure the cybersecurity protections/capabilities are functional, effective, and complete. A CSSE supports the definition of security governance, and risk management. As a Cyber Systems Engineer on this team, you will have the following responsibilities: Work within the Cybersecurity Engineering Group to provide technical decisions and guidance to enable … and related tools such as DOORS and Cameo Knowledge of Cyber Security Engineering practices, network technologies, DoD system development life cycles and methodologies, and insight into information technology infrastructure management/monitoring and applications Expertise with containerized software systems in accordance with DoD DevSecOps Reference Design Experience innovating in Cybersecurity Accreditation processes and procedures in a multi-certification (Cyber More ❯