Position Title: All Source Threat Analyst Position Type: Full-time (on-site) Position Location: Chantilly, VA Clearance: TS/SCI, Poly Preferred Responsibilities: • Implement riskmanagement programs for our federal clients by utilizing NIST, RMF, and FISMA compliance frameworks. • Enhance cyber awareness with clients and project teams. • Work alongside federal clients to help them mitigate risk with … edit the formula to use different cells to retrieve data. • Ability to provide a generic cybercrime briefing using a premade PowerPoint presentation. • Ability to brief strategic products to executive management • Ability to work independently with little to no guidance. • The position requires you to independently research topics to create strategic products and inform policymakers on upcoming threats within the More ❯
Billericay, England, United Kingdom Hybrid / WFH Options
Hallmark Luxury Care Homes
Identify and address project issues, escalating them as necessary to ensure resolution. Facilitate communication between project teams, clients, and stakeholders. Assist in preparing reports, presentations, and project documentation. Support riskmanagement processes and help mitigate potential project risks. Track project budgets and expenditures, ensuring adherence to financial plans. Organise meetings, prepare agendas, and document meeting minutes. Work with … Manage small scale projects and workstreams as needed from start to finish, ensuring compliance with scope, time, and cost parameters. Qualifications and Skills: Desirable bachelor’s degree in Project Management, business administration or a related field. Previous experience in Project Co-ordination or related roles. Strong organisational and multitasking skills with attention to detail. Excellent communication and interpersonal skills. … Proficiency in project management tools such as DevOps, Smartsheet, MS Project, MS Office apps. Ability to work collaboratively with cross-functional teams. Problem-solving mindset with the ability to work under pressure and meet deadlines. Knowledge of project management methodologies such as Agile or Waterfall is desirable. Preferred Qualifications: Project Management Professional (PMP) certification or similar credentials. More ❯
Evaluate and recommend new security tools and technologies to enhance security operations. Documentation: Create and maintain detailed documentation of security incidents, forensic analysis, and vulnerability assessments. Prepare reports for management and stakeholders. Collaboration: Work closely with other IT and Digital teams to ensure comprehensive security coverage. Provide security guidance to projects and programs as required. Work closely with developers … Network Security: Strong understanding of network protocols, VPNs, and network security architecture. Incident Response: Ability to detect, analyse, and respond to security incidents, including forensics and malware analysis. Vulnerability Management: Experience in identifying, assessing, and mitigating vulnerabilities in systems and applications. Automation: Skills in scripting and automation for security tasks (e.g. Python, PowerShell). Information Security Frameworks: Working knowledge … of common frameworks and standards, such as ISO 27001/2/5, NIST800-53, and Cyber Essentials. RiskManagement and Compliance: Thorough understanding of Information Security RiskManagement and Compliance frameworks, including ability to assess information risks and select appropriate controls. Data Protection: Understanding of data protection concepts and regulations, such as PII and GDPR. More ❯
About This Role The Senior Auditor role at Ace Hardware is crucial for evaluating and improving the effectiveness of our organization's riskmanagement, control, and governance processes. This position involves performing timely, quality financial and operational audits across all corporate departments, manufacturing facilities, distribution centers, subsidiaries, and service lines of business. Reporting to the Audit Business Manager … updates to the Manager. Develop and enhance positive relationships with audit clients by understanding overall business risks and participating in non-audit related company activities. Develop team-oriented project management and leadership skills, consistently suggesting improvements to the audit process. Who You Are You are passionate about riskmanagement and have a keen eye for detail. You … years of experience in Internal Audit, Accounting, Finance, or Business. Experience in documenting and evaluating operational and financial controls, particularly in distribution or manufacturing. Proven experience in developing full, risk-based Audit Reports. Excellent written and oral communication and presentation skills. Strong project management skills. Experience with ERP systems (e.g., SAP) and basic technological applications (e.g., Microsoft Office More ❯
+ years of experience; or a minimum of ten (10)+ years with a Master's degree. Certified PMI PMP or PgMP Current active Secret clearance required Program Management experience managing multi-discipline teams including engineering, manufacturing, supply chain, quality, and contracts. Skilled managing program work to schedule and budget and a track record of meeting contractual requirements Desired … Skills Active Top Secret/SCI security clearance Experience with Earned Value Management (EVM) Ability to generate proposals, cost estimates and support negotiations Experience managing the installation of equipment in geographic, dispersed environment and provide technical support. Responsibilities: Performs agile project management activities including planning, execution, tracking and reporting. Coordinate internal resources and third parties/vendors for … a detailed project plan to monitor and track progress, manage changes to the project scope, project schedule, and project costs using appropriate verification techniques. Measure performance using appropriate project management tools and techniques and report and escalate to management as needed. Manage the relationship with the client and relevant stakeholders and perform riskmanagement to minimize More ❯
posture, and actively safeguard the systems that make critical projects a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring, and continuous improvement of cybersecurity controls in accordance with the RiskManagement Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetration testing, and security audits … NIST SP 800-171, CMMC 2.0, DFARS , and other applicable cybersecurity standards. •Develop and maintain security documentation, including SSPs and incident response plans. Technical Operations •Support account provisioning, patch management, secure configurations, and network monitoring. •Evaluate and recommend security solutions that meet DoD and federal requirements for processing classified information. •Participate in security authorization activities, including Risk Assessment More ❯
Soldier Survivability (SSV), which is located at Ft. Belvoir, VA and Huntsville, AL. The support required under this effort includes engineering, quality assurance and test support, acquisition support, business management support, logistics and fielding support, operations support, and administrative support. The specific task areas include program management, analysis, planning, studies, liaison, and operations support, strategic communications, engineering and … and Product Manager Soldier Protective Equipment (PdM SPE) are subordinate Product Offices in PM SSV. Contingent upon contract award Responsibilities Duties include, but are not limited to: Executes acquisition management across an entire product line Coordinates products and taskings across the acquisition process and life cycle phases Prepares, configures and staffs all Milestone documentation Assists with determining contracting strategy … manage transition of products from PM to DLA or Army Sustainment Develop and draft Acquisition Strategies, Acquisition Plans and other acquisition documents Leads tasks supporting pre award contracts, financial management, riskmanagement, total ownership cost determination, and contract coordination Coordinates contracting actions with local procurement contracting officers Performs acquisition strategy requirements Contingent upon contract award Qualifications Citizenship More ❯
Kendal, Cumbria, North West, United Kingdom Hybrid / WFH Options
Des Scanlan IT Recruitment Ltd
infrastructure technologies and controls, including but not limited to the following services: networking, servers, telephony, firewalls, storage, backup and recovery, operating systems, business continuity planning, cybersecurity defences, security incident management, audit and compliance. Driving change projects and delivering new and enhanced IT capabilities that add value to the organisation. Providing guidance to the organisation on any necessary regulations, compliance … requirements and best practice in relation to cybersecurity, infrastructure and enterprise risk management. Proactively assist the organisational defence against cybersecurity threats by regularly monitoring new potential attack vectors and providing resolutions and riskmanagement to the business. Manage requests (e.g. incidents, problems, user requests, change requests) through the appropriate tools, documentation and procedures within the IT Dept … cloud deployment, Microsoft365, Exchange Online Administration, A good understanding of industry standards and cybersecurity, e.g. including but not limited to ISO9001, ISO027001, Cyber Essentials and ITIL. Understanding of project management principles. Excellent coordination skills. Ongoing technical skills developments and certification where required. As a team member, how you go about your job and your soft skills are just as More ❯
computer systems Reviews program plans for specific weapons systems, sub-systems, and equipment or information technology systems Prepares technical data for inclusion in integrated logistics support plans Provides data management for specific weapons and/or equipment technical data during production, fleet introduction and operations Requirements BS or BA degree in a Computer or Information Science field or a … analysis and developing strategies that leverage EW EMS Architecture in support of balance spectrum repurposing across Naval, DoD, Cyber, and IC stakeholders Understanding of cyber security specifications such as RiskManagement Framework (RMF), STIGs and other government security specifications and guidelines Knowledge of cyber security technology and trends Proficient in Atlassian toolset to include Confluence and JIRA Ability More ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … meet eligibility requirements, including U.S. Citizenship, for access to classified information; ACTIVE SECRET Clearance is REQUIRED Education: 2+ Years of Experience with a Bachelor's Degree in Information Technology, RiskManagement, Cybersecurity preferred 6+ Years of Experience with an Associate's Degree in Information Technology, RiskManagement, Cybersecurity preferred 8+ Years of Experience with a High … Access Control System desired. CASP certification, or CISSP certification. Certification\Experience in AMAG Access Control System desired. Certification\Experience in BOSCH BVMS desired. Microsoft SQL Server Query writing and management experience desired. Experience troubleshooting and maintaining Microsoft Server (2012, 2016) desired. Installation and configuration of operating system software (i.e. Win10/Win Server 2016) experience desired. Experience programming/ More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Lorien
a pivotal role that bridges strategic oversight and technical leadership, ensuring the smooth operation of the architecture team and acting as the first point of contact for escalations, workload management, and architectural guidance. While this role does not include direct line management, you will act as a technical lead and intermediary , helping to coordinate efforts across the team … environments , with a solid grasp of sprint planning and delivery. Comfortable working across cloud platforms , especially AWS (expert-level knowledge not required). Familiarity with security assurance , compliance, and risk management. Excellent communication and stakeholder management skills. Able to lead by influence, not authority, and support a high-performing team culture. Technical Skills Cloud Platforms: AWS (primary), GCP More ❯
driving cross-functional collaboration, developing strategic roadmaps, and executing complex programs in highly regulated environments. This position is based in Herndon, Virginia. You will join a cadre of program management and technical professionals in pursuing new and overseeing existing US Government contract requirements, and aligning to current and upcoming National Security programs. As a Principal Program Manager, you will … spend the majority of your time partnering with business leaders and government executives engaged in furthering AWS' National Security program portfolio. The role requires subject matter expertise, technical program management, and technical business development experience to incorporate technical requirements into commercial transactions and effectively structure, facilitate, and close deals, and manage operational program activities in accordance with existing contract … performance criteria. You will draw upon extensive information technology-centric project management, critical thinking, and analytic problem-solving skills coupled with business development and executive communication skills within the US Intelligence Community or US Department of Defense communities. This role requires a proactive, mission-driven leader who can operate in a dynamic and highly sensitive environment while driving technical More ❯
be performing offensive-like vulnerability assessments against network systems and IT infrastructure. You will identify weaknesses and recommend mitigation steps. You will draft assessment reports for review by senior management to implement your recommendations. You will be digging into hard problems by performing assessments on novel network devices, unique networks and hard targets. You will need to use a … analysis or digital computer forensics experience is a plus. • Cyber related Law Enforcement or Counterintelligence experience. • Existing Subject Matter Expert of Advanced Persistent Threats and Emerging Threats. • Understanding of risk planning and mitigation strategies. • Ability to prepare and present documents and briefing materials. • Understanding of networking and networking components. • Understanding the security implementation and setup for both system and … technology from device turn on to power off, network functions (SMS, MMS, Voice, Data) and cellular system functions. • Understanding of wireless and RF technology. • Understanding and experience in conducting risk analysis, riskmanagement, infosec, system testing and client structures. TECHNOLOGIES USED: Operating Systems: • Microsoft Windows (7 - 10, Server ) • UNIX (Solaris, HP-UX, etc.,) Operating System versions • Common More ❯
POC and provide supervision and guidance for all Contractor personnel assigned to this effort. The Program Manager must have excellent verbal and written communication skills and experience briefing upper management and/or upper echelons of military chains of command. The Program Manager will be able to demonstrate an understanding of the MSC C4 systems requirements in relation to … familiar with Military instructions and standards as they pertain to operation of shipboard C4 systems and deployment of both hardware and software. Knowledge, Skills, and Abilities (KSAs): Active Project Management Professional (PMP) Certification Required B.S. in engineering, math and/or science MS. Degree from an institution accredited by an organization recognized by the Council for Higher Education Accreditation … CHEA) Required, or equivalent work experience in direct support of DOD system engineering including IT systems project management A Master of Science in an Engineering, Math or Computer Science discipline is sufficient provided applicable work experience is also referenced Information Technology Information Library Certified (ITIL) Broad experience base managing and fielding large multi-million-dollar, world-wide projects, preferably More ❯
POC and provide supervision and guidance for all Contractor personnel assigned to this effort. The Program Manager must have excellent verbal and written communication skills and experience briefing upper management and/or upper echelons of military chains of command. The Program Manager will be able to demonstrate an understanding of the MSC C4 systems requirements in relation to … familiar with Military instructions and standards as they pertain to operation of shipboard C4 systems and deployment of both hardware and software. Knowledge, Skills, and Abilities (KSAs): Active Project Management Professional (PMP) Certification Required B.S. in engineering, math and/or science MS. Degree from an institution accredited by an organization recognized by the Council for Higher Education Accreditation … CHEA) Required, or equivalent work experience in direct support of DOD system engineering including IT systems project management A Master of Science in an Engineering, Math or Computer Science discipline is sufficient provided applicable work experience is also referenced Information Technology Information Library Certified (ITIL) Broad experience base managing and fielding large multi-million-dollar, world-wide projects, preferably More ❯
ability to support authorization activities across complex environments. The Cloud Solutions Architect will interface with both engineering teams and cloud service providers to ensure that cloud solutions are resilient, risk-informed, and aligned with evolving federal security standards. Key Responsibilities • Lead Technical Exchange Meetings (TEMs) with cloud providers to evaluate cloud architectures and ensure alignment with mission requirements. • Maintain … Oracle Cloud, or IBM Cloud. • Evaluate and advise on cross-domain technology solutions and common security architecture designs. • Consult project teams and leadership on system architecture, security postures, and risk mitigation. • Lead and support continuous monitoring operations, including scan analysis using tools like Rapid7, Nessus, and Qualys. • Track and manage Plan of Action and Milestone (POA&M) items to … support remediation efforts and risk reduction. • Use tools such as Xacta 360, Risk Vision, or RSA Archer to monitor A&A activities and maintain compliance. • Leverage knowledge of the Common Control Provider model under the NIST RiskManagement Framework (RMF). • Support preparation of A&A packages and collaboration with Security Control Assessors (SCAs). • Conduct More ❯
collaboration and partnering with our customers to ensure mission success. Our expert solutions encompass an array of game-changing technologies, including state-of-the-art sonar, radar, expendables, signature management, and naval power systems. Join us in shaping the future of naval warfare and together, we will safeguard the seas and empower navies worldwide! Flexible Working At Ultra Maritime … primary customer contact. Successfully manage a portfolio of similar or related projects for a business stream achieving customer requirements along with meeting the business goals of schedule, budget, deliveries, riskmanagement and winning new/follow on business. Monitor project performance against plan, cost and delivery, and identify appropriate corrective actions by conducting periodic cost, schedule, performance and … risk reviews. Prioritise, identify and obtain the required resources, including facilities, tools and personnel to achieve successful project execution. Supply accurate cost and schedule information in the preparation of bids and reports. Provide effective leadership, manage all customer interfaces, and communicate effectively to Senior Management, team members and peers to establish a common understanding of Project Scope and More ❯
contract security requirements and drive them from start to finish. Embody our culture and values . Qualifications Required/Minimum Qualifications: Master's Degree in Statistics, Mathematics, Computer Science, RiskManagement, Cyber Security, or related field AND 3+ years experience in software development lifecycle, large scale computing, threat modeling, cyber security, or anomaly detection OR Bachelor's Degree … in Statistics, Mathematics, Computer Science, RiskManagement, Cyber Security, or related field AND 4+ years experience in software development lifecycle, large scale computing, threat modeling, cyber security, or anomaly detection OR equivalent experience. Other Requirements: Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. … by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government Clearance Preferred/Additional Qualifications: Management level and working level knowledge of Government Systems. Demonstrated leadership in the technological services practice as well as negotiation skills and effectiveness at a large scale effort Security Assurance More ❯
source, Internet of Things (IOT), cyber tools, and social media. We bring expertise with the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and the RiskManagement Framework (RMF) to maintain secure, scalable, and highly available systems to meet the mission. Our goal is to provide expert services to our clients while cultivating knowledge … Washington DC (Remote options not available. 100% on-site) Description: Responsible for cybersecurity policies and processes required to manage risks to customer systems and networks. Develop and maintain cyber riskmanagement and compliance automation solutions (i.e., Xacta). Develop and maintain cybersecurity policies and processes required to manage risks to customer systems and networks. Demonstrated expert knowledge and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Gordons
our Manchester office, you will gain hands on experience with our Information Security team and exposure to our wider IT teams. You will build knowledge in the following areas: RiskManagement, Policy and Compliance, Security Certifications,Supplier Due Diligence, Incident Response and Awareness, and Security Awareness, as well as working on ongoing projects. WHAT IS THE SCOPE OF … of the expectations and responsibilities of the Information Security Graduate: Assist with incidents and requests that are assigned to Information Security within ServiceNow. Learning how to conduct Information Security risk assessments within the Surecloud GRC tool. Assist in managing the requirements for the firm to comply with ISO/IEC 27001 Policies and Standards and Cyber Essentials Plus. Assisting … reliable information systems within the Firm. Participate in, and act as a security representative in, the Change Advisory Board and the Design Authority Board to carry out information systems risk assessments including those associated with the development of new or significantly enhanced business applications. Participates in security incidents. Participate in allocated projects that involve information security aspects. Assist with More ❯
is critical to ensuring the Navy has what it needs to achieve mission success. We are seeking qualified candidates to provide expert Integrated Logistics Support (ILS) and lifecycle sustainment management for programs in the sustainment phase of the acquisition lifecycle. Your efforts will directly support the readiness, reliability, and operational effectiveness of vital Navy systems and platforms. Must have … and update tactics, techniques, and procedures (TTPs) to mitigate TSS Cybersecurity risks. Manage compliance and cybersecurity configuration in accordance with NIST SP 800-128 Guide for Security-Focused Configuration Management of Information Systems (August 2011). Support system scanning and patching activities to maintain security posture. Design and implement cybersecurity architectures, including the Defense-in-Depth Functional Implementation Architecture … DFIA). Apply the RiskManagement Framework (RMF) throughout the system lifecycle. Support Cybersecurity Safety (CYBERSAFE) implementation for mission-critical systems. Perform Systems Security Engineering (SSE) to integrate security into system design and operations. Qualifications Required: Active DoD Secret Security Clearance Experience developing budgets and operating plans for programs (program spend plans) Logistics analysis and support experience with More ❯
LexisNexis Risk Solutions is the essential partner in the assessment of risk. Within our Business Services vertical, we offer a multitude of solutions focused on helping businesses of all sizes drive higher revenue growth, maximize operational efficiencies, and improve customer experience. Our solutions help our customers solve difficult problems in the areas of Anti-Money Laundering/Counter Terrorist … Financing, Identity Authentication & Verification, Fraud and Credit Risk mitigation and Customer Data Management. You can learn more about LexisNexis Risk at the link below, About the Team Y ou'll be joining the BDAP (Business Data Analytics Platform) team, a core part of our enterprise data modernisation strategy at LexisNexis Risk Solutions. This role sits within the … teams, demonstrating exceptional communication skills. Proficiency in documenting complex technical requirements and dependencies. Experience with data analytics platforms (preferably BDAP or similar cloud-based solutions). Demonstrated ability in riskmanagement, knowledge retention strategies, and technical support continuity. Familiarity with cloud-based data analytics solutions and platforms. Previous experience in developing self-service reporting solutions. Experience in business More ❯
expand client relationships. Engage in practice development initiatives working with the rest of the Digital M&A team to improve existing propositions, methodologies and processes. Lead project and pipeline management including tracking of leads, opportunities, commercials, contracting, and invoicing. How this opportunity is different We are seeking to expand our Digital M&A team with technology consultants who will … skills to develop and deliver impactful reports. Excellent analytical skills and financial competence to understand business performance and to translate into meaningful insights for the client. Knowledge of cybersecurity riskmanagement frameworks, methodologies and technical risk assessments is highly desirable. How we support our colleagues In addition to our comprehensive benefits package, we encourage an inclusive workforce. More ❯
known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying RiskManagement Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark … Five (05) years of experience with Defense in Depth Principals/technology (including access control, authorization, identification and authentication, public key infrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, riskMore ❯
and executing programs Assists the government in performing systems integration activities Assists in leading AoA, CoA, Trade Studies and Engineering Assessments Assists the government in strategic technical planning, project management, performance engineering, riskmanagement and interface design Provides expert advice to the government in the areas of relating vision, strategy, plans, needs, requirements and process and capability … and existing capabilities strategic planning and technology insertion Demonstrated ability to establish effective relationships with senior level customers Demonstrated ability to develop and present effective technical presentations to senior management; must possess strong written and verbal communication skills Detail oriented, with proven time management and organization skills Strong analytical and problem-solving skills Desired Qualifications: Advanced degree in … Engineering or related STEM degree program Experience with CAP/SAP architecture, NSG/ASG and MP enterprises Experience in the field of geospatial intelligence, to include Structured Observation Management (SOM), Activity Based Intelligence (ABI) and Object Based Production (OBP) Experience in systems definition and development oversight or cloud technology engineering and migration Experience engineering solutions using structured and More ❯