We are looking for an Information Governance/SecurityAnalyst to support one of our NHS customers in the North West. Key Responsibilities: Essential Functions Establishment - Review Trust-wide populated BCPs to identify systems, suppliers, their function, criticality, and interdependencies. - Formalise the Trust Essential Functions Register, populating the NHSE DSPT Essential Function Template with supporting policies and procedures. … the central Data Agreement Register. - Review contracts for: - Cybersecurity clauses - Right to audit - Data protection clauses - Incident breach notification requirements - Details of sub-processors - Review contracts for technical and security risks. - Document supplier certifications and ensure records are in date. More ❯
Requisition Number: 25384 Required Travel: 0 - 10% Employment Type: Full Time/Hourly/Non-Exempt Anticipated Salary Range: $72,179.00 - $100,000.00 Security Clearance: TS/SCI Level of Experience: Mid This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR … advanced technologies in service of mission partners across the globe. Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest … you. To learn more about Mission Technologies, click here for a short video: Summary HII's Mission Technologies division is dedicated to delivering cutting-edge solutions that advance national security and defense objectives. This position is part of our Cyber and Intelligence division, which plays a critical role in supporting Enterprise-Level Security and Modernization efforts across IT More ❯
The SOC Analyst's primary function is to provide comprehensive Computer Network Defense and Response support through 247365 monitoring and analysis of potential threat activity targeting the enterprise. This position will conduct security event monitoring, advanced analytics and response activities in support of the government's mission. This position requires a solid understanding of cyber threats and information … security in the domains of TTP's, Threat Actors, Campaigns, and Observables. Additionally, this candidate must be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management. This position will support activities within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ … operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis. Experience and ability to with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes security event triage, incident investigation, implementing countermeasures, and conducting incident More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Lockheed Martin
all of your education and experience as well as the resources of Lockheed Martin to keep the threats at bay. The Work: We are in search of a Cybersecurity Analyst to join our Defense Group task force at the Colorado Springs, CO location. Shift hours would primary be 5:00 AM - 5:00 PM on a alternating Panama schedule. … As a valued member, you'll be on the front lines, defending Department of Defense networks from evolving cyber threats. You will be a key member of our 24x7 security operations team, responsible for: Analyzing real-time cyber threat intelligence to stay ahead of emerging threats. Correlating security events to identify and prioritize potential incidents. Conducting network traffic … or equivalent) within 180 days of hire. Strong foundation in networking, including packet analysis, common ports and protocols, and traffic flow. Knowledge of the OSI model, defense-in-depth security principles, and common security elements for effective threat detection, analysis, and mitigation as a SOC Security Analyst. Education and experience requirements: Bachelor's degree and 1+ years More ❯
Hatfield, Hertfordshire, South East, United Kingdom
Affinity Water Limited
Affinity Water has a exciting opportunity available to work in our Cyber Security Team as a Third Party Security Assurance Analyst. The Role: As aThird Party Security Assurance Analyst will be responsible for conducting third-party security risk assessments across the organization's portfolio of technology suppliers. This role requires extensive coordination with internal third … party resources as well as external suppliers to validate that necessary security and technology controls are in place and operationally solid. What you'll be doing: Conduct third-party security risk assessments and manage multiple assessments to completion within SLA. Review returned Due Diligence Questionnaires and create unique agendas for remote interviews based on controls that need further … assessment. Elevate issues, delays, obstacles as needed to keep the assessment lifecycle on track. Educate and build awareness of third-party security requirements. Special projects as assigned. Assist with testing releases of the third-party security assurance platform. What you'll need: At least 3 years of directly related Security Third Party Risk Management experience. Strong understanding More ❯
Job Number: R Cyber Security Engineering Analyst Key Role: Provide subject matter expertise in support of cybersecurity activities. Review and evaluate defensive measures and information collection from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. C ond uct policy … analysis, product assurance evaluations, and security posture presentations. Review and provide input to security engineering activities, implementing, deploying, maintaining, reviewing, and administering the infrastructure hardware and sof tware that are required to effectively manage the Computer Network Defense Service Provider ( CNDSP ) network and resources. Monitor the network to actively remediate unauthorized activities. Basic Qualifications: 3+ years of experience … with cyber security operations processes, procedures, guidelines, and solutions Experience with Transmission Control Protocol and Internet Protocol ( TCP/IP ) networking and core internet protocols, including User Datagram Protocol ( UDP ) , and Internet Control Message Protocol ( ICMP ) Experience with using Win dow s, UNIX, and Linux operating systems, networking, malware defenses, or perimeter controls Secret clearance HS diploma or GED More ❯
OS, networking, databases, and other IT Technologies required. Working knowledge of DevSecOps functionality a plus. Requirements DoD Secret clearance (Active) 5+ years of operational experience in vulnerability management or security engineering with a working knowledge of OS hardening/compliance/DISA STIGs. Position requires 8570 Certification (e.g. Security +, CISSP). Desired Skills: Working knowledge of ACAS. … Knowledge of PowerShell. Experience with MECM, Tanium, and MDE a plus Understanding of DISA STIGs and Information Assurance Vulnerability Management (IAVM) Program Working knowledge of Red Hat Advanced Cluster Security for Kubernetes (StackRox) and Splunk strongly desired. Strong critical thinking, communication, and organizational skills Collaborates with technical and compliance teams across the organization. Capable of performing trend and analysis … networks, and software including knowledge of OS authentication mechanisms, permissions, and a solid understanding of networking In-depth knowledge of network protocols, operating systems, and common vulnerabilities. Familiarity with security frameworks and standards (e.g., NIST, ISO 27001) Demonstrate broad security experience, which must include vulnerabilities, risks, and security mechanisms that are common in today's government systems More ❯
Senior Cyber Security Risk Analyst Reading - 4 days per week on site £70- £85,000 + bonus + benefits My client, a leading global manufacturer based in Berkshire are actively looking for Senior Cyber Security Risk Analyst to join their dynamic team. This role is an exciting opportunity to be a part of really helping to More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Sanderson Recruitment
Senior Cyber Security Risk Analyst Milton Keynes- 4 days per week on site £70- £85,000 + bonus + benefits My client, a leading global manufacturer based in Berkshire are actively looking for Senior Cyber Security Risk Analyst to join their dynamic team. This role is an exciting opportunity to be a part of really helping More ❯
Job Number: R Security Operations Analyst, Senior Key Role: Resp ond to and resolve cybersecurity incidents and proactively prevent reoccurrence of these incidents. Apply leading-edge principles, theories, and concepts. Contribute to the development of new principles and concepts. Work on unusually complex problems and provide highly innovative solutions. Operate with substantial latitude for unreviewed action or decision. … employees in company and technical competencies. Basic Qualifications: 8+ years of experience supporting Information Technology or Intelligence Operations Experience supporting a Computer Incident Response Team, Cyber Network Operations, or Security Operations Center ( SOC ) operations for a large and complex enterprise Experience with Intelligence Driven Defense, Cyber Kill Chain methodology, or MITRE ATT & CK framework Knowledge of industry-accepted standards … for incident response actions and best practices for SOC operations Knowledge of security operation tools, including SIMs or DCAP analysis Knowledge of int rus ion set tactics, techniques, and procedures Top Secret clearance Bachelor's degree Additional Qualifications: Experience with Micro sof t Sentinel Experience with Splunk TS/SCI clearance GIAC Continuous Monitoring ( GMON ) Certification GIAC Certified Incident More ❯
Job Number: R Security Operations Analyst, Mid Key Role: Resp ond to and resolve cybersecurity incidents, and proactively prevent the reoccurrence of these incidents. Apply leading-edge principles, theories, and concepts. Contribute to the development of new principles and concepts. Work on unusually complex problems and provide highly innovative solutions. Operate with substantial latitude for unreviewed action or … or supervise employees and technical competencies. Basic Qualifications: 5+ years of experience supporting Information Technology or Intelligence Operations Experience supporting a Computer Incident Response Team, Cyber Network Operations, or Security Operations Center ( SOC ) operations for a large and complex enterprise Experience with Intelligence Driven Defense, Cyber Kill Chain methodology, or MITRE ATT & CK framework Knowledge of industry-accepted standards … for incident response actions and best practices for SOC operations Knowledge of security operation tools, including SIMs or DCAP analysis Knowledge of int rus ion set tactics, techniques, and procedures Top Secret clearance Bachelor's degree Additional Qualifications: Experience with Micro sof t Sentinel Experience with Splunk TS/SCI clearance with a polygraph GIAC Continuous Monitoring ( GMON ) Certification More ❯
General Technical Targeting Analyst Chantilly, VA Clearance: Active TS/SCI w/Polygraph needed to apply Company Overview: Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone's Intelligence Sector provides solutions to the United States Government … our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks. Required Qualifications: Bachelor's degree (or equivalent) in Cybersecurity, Information Security, IT, Computer Engineering, Network Engineering, Computer Science, or Computer Forensics Demonstrated XX years experience in three or more specific areas to include: analysis, network engineering, networking security, technical … collection, penetration testing, red teaming, hardware engineering, software reverse engineering, and computer exploitation. Proven proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems (Windows, iOS, Android, or Linux), software reverse engineering, forensics, network analysis, vulnerability assessment or malware forensics. Demonstrated working knowledge of software development and some demonstrated proficiency in scripting More ❯
The Prospective Group (TPG) is searching for a Security Assistance Data Analyst to support the Office of Security Assistance (PM/SA) within the Bureau of Political-Military Affairs at the U.S. Department of State. This role provides analytical, technical, and administrative support to PM/SA's regional and Global Strategy & Oversight (GSO) Teams, focusing on … enhancing operational efficiency, budget formulation, and strategic decision-making across multiple security assistance accounts. Position Responsibilities: Develop and maintain dashboards, workflows, and reporting tools using Microsoft Excel, Lists, Power BI, and other Microsoft suite applications. Ensure data accuracy and streamline reporting processes to support Foreign Military Financing (FMF), International Military Education and Training (IMET), Peacekeeping Operations (PKO) (anticipated to … be renamed and re-scoped as the National Security Engagement Account (NSEA) starting in FY26)-and provides concurrence authority for the U.S. Department of Defense Title 10 programs. Provide actionable insights to inform program objectives and strategic planning. Collaborate with PM/SA staff, including Foreign Service Officers, Civil Servants, contractors, and military detailees, to identify data-driven solutions. More ❯
Description: Job Title: SOC Analyst L2 Location: Melbourne, FL. Pay Rate$45/hr on w2 Job Description: Must Have- BS/BA (or equivalent) degree in IT Security or related field, and 2-4years related experience ; or 4+years related experience with 2 years post-Secondary/AA-AS degree; or 8+ years related experience with no … of cyber-attack vectors (Buffer Overflow, Phishing, etc.) • Ability to obtain and maintain a FAA public trust clearance This is an operations center staff position that supports the Enterprise Security Operations Control Center (SOCC) L3Harris is searching for talented Information Systems Security professionals to join the L3Harris Security Operations Team as a Security Analyst. This is … a Level 2 Information Systems Security (ISS) position that is staffed in the Security Operations Control Center (SOCC). Essential Functions: • Responsible for cybersecurity threat intelligence data collection via open intelligence sources. • Organizes, documents, and collaborates discovered intelligence via information sharing platform. • Research threat actors, malware, attack vectors, and other threat information, collects indicators of compromise, documents and More ❯
Cyber Security Placement Programme - No Experience Required Are you looking to benefit from a new career in IT and Cybersecurity? Skills shortages in the IT sector are driving the need for qualified, entry-level career seekers and career changers. We help place graduates from this programme in top UK companies and organisations needing to employ entry-level IT and … Technician, with a starting salary of anywhere between £26K-35K. Ideally you will need to gain two years’ experience in this role before you can progress into a cyber security role. While working as an IT Technician, we will release your second batch of training which is specifically designed to qualify you to move into the cybersecurity field. This …/terms of business. Passionate about starting a career in IT? Apply now and one of our friendly advisors will be in touch. Keywords: IT Technician, IT Helpdesk, IT Security, IT Field Engineer, Cyber Security, IT Support, 1st Line Support, 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line More ❯
Overview Systems Planning and Analysis, Inc. (SPA) delivers high-impact, technical solutions to complex national security issues. With over 50 years of business expertise and consistent growth, we are known for continuous innovation for our government customers, in both the US and abroad. Our exceptionally talented team is highly collaborative in spirit and practice, producing Results that Matter . … Civilian, and international markets. JOID provides a diverse portfolio of analytical and programmatic capabilities to help our customers make informed decisions on their most challenging issues. The Industry and Security Analysis Group (ISAG) within JOID provides analytical, technical, and program support to promote, grow, and protect the defense industrial base (DIB). ISAG's support spans DOD, Federal Agencies … and International Partners to deliver critical decision support to national security leaders. Our team informs policy decisions, enables execution of comprehensive strategies and monitors and reports on the effectiveness of implementation, which enables senior leaders to execute strategies for developing and sustaining a robust industrial base. From policy to practice, we are a team of economic and national securityMore ❯
other tool reporting verification and high-level guidance) Vulnerability Management (VM) (Liaise and coordinate, regular validation and high level guidance) Coordinate "Blue Team" assessments to test an organization's security posture and ensure it is compliant with DoD and agency standards. Act as a cybersecurity liaison for customer or "subscriber" organizations, providing high-level guidance on security posture … and issues. Record all activities, findings, and guidance provided, and assist in preparing reports for leadership and other stakeholders. Prepare detailed reports on security threats, incidents, and risk mitigation for senior management and other stakeholders Virus/Malware Protection (Regular validation and high-level guidance) Information Operations Condition (INFOCON)/Cyber Protection Condition (CPCON) (Regular validation and high-level … product development Plan for and conduct annual internal CSSP ESM compliance assessments and participate on JFHQ DoDIN mandated and scheduled ESM assessments. REQUIRED QUALIFICATIONS Knowledge of DoD network architectures, security tools (e.g., SIEM, ACAS, firewalls) Strong verbal and written communication skills to articulate technical information and provide guidance to a variety of audiences 5-12 years of experience BA More ❯
DESCRIPTION: The candidates responsibilities will be to provide support to the operation: Validate system configuration used for testing Test any newly developed objects Support Security activities. Assist with Security analysis & administer Central Station tickets. Document Security procedures Troubleshoot Security issues Support Audits Validate system configuration used for testing BA/BS with 4-5 years experience … Strong comprehension of SAP Security concepts Ability to troubleshoot SAP authorization issues Collaborative skills Proactive in assisting team members Flexibility to work across multiple lines of business as well as geographies Excellent communication skills including engaging with technical and non-technical groups in finding solutions to issues Deep understanding and ability to comprehend complex business processes to apply best … practice security methodologies Strong time management skills Able to independently plan and prioritize multiple assignments to meet expectations of time and quality in a complex and fast-paced environment Skill Sets Niche Skill Experience Preference SAP No At least 1 year Is Required SAP Security No 2-5 Years Is Required We are an equal opportunity employer. All More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
The Security Culture Analyst is a pivotal role in fostering a culture of security awareness within HL. You will support the design and delivery of engagement strategies to effectively educate and empower our colleagues, leveraging data insights to improve our security risk culture and reduce inherent risks. What you'll be doing Support the design, delivery … the related awareness and training programs. Assist the embedding of principles of a risk aware and secure culture throughout the business. Maintain on-going compliance relating to third party security audits such as PCI-DSS. Support and develop internal and 3rd party activities such as: Social engineering, OSINT, and Rainbow Teaming. Report upon the effectiveness of the security … awareness and training programme. Facilitating related cultural benchmarks and managing outputs to deliver the required outcomes. Preparing senior management briefings on outcomes and recommendations. About you Passionate about promoting security awareness and empowering colleagues to adopt secure behaviours. Excellent communication skills, both written and verbal, with a talent for tailoring messages to diverse audiences. Experience of driving securityMore ❯
Employment Type: Permanent, Part Time, Work From Home
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Michael Page
This role involves implementing and managing security measures to protect systems and networks in a professional services environment. The successful candidate will play a critical part in ensuring the safety and reliability of the organisation's technology infrastructure in Birmingham. Client Details The hiring company is a professional services organisation with a well-established presence in the industry. As … sized firm, they focus on delivering reliable and tailored services to their clients, supported by a robust and secure technology framework. Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks … Work with engineering team to implement security tools and controls Scope penetration testing and review related reports from external service providers Collaborate with the technology department to integrate security protocols into system designs. Ensure and develop security posture to newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. Profile Proven experience in cyber More ❯
the Department of Defense and federal partners. We value initiative, accountability, and teamwork, and we empower our people to make a measurable impact. Position Summary We are seeking a Security Cooperation Analyst who is a self-starter and highly proactive. You will help plan, coordinate, and track activities across Foreign Military Sales and Building Partner Capacity programs to … without being asked twice. This role partners closely with government leads and industry teammates in a fast-moving, mission-focused environment. Key Responsibilities • Maintain day-to-day visibility of security cooperation actions and milestones across the case lifecycle; track tasks, risks, and dependencies to keep efforts on schedule. • Develop and maintain clear trackers, spreadsheets, and dashboards that show status … and version management for shared files and trackers. • Foster strong relationships with government stakeholders, end users, and international partners through clear, timely communication. • Protect sensitive information and follow all security and handling requirements. Qualifications Required Qualifications • Active Top Secret with SCI clearance. • Bachelor's degree in international relations, business, data analytics, public administration, or a related field. More ❯
Prescient Edge is seeking a Senior TECHINT Analyst (Technical & Signals Security Countermeasures-TAB) to support a federal government client. Benefits: At Prescient Edge, we believe that acting with integrity and serving our employees is the key to everyone's success. To that end, we provide employees with a best-in-class benefits package that includes: A competitive salary … retirement plan with no vesting schedule. Career development opportunities, including on-the-job training, tuition reimbursement, and networking. A positive work environment where employees are respected, supported, and engaged. Security Clearance: Security clearance required is TS/SCI with a CI POLY or the ability to obtain a CI POLY. Job Requirements Qualifications: Develops, processes, and evaluates TECHINT … Business (VOSB) founded as a counterintelligence (CI) and Human Intelligence (HUMINT) company in 2008. We are a global operations and solutions integrator delivering full-spectrum intelligence analysis support, training, security, and RD&E support solutions to the Department of Defense and throughout the intelligence community. Prescient Edge is an Equal Opportunity Employer (EEO). All applicants will receive consideration More ❯
Job Number: R Security Cooperation AM&E Analyst The Opportunity: As a defense mission professional, you ask questions others don't. You understand the nuances of complex sit uations. You use your skills to think bigger and push further, solving complex problems. We're looking for an expert like you to create solutions for missions that keep our … nation safe. As an Assessment, Monitoring, and Evaluation ( AM & E ) analyst, you'll bring your data collection, analysis, and reporting expertise to work on projects for the international security cooperation ( SC ) mission area. You'll support the development and execution of an assessment and monitoring program for Department of the Air Force ( DAF ) SC activities that informs SC … ted advisor to our clients, and we'll look to you to identify, analyze, and evaluate complex systems, policies , processes. You'll guide the work we do for the security cooperation mission area, and the solutions we deliver for DAF. This position is located in Arlington, VA. Join us. The world can't wait. You Have: 6+ years of More ❯
Are you a proactive security professional ready to lead incident response and shape the future of security operations across a global enterprise? Join a market-leading organization undergoing a major transformation to build a Group Shared Services model across the UK, Ireland, and the US. This is your chance to play a pivotal role in strengthening security posture across diverse business models-including third-party and franchisee environments. Responsibilities: Lead incident response across multiple regions and business units. Drive security gap analysis and remediation strategies. Manage vulnerability detection and resolution using tools like Tenable, Nessus, and Microsoft Defender. Collaborate with internal teams, external vendors, and franchisees. Develop and refine security documentation and executive reporting. … Excellent stakeholder engagement and communication skills. Experience in Microsoft-centric environments and distributed/franchisee models is a plus. Why this role stands out: Be part of a maturing security function with global impact. Work in a flexible hybrid model that supports work-life balance. Collaborate across regions and business units in a high-autonomy environment. Competitive salary and More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
Overview Hybrid role with flexible working hours and comprehensive benefits Impactful role in a new and growing security team About Our Client The hiring company is a professional services organisation with a well-established presence in the industry. As a mid-sized firm, they focus on delivering reliable and tailored services to their clients, supported by a robust and … secure technology framework. Job Description Work with managed service provider for cyber security incident management Proactively conduct threats detection and improve threats detection and management process Conduct vulnerability assessments, ensure the remediation and recommend improvements to mitigate risks. Develop security playbooks Work with engineering team to implement security tools and controls Scope penetration testing and review related … reports from external service providers Collaborate with the technology department to integrate security protocols into system designs. Ensure and develop security posture to newly acquired businesses Provide guidance and training to staff on cybersecurity best practices. The Successful Applicant Proven experience in cyber security operations including threats hunting, detection and response, vulnerabilities assessment remediation Familiarity with data More ❯