Security Site Assessor (Contract) Location: Anywhere in United Kingdom (Hybrid role) Who we are Grant Thornton’s Agile Talent Community is a network of contract professionals, giving you the opportunity to work with our clients alongside Grant Thornton teams on a project-by-project basis whilst being supported … changing and our teams help clients remain agile and adapt to these changes and stay ahead of the competition. Grant Thornton’s Cyber Security team provides security, resilience and involves providing assurance and advisory services to organisations to identify risks and assisting them in developing and … in formation security. The team is based throughout the country and work on behalf of one of our clients to assess adherence to security standards by the companies that operate within our customer’s supply chain. Joining the Agile Talent Community as a Security Site Assessor More ❯
Security Site Assessor (Contract) Location: Anywhere in United Kingdom (Hybrid role) Who we are Grant Thornton’s Agile Talent Community is a network of contract professionals, giving you the opportunity to work with our clients alongside Grant Thornton teams on a project-by-project basis whilst being supported … changing and our teams help clients remain agile and adapt to these changes and stay ahead of the competition. Grant Thornton’s Cyber Security team provides security, resilience and involves providing assurance and advisory services to organisations to identify risks and assisting them in developing and … in formation security. The team is based throughout the country and work on behalf of one of our clients to assess adherence to security standards by the companies that operate within our customer’s supply chain. Joining the Agile Talent Community as a Security Site Assessor More ❯
Job Title: Cyber Security Auditor Location: US-HI-Honolulu Clearance: Top-Secret Overview: We are seeking a Cyber Security Auditor to join our team supporting Network Enterprise Technology Command (NETCOM) in Honolulu, HI. Responsibilities: The CSFC Solutions Auditor would assist and support with the development, configuration … and networks. The Engineer will work individually and as a member of a team to configure network, software, and hardware networking components and security appliances and applications to meet DoD requirements and support their installation and initialization onsite in the customers' environments. RESPONSIBILITIES Coordinate with the NSA CSFC … etc.) Prepare daily, weekly, and monthly reports describing the task status in accordance with task order report template. Review, manage, control, and maintain security audit log data Document and report security-related incidents to appropriate authorities Perform annual assessment of NSA capability packages checklists and Cross More ❯
Role: Security Architect Location: Bristol, Manchester Salary: Competitive salary and package dependent on experience Please Note: Any offer of employment is subject to satisfactory BPSS and SC securityclearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or … and with the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO As a Security Architect you will: Have the opportunity to join a growing and exciting team of security architects within a global multinational organization, specializing … technology centric transformation programs On a day to day basis you will integrates and collaborate with technical and solutions architects to define the security architecture for high-profile solutions within traditional and groundbreaking enterprise IT as well as custom operational technology systems. You will have a Cyber SecurityMore ❯
Role: Security Architect Location: Bristol, Manchester Salary: Competitive salary and package dependent on experience Please Note: Any offer of employment is subject to satisfactory BPSS and SC securityclearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or … and with the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO As a Security Architect you will: Have the opportunity to join a growing and exciting team of security architects within a global multinational organization, specializing … technology centric transformation programs On a day to day basis you will integrates and collaborate with technical and solutions architects to define the security architecture for high-profile solutions within traditional and groundbreaking enterprise IT as well as custom operational technology systems. You will have a Cyber SecurityMore ❯
Role: Security Architect Location: Bristol, Manchester Salary: Competitive salary and package dependent on experience Please Note: Any offer of employment is subject to satisfactory BPSS and SC securityclearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or … and with the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO As a Security Architect you will: Have the opportunity to join a growing and exciting team of security architects within a global multinational organization, specializing … technology centric transformation programs On a day to day basis you will integrates and collaborate with technical and solutions architects to define the security architecture for high-profile solutions within traditional and groundbreaking enterprise IT as well as custom operational technology systems. You will have a Cyber SecurityMore ❯
Role: Security Architect Location: Bristol, Manchester Salary: Competitive salary and package dependent on experience Please Note: Any offer of employment is subject to satisfactory BPSS and SC securityclearance which requires 5 years continuous UK address history (typically including no periods of 30 consecutive days or … and with the communities in which we work and live. It is personal to all of us.” – Julie Sweet, Accenture CEO As a Security Architect you will: Have the opportunity to join a growing and exciting team of security architects within a global multinational organization, specializing … technology centric transformation programs On a day to day basis you will integrates and collaborate with technical and solutions architects to define the security architecture for high-profile solutions within traditional and groundbreaking enterprise IT as well as custom operational technology systems. You will have a Cyber SecurityMore ❯
Washington, Washington DC, United States Hybrid / WFH Options
Softek International Inc
HSEN - TA2 -13 HSEN Senior Technical Security Engineer 23-10-20 HSEN Senior Technical Security Engineer Position Summary Softek International is seeking a Senior Technical Security Engineer to support the DHS Enterprise Engineering Division within the Office of the Chief Information Officer (OCIO) is … responsible for the architecture, design, engineering, Tier 3 operations support, maintenance, and management of the network and security infrastructure. This program portfolio includes management and oversight of the technical infrastructure and security tools, sensors, servers, and data storage devices to support the DHS Network Operations Security … and other DHS stakeholders and Components. This role needs to provide strategic and tactical direction to a high functioning team of network and security engineers, data center specialists, and DHS stakeholder groups. Candidates must be able to convey • Experience and Ability to provide leadership and hands up support More ❯
Special Security Officer Support The Ascendancy Group's Mission To be the unequaled provider of special operations forces (SOF) and Intelligence Community focused technical, service, and training-based solutions. Overview: As TAG Special Security Officer Support, you will support the command Special Security Officer … or Special Security Representative by processing personnel background investigations for special securityclearance actions. This position is contingent upon contract award. Security Requirement: A Top Secret/SCI Clearance is required. Roles and Responsibilities: Support the command SSO or SSR by processing personnel background … investigations for special securityclearance actions. Formulating and ensuring compliance with automated information systems security procedures. Suggesting, implementing and monitoring compliance with special security policies and procedures. Conducting and coordinating the training for special security representative. Performing as liaison with Government and More ❯
This position is a contingency opportunity The Personnel Security Specialist primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day … support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Job Duties and Responsibilities: Review, track, and monitor securityclearance processing activities with appropriate government personnel to achieve appropriate clearance actions Advise senior officials on personnel issues affecting the Center Assist in defining, interpreting, and … implementing program security policy within the Center. Provides security policy interpretation concerning the Special Access Program Nomination Process (SAPNP). Reviews and comments on security operating instructions, security plans, guides, and various security related correspondences. Manages and administers securityMore ❯
GKG is looking for an Information Systems Security Engineer (ISSE) in Ft. Meade, MD. Responsibilities: • Perform and review technical security assessments using a structured process to identify assets, threats, vulnerabilities, and risks, and then analyzing and developing security controls to mitigate those risks. • Validation … and verification system security requirements, system security design, and integrate system security for a variety of environments. • Build cybersecurity into systems for operational environments. • Assess and mitigate system security threats and risks during the life cycle of the program, to include planning … assessment, risk analysis, and management. • Utilize security engineering expertise in areas of system security design, life cycle, risk management, and security testing, using up to date security engineering methodologies. • Support security authorization activities in accordance with Government regulations, Department of More ❯
Job Summary: The Access Control Officer will be responsible for ensuring the protection and security of sensitive facilities, assets, and information by controlling access to restricted areas and enforcing strict security protocols. The successful … candidate will utilize their expertise and securityclearance to monitor access points, verify personnel credentials, conduct screening for prohibited devices, escort non-cleared personnel and respond to security incidents as necessary. The Access Control Officer will play a critical role in maintaining a secure environment … and upholding the highest level of confidentiality. Responsibilities: Control access to designated facilities, sensitive areas, and classified information based on established security protocols and clearance levels. Verify personnel identification and clearances to ensure only authorized individuals are granted entry. Operate and manage access control systems, biometric devices, and More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
Nessus Security Tool Engineer Location: Chantilly, VA Work Type: Onsite Remote Work: NO Job Description Gridiron IT is looking for a Security Tool Engineer to support our DoD customer to implement an enterprise IT service delivery model that provides consistent, secure, high-quality, and cost-effective … program, Gridiron IT will deliver enhanced capabilities and services to implement and operate an enterprise ITSM solution, enterprise service desk, endpoint management and security solution, as well as CONUS/OCONUS field support and life cycle support for end user devices to enable the DoD customer to transition … focus from IT operations to mission operations. As a Security Tool Engineer, you will be responsible for designing, implementing, and maintaining security tools and technologies to enhance the organization's cybersecurity posture. Your primary focus will be on evaluating, deploying, configuring, and optimizing various securityMore ❯
and review; traffic analysis, user account management, and incident reporting for the project IT systems. Candidate shall be certified as an information systems security professional (CISSP) and possess a minimum of three (3) years' experience directly supporting information systems security efforts. General Experience: Activities Associated with … Identifying Security Controls that are Provided by the Organization as Common Controls for Organizational Information Systems and Document the Controls into the SSP or equivalent Documents Activities Associated with Tailoring Security Controls as Needed Activities Associated with Developing a Strategy for Monitoring Security Controls … Effectiveness and any Proposed or Actual Changes to the Information System Activities Associated with Implementing Security Controls Activities Associated with Documenting the Implemented Security Controls in the SSP with a Functional Description of the Control Implementation Activities Associated with Developing, Reviewing and Approving a Plan to More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Thales Group
information, making the connected world safer. At Thales UK, we foster a culture of learning and career development. We innovate across Aerospace, Defence, Security, and Space industries, impacting millions daily. We prioritize employee well-being, offering flexible working arrangements such as part-time hours, job sharing, home working … and flexible start and finish times. Cyber Security Architect LIFE AS A THALES CYBER SECURITY ARCHITECT We seek Cyber Security Architects to join our expanding team. You will work on complex systems, providing expert security architecture, technical leadership, and guidance to develop … reliable, secure, and compliant security solutions tailored to project needs. Your responsibilities include: Advising on high-level security architecture and contributing to design processes, including risk assessments Consulting on security component architectures (e.g., SIEM, IAM, gateways) Evaluating architectures against policies and standards (NIST, ISO More ❯
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: Senior Cyber Security Advisory Consultant (Defence) Publication Date: May 29, 2025 Ref. No: 530351 Location: London, GB The future is our choice At Atos, as the global leader in secure … landscape of digital threats and opportunities. We work with leading organisations across financial services, government, critical national infrastructure, and commercial sectors, delivering tangible security improvements and enabling business transformation. The opportunity As a Senior Advisory Consultant within our growing UK&I Advisory Practice, you will be an integral … Leonardo, Atkins), although there is also the potential to support non-defense accounts where appropriate. The candidate must be eligible to obtain a securityclearance - SC level. Location: Remote working with flexibility for traveling to client sites as required Role and responsibilities: Promoting and influencing practice growth Support More ❯
Job Title: Permanent Sr. Cyber Security Engineer Hybrid 9/80 Schedule Job Location : Goleta, CA 93117 Onsite Requirements: Risk Management framework security assessments, vulnerability management Job Description : We are seeking a highly motivated and experienced Senior Cybersecurity Engineer to join our team, focusing on the … security assessment and risk management of IT systems embedded within tactical vehicles. This role will be critical in ensuring the confidentiality, integrity, and availability of sensitive data and systems operating in challenging and dynamic environments. The ideal candidate will possess a deep understanding of the Risk Management Framework … Management Framework (RMF) Implementation: Lead and execute the RMF process for IT systems within tactical vehicles, from system categorization (SP 800-60) through security control selection (SP 800-53), implementation, assessment, authorization, and continuous monitoring. Security Assessments: Conduct comprehensive security assessments of tactical vehicle More ❯
Information System Security Engineer (ISSE) 2 is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements … are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information … system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD More ❯
Information System Security Engineer (ISSE) 3 is primarily responsible for conducting information system security engineering activities with a focus on lifecycle of current systems and future requirement scoping. The position will collect and process the captured information security requirements and ensures that the requirements … are effectively integrated into information systems through purposeful security architecting, design, development, and configuration. The position is an integral part of the development team designing and developing organizational information systems or upgrading legacy systems. The ISSE employs best practices when implementing security requirements within an information … system including software engineering methodologies, system/security engineering principles, secure design, secure architecture, and secure coding techniques. This position's main function is working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense and More ❯
Description: Job Title: Sr Associate, Information Security Systems Engineer Job Location: Melbourne, Florida Pay Rate$53.64/hr w2 Must Have Minimum of 1 year of experience in the network security engineering field performing the specification, selection, evaluation, testing, deployment and operation of security … devices including but not limited to Firewalls, Routers, Switches, IDS, WAF, VPN technologies, etc Job Description: Client is searching for talented experienced Information Security Systems Engineering professionals to join the Network Security Engineering Team comprised of Information Security Systems Engineers (ISSEs) supporting managed network … position requires weekend, after-hours support, and on-call rotations to meet program requirements. Essential Functions: • Act as primary engineering support to network security operations for the testing and evaluation of new Security products and services. • Supervise the technical work of junior security engineers More ❯
Cyber Security Engineer – National Security Projects Salary: £80,000–£90,000 | Location: UK (must be eligible for UK SecurityClearance) Step into a mission-critical role shaping the UK’s cyber defence. Ncounter is hiring a Cyber Security Engineer to join a … high-impact software consultancy driving innovation across national security and government infrastructure. Work on cutting-edge, high-stakes programmes where your expertise in secure design, threat mitigation, and operational security will directly influence national resilience. Collaborate with elite technologists, shape secure systems architecture, and drive strategy … secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a master’s/STEM degree If you’re security-cleared (or eligible), ready to lead, and want to work where it matters most - apply now with Ncounter. More ❯
Cyber Security Engineer – National Security Projects Salary: £80,000–£90,000 | Location: UK (must be eligible for UK SecurityClearance) Step into a mission-critical role shaping the UK’s cyber defence. Ncounter is hiring a Cyber Security Engineer to join a … high-impact software consultancy driving innovation across national security and government infrastructure. Work on cutting-edge, high-stakes programmes where your expertise in secure design, threat mitigation, and operational security will directly influence national resilience. Collaborate with elite technologists, shape secure systems architecture, and drive strategy … secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a master’s/STEM degree If you’re security-cleared (or eligible), ready to lead, and want to work where it matters most - apply now with Ncounter. More ❯
Cyber Security Engineer – National Security Projects Salary: £80,000–£90,000 | Location: UK (must be eligible for UK SecurityClearance) Step into a mission-critical role shaping the UK’s cyber defence. Ncounter is hiring a Cyber Security Engineer to join a … high-impact software consultancy driving innovation across national security and government infrastructure. Work on cutting-edge, high-stakes programmes where your expertise in secure design, threat mitigation, and operational security will directly influence national resilience. Collaborate with elite technologists, shape secure systems architecture, and drive strategy … secure frameworks Experience in public sector programmes Bonus: PCiIAA, SABSA, TOGAF, or a master’s/STEM degree If you’re security-cleared (or eligible), ready to lead, and want to work where it matters most - apply now with Ncounter. More ❯
support the C3C/Kessel Run (KR) Division, which is within the USAF C3BM Directorate. This role will focus on cybersecurity with network security/firewall/AWS cloud security. The network security engineer will have a solid understanding of the modern cyber security landscape with a strong background in network security, cyber-attacks, data loss prevention, and DoD and AF information technology standards and practices. This is a full-time position located at Hanscom AFB, Bedford, MA. Responsibilities Duties include, but not limited to: Possess a deep understanding of … Internet based technologies (DNS, Security, IP Routing, SSH, SFTP, HTTP/HTTPS, etc.). Deep understanding of IP network technologies and software tools for performance monitoring and troubleshooting. (Especially layers 2 and 3). Write and maintain custom scripts to increase system efficiency and lower the human error More ❯
This position is a contingency opportunity This position provides physical security (PS), industrial security, and cybersecurity support for collateral, SCI and SAP systems in accordance with ICD, DODM, legacy DCID/JAFAN, and other DoD and national guidance for facilities with internal networks and guest systems. … Provides industrial security support to SAR acquisition programs. Performance shall include: Assist Government security authorities in managing acquisition programs' industrial security requirements Responsible for ensuring compliance with DODM, ICD, or legacy DCID/JAFAN physical security and IA requirements and maintaining accreditation … cybersecurity requirements Author, review and maintain facility Certification and Accreditation documentation Assist with enforcement of personnel security controls for visitors and un-cleared personnel requiring entry to the facility Enforce physical security controls of electronic devices and prohibited items Identify Cybersecurity and physical securityMore ❯