U.S. defense contractor specializing in technology solutions including modeling and simulation, test and evaluation, rapid prototyping and engineering services, is seeking a highly experienced and strategic Vice President of Security to lead and manage all aspects of industrial, personnel, and information security across the organization. The VP of Security will ensure compliance with the National Industrial Security Program Operating Manual (NISPOM), manage the company's cleared facilities and personnel security programs, and serve as the primary interface with the Defense Counterintelligence and Security Agency (DCSA). This executive role is responsible for developing and executing enterprise-wide security strategies for a 10 time Cogswell Award winning defense contractor, ensuring the protection of classified … and sensitive information, and overseeing the company's compliance with applicable federal regulations and customer requirements. Essential Job Functions: Oversee and/or liaise with Facility Security Officers (FSO) and related security personnel. Lead all aspects of the company's National Industrial Security Program (NISP) compliance activities, including documentation, audits, and security education. Develop and maintain More ❯
Description The Program Security Representative (PSR) requires a fundamental knowledge of the basics of program protection, classification architectures, Operations Security (OPSEC), Communications Security (COMSEC), sensitive test planning, intelligence & counterintelligence threat support requirements, secure information transmission, secure hardware transportation, and the principles governing controls on fundamental research activities. Qualifying relevant experience includes demonstrated recent experience in successfully performing … as a program security representative (or similar title) for one or more programs on a contract or in an organization that provides security support to a federal entity or private corporation in a classified environment Duties shall include, but are not limited to the following: Develop and support security architectures for new technology programs across the entire … technology/capability status. In developing a new program, the PSR must be able to analyze the program, national policy, existing, related programs (as applicable), and intelligently craft a security classification architecture for the program that facilitates the secure execution of the program with minimal impact to cost and schedule. Additionally, the program's life cycle must be considered More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
zyncgroup.io
I am hiring a Senior Information Security Consultant on behalf of a cutting-edge technology company at the forefront of innovation. Specialising in bespoke software solutions and IT consulting, they combine expertise with a commitment to delivering tailored, high-performance solutions for businesses. With a focus on leveraging emerging technologies, they empower clients to optimise their operations, enhance efficiency … deliver impactful solutions that align with clients unique goals and requirements. In this role you will be responsible for: Developing and formulatingsecurity concepts Establishment, development and implementation of information securitymanagement systems (ISMS) Coordinatingthe deployment of protective measures Conducting risk analyses This role is remote from anywhere in Germany with travel to client site. Essential: Several years experience … workingwithISMS - including developing from scratch Experience with two or more of ISO 27001, TISAX, and NIS2 Understanding of both IT Security and Information Security Data protection or project management experience Reliability and self management C1 German and fluent English Desirable: Experience in KRITIS Knowledge of network and OT systems Certifications such as ISO Lead Implementer, CISM More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of Cyber Security Consultant sits within the Cyber Security team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and … policy and standards. In this role you will have a broad and challenging remit, you will therefore need to be flexible and agile in your approach, switching between different security disciplines within the team as necessary. You will be engaging in the delivery of multiple business initiatives by introducing baseline and enhanced security requirements and supporting their implementation … through guidance and advice. You will also be recommending security solutions and then providing design input and technical approvals, assurances, and governance of deliveries that the project carries out with our colleagues and partners. Within the Security team itself you will be expected to collaborate with the wider team and security colleagues providing technical support and guidance More ❯
We're flexible! We're happy to receive applications in English or German. Your tasks: In this key role, you will take on professional responsibilities within the Cyber SecurityManagement team, supporting departments in managing Cyber Detection and Protection measures, including Vulnerability Management, Security Information and Event Management (SIEM), Incident Management, and overseeing the … our main service provider, Deutsche Börse AG, are essential components of this role. Additionally, you will work closely with colleagues from across the organization to ensure compliance with information security requirements during audit processes. For all your outstanding achievements, you will of course get a lot back from your team. Because we value exchanging ideas, being there for each … culture and making each other better. We call this the exchange mindset. Your skills: Successfully completed degree in university or university of applied sciences or comparable qualification In-depth security IT expertise, supported by at least 7 years of professional and/or project experience in this area of work Ability to abstract complex problems and to develop pragmatic More ❯
program within a federal division responsible for enforcing federal laws and promoting fair practices in the marketplace. This critical role supports the agencys mission by managing and optimizing endpoint management processes through Microsoft Endpoint Configuration Manager (MECM) and AdminStudio to ensure efficient, secure, and scalable IT operations. Job Description As an Engineer Technical Lead, you will support and manage … Microsoft Endpoint Configuration Manager (MECM) and AdminStudio to optimize endpoint management processes. Youll lead technical efforts related to the deployment, configuration, and maintenance of enterprise-level systems while developing scripts to automate processes and improve efficiency. This role combines hands-on technical work with leadership responsibilities, guiding and mentoring a team to ensure smooth execution of endpoint management tasks and services. Youll be responsible for managing software deployments, updates, patches, and configurations across the organization while ensuring compliance with security policies and standards. The ideal candidate brings 3-5 years of endpoint management experience with at least 2 years of hands-on MECM and AdminStudio experience, proven scripting abilities, and strong leadership skills to guide More ❯
data center operations. Develop and maintain compliance programs aligned with DoD, DNI, and other federal guidelines (NISPOM, ICD 705, CMMC, etc.). Partner with FSO, ISSM/ISSO, and security teams to manage incident response, access control, and visitor control protocols. Conduct periodic internal audits, assessments, and risk analyses of classified facility operations. Collaborate with engineering, IT, and facility … management teams to validate physical and cyber security postures. Maintain documentation and provide reporting to internal leadership and government stakeholders. Track regulatory and contractual requirements across multiple programs and advise stakeholders on compliance risk. Serve as liaison with Defense Counterintelligence and Security Agency (DCSA) and other regulatory agencies during inspections or reviews. Develop and deliver compliance training … to employees, subcontractors, and site security personnel. Job Requirements Qualifications: Active Top Secret clearance with Polygraph. 5+ years of experience in security compliance, industrial security, or cleared facility operations. In-depth knowledge of federal compliance standards such as NISPOM, ICD 705, CMMC, FISMA, and insider threat policy. Experience supporting classified data centers or secure IT infrastructure environments. More ❯
leverage our knowledge and expertise to develop a safer, more sustainable future, recognizing the importance of positively impacting our planet and society. Job Description: You will work with the Management Team to initiate and develop the Occam Group Cyber Security service offering. Supporting our extensive customer base, you will gain diverse experience across multiple projects, including autonomous shipping … novel weapon systems, nuclear power plants, and rail systems. Key Duties: Provide Cyber Security advice and guidance for clients throughout project lifecycles. Apply technical security knowledge and critical thinking to identify and establish good security governance aligned with client needs. Conduct and manage security assurance activities for Defence systems. Perform Cyber Security risk assessments, considering … constraints and risk appetite. Create, review, or update security artefacts such as Security Cases. Build strong relationships with team members and clients. Deliver technical Cyber Security consultancy across Defence and Civil domains. Implement 'Secure by Design' methodology and NIST Risk Management Framework. Maintain awareness of Cyber Security policies and standards such as HMG policies, CESG More ❯
Synack's Penetration Testing as a Service platform manages customers' attack surfaces by discovering new assets, pentesting for critical vulnerabilities and gaining visibility into the root causes of security risks. We are committed to making the world more secure by harnessing a talented, vetted community of security researchers to deliver continuous penetration testing and vulnerability management, with … internal stakeholders to determine, develop, and analyze the client's assets, such as: Their digital attack surface and value at risk Their existing vulnerability programs, tools, and methods Their security program, including requirements and goals Work independently with little guidance and provide technical product expertise to build the appropriate solution for the client's needs Provide technical SME support … to internal stakeholders and the client on their strategic goals and testing requirements. Here's what you'll need Experience with vulnerability discovery management, risk management frameworks and associated business workflows, and remediation Good to have experience with scripting languages (language independent) and developing scripted solutions to problems A knack for explaining technical concepts to a non-technical More ❯
standards, while proactively addressing ongoing facility needs. This is a part-time position. Responsibilities Coordinating facility activities, which may include general repairs and maintenance, construction, relocation, HVAC, plumbing, electrical, security and alarm systems, telecommunications systems, utilities, painting, patching, pest control, janitorial, signage, furniture and equipment setups, and cubicle reconfiguration. Provide executive leadership and oversight for the entire design and … construction process, from initial planning and design to final completion and commissioning. Supervise, mentor, and manage a team of architects, engineers, contractors, facility management staff, and other subject matter experts involved in the design, construction, and maintenance process. Allocate work effectively, monitor performance, and provide guidance and council on performance and administrative issues. Develop and implement strategic plans for … with the construction project and ongoing facility operations, ensuring a safe and secure work environment for all personnel. Manage building and equipment maintenance schedules and run tests on building security systems. Effectively communicate project status, progress, and challenges to senior management, stakeholders, and other relevant parties. Handle building equipment emergencies and communicate as the focal point between company More ❯
Company Overview: At CenCore Group, we take security solutions from the industry standard to the CenCore standard. CenCore Group specializes in designing, building, securing, and maintaining AI ecosystems at the intersection of big technology and national security. CenCore Group strives to be the trusted and primary source for insight, analysis, and implementation of physical and digital security solutions … of artificial intelligence and machine learning in the NatSec space. We are seeking a qualified Construction Surveillance Technician (CST) for a short-term contract position. With a Top-Secret security clearance or higher to join our dedicated team. Job Summary: The Compliance Program Manager will be responsible for the oversight, development, and implementation of compliance strategies within secure data … data center operations. • Develop and maintain compliance programs aligned with DoD, DNI, and other federal guidelines (NISPOM, ICD 705, CMMC, etc.). • Partner with FSO, ISSM/ISSO, and security teams to manage incident response, access control, and visitor control protocols. • Conduct periodic internal audits, assessments, and risk analyses of classified facility operations. • Collaborate with engineering, IT, and facility More ❯
Leonardo UK is seeking a Senior Consultant to join the Cyber & Security Solutions Division . This role focuses on supporting the delivery of security aspects for the company's core products and external stakeholders. Responsibilities include engaging with engineering teams and managing all facets of cyber and information security throughout the engineering lifecycle, from requirements to in … It may require a hybrid working model, combining remote work and on-site presence at one of our offices to facilitate collaboration. Key Responsibility Areas Deliver cyber and information security streams independently within a larger team across the engineering lifecycle. Interpret customer requirements into actionable securitymanagement plans and activities. Oversee statements of work and artefacts, ensuring … delivery within time, cost, and quality constraints. Identify, manage, and escalate risks and issues. Maintain customer relationships for security workstreams, both internal and external. Mentor team members as needed. Skills, Qualifications, Knowledge & Experience Essential: Passion for cyber and information security. Ability to work independently and make sound decisions. Effective communication skills, both written and verbal. Core consulting skills: client More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
to perform IT support for the Lockheed Martin managed closed areas. This IT professional will ensure that the Lockheed Martin IT systems are managed, controlled, and compliant with the Security Technical Implementation Guide (STIG) and Risk Management Framework (RMF). This includes upgrades, operation and maintenance, troubleshooting hardware and software problems, creation of domain accounts, password issues and … WIN11, etc.) • Experience in the implementation of Virtualization (VMWare, Hyper-V etc.) • Experience with Scripting and Automation (i.e., Perl, Bash, PowerShell, Puppet, Ansible etc.) • Experience with Risk Management Framework (RMF) Requirements • Experience with vulnerability remediation and securitymanagement (i.e., system hardening, log management, WSUS, SCCM, Ivanti, Shavlik, Blade Logic, Splunk, ACAS, SCAP, HBSS, etc.) • Knowledge of … networking protocols (LDAP/DNS/DHCP) • Experience with Operating Systems life cycle management and configuration management (i.e., Installation/Upgrades, System Imaging, Account Management, Print Services, Group Policy Objects (GPO), Domain Services, Hardware Modernization, Performance Monitoring, etc.) • Proficient with Microsoft Office • Experience performing Commercial off the shelf (COTS) software installations and support Desired Skills: • Active DoD More ❯
key tasks and high impact assignments and plans and leads major assignments to: Assist on all matters relating to the vulnerabilities and threats to Information Technology (IT) Systems, National Security Systems (NSS), and Automated Information Systems (AIS). Implement the Defense (DOD) Risk Management Framework (RMF) and assist to the System Security Manager (ISSM) ensure successful implementation … of associated security controls and reviews all RMF documentation packages, and system fielding, operations, or upgrade requirements Assist Program Management Offices with Cybersecurity related Acquisition documentation requirements (i.e. Cybersecurity Strategies) and statutory/regulatory/policy compliance. Coordinate integration of Cybersecurity, COMSEC, and TEMPEST into the entire system life-cycle design, development, and deployment. Support maintenance of DOD … Inspector General (IG) Cybersecurity Self-Assessment checklist compliance and Federal Information SecurityManagement Act (FISMA) Implement audit measures to ensure compliance with regulatory requirements, participate in organizational inspections and surveys of computer systems, provide inspection results, and assess the adequacy of corrective actions taken. Advise on all complex and unique computer security systems, make recommendations on the More ❯
employee at M.C. Dean, you will join forces with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the … world for the better. Responsibilities We are seeking a highly skilled and experienced Database Administrator 4 (DBA) to join our dynamic and fast-paced team, supporting enterprise-level physical security applications. In this role, you will be responsible for managing, maintaining, and optimizing multiple databases to ensure they meet the demands of critical security infrastructure. You will work … closely with a wide array of stakeholders, including developers, IT teams, security professionals, and business leaders, to ensure database performance, integrity, and security across the applications. As a DBA, you will be expected to thrive in an environment where collaboration, problem-solving, and adaptability are key. You'll have the opportunity to make a direct impact by designing More ❯
Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: Job Description Leonardo UK is seeking a Senior Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the delivery of security aspects to the company's core products and to external stakeholders. This requires engaging with engineering teams and delivery of all facets of cyber and information security related … us to find out more. Key Responsibility Areas Work as part of a larger team, delivering streams of work independently, to meet all aspects of the cyber and information security delivery across an engineering lifecycle. Interpreting customer requirements into actionable securitymanagement plans, statements of work, and activities to be delivered across the lifecycle. Oversight and delivery … of associated statements of work and artefacts to time, cost and quality constraints. Identification, management and escalation of technical and delivery risks and issues. Maintain customer relationships for the cyber and information security workstream, both internal and external. Mentoring of consultants within your team as required. Skills, Qualifications, Knowledge & Experience Required In addition to a passion for cyber More ❯
seeking a Systems Architect to join a new program opportunity and play a key role in supporting government-critical systems. You could be part of a program that oversees management of systems infrastructures, implementing best practices to identify and recommend system functional specifications, configuration of physical and virtual systems, backup and recovery of IT infrastructure. Primary Responsibilities: The System … knowledge of system administration, configuration, and support best practices, including patching and performance tuning. Experience with virtualization technologies (e.g., VMware, Hyper-V) to optimize infrastructure performance. Familiarity with basic securitymanagement practices to maintain the integrity and protection of systems. Preferred Qualifications Professional certifications such as Microsoft Certified: Windows Server Hybrid Administrator Associate, CompTIA Security+, VMware VCP, or … similar. Advanced scripting experience with PowerShell, Bash, or Python for automation across hybrid environments. Experience implementing or supporting enterprise security policies, including access controls, patch management, and system hardening. Background in systems engineering, including lifecycle planning, integration, and performance optimization of complex environments. Experience in virtualized and hybrid cloud infrastructures (e.g., Azure, AWS) to support scalable system deployment. More ❯
seeking a Systems Architect to join a new program opportunity and play a key role in supporting government-critical systems. You could be part of a program that oversees management of systems infrastructures, implementing best practices to identify and recommend system functional specifications, configuration of physical and virtual systems, backup and recovery of IT infrastructure. Primary Responsibilities: The System … knowledge of system administration, configuration, and support best practices, including patching and performance tuning. Experience with virtualization technologies (e.g., VMware, Hyper-V) to optimize infrastructure performance. Familiarity with basic securitymanagement practices to maintain the integrity and protection of systems. Preferred Qualifications Professional certifications such as Microsoft Certified: Windows Server Hybrid Administrator Associate, CompTIA Security+, VMware VCP, or … similar. Advanced scripting experience with PowerShell, Bash, or Python for automation across hybrid environments. Experience implementing or supporting enterprise security policies, including access controls, patch management, and system hardening. Background in systems engineering, including lifecycle planning, integration, and performance optimization of complex environments. Experience in virtualized and hybrid cloud infrastructures (e.g., Azure, AWS) to support scalable system deployment. More ❯
seeking a Systems Architect to join a new program opportunity and play a key role in supporting government-critical systems. You could be part of a program that oversees management of systems infrastructures, implementing best practices to identify and recommend system functional specifications, configuration of physical and virtual systems, backup and recovery of IT infrastructure. Primary Responsibilities: The System … knowledge of system administration, configuration, and support best practices, including patching and performance tuning. Experience with virtualization technologies (e.g., VMware, Hyper-V) to optimize infrastructure performance. Familiarity with basic securitymanagement practices to maintain the integrity and protection of systems. Preferred Qualifications Professional certifications such as Microsoft Certified: Windows Server Hybrid Administrator Associate, CompTIA Security+, VMware VCP, or … similar. Advanced scripting experience with PowerShell, Bash, or Python for automation across hybrid environments. Experience implementing or supporting enterprise security policies, including access controls, patch management, and system hardening. Background in systems engineering, including lifecycle planning, integration, and performance optimization of complex environments. Experience in virtualized and hybrid cloud infrastructures (e.g., Azure, AWS) to support scalable system deployment. More ❯
Requisition Number: 23844 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $96,256.00 - $155,000.00 Security Clearance: Secret Level of Experience: Senior Meet HII's Mission Technologies Division Our team of more than 7,000 professionals worldwide delivers all-domain expertise and advanced technologies in service of mission partners across the globe. … Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government and commercial customers. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class. Find the … of cybersecurity directives, policies, and instructions to include, but not limited to: Communications Task Orders (CTOs), Fragmentary/Task/Operation Orders (FRAG/TASK/OPORDs), IA Vulnerability Management (IAVM), Public Key Infrastructure (PKI) guidance, and STIG requirements. Conduct analysis of Assured Compliance Assessment Solution (ACAS) vulnerability scans and Security Technical Implementation Guides (STIGs) to assess the More ❯
NHS Forth Valley is recruiting a Cyber and Information Security Manager. This is a fantastic opportunity for someone ready to take the next step in their Cyber Security career. We are looking for a skilled leader to head up the Cyber and Information Security Team. Based within the Information Governance Unit, the Cyber and Information Security Manager will lead and advise on matters of Cyber/Information Security Technical Controls, Procedures and Standards. The post holder is responsible for creating and implementing NHS Forth Valley's Information SecurityManagement System to ensure compliance with the Networks and Information Systems Regulation 2018 (NIS). Acting as our NIS Audit lead and as a … incident response plans remain fit for purpose and up to date. The post holder will contribute to and participate in the development and implementation of NHS Forth Valley Information Security Policy and Information Governance Framework. They will assess Cyber Security Technical controls for NHS Forth Valley and collaborate with partner organisations on a range of complex and sensitive More ❯
distributed environment, operating at massive levels of scale. Businesses, from start-ups to enterprises to large government customers, run their operations and applications on AWS' highly secure infrastructure. AWS Security is looking for a GRC Specialist to contribute to the certification, accreditation, assurance, and authorisation activities across the security program. The successful candidate is a problem-solver, quick … study, with a broad understanding of the regulatory landscape, cloud technologies, experience in security and compliance. Key job responsibilities - Serve as the GRC Specialist for designated (physical and/or logical) components within the cloud capability, to perform assurance and authorization activities to ensure adherence to standards and protocols. - Collaborate with internal teams and customers to establish baselines and … level-set the security requirements, security controls, and security objectives. - Implement ISM, PSPF, DSPF, ASIO T4, NIST and/or other security compliance frameworks into design and build baselines to achieve the agreed security posture. - Create, optimise, and support cross-functional working groups and projects aimed at enhancing security efficiency and effectiveness across the More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
We are searching for a Senior Software Security Architect/Senior Application Security Architect for a marketing leading and award-winning technology and data driven business. The position is offered on a remote basis. The role is hands-on and very software engineering focused - you will be responsible for establishing a secure SDLC and 'Secure by Design' approach …/practice to be used by all of the Architecture and Software development teams. The role will involve: Developing, implementing, and maintaining application security architecture across the organisation. Ensuring our systems are designed with objectives like speed, scalability, robustness, zero-trust, automation and supportability at the core. Collaborating with the Architecture and Engineering Team to ensure security is … an integral part of all development and deployment processes. Providing expert software security advice (design, coding, testing) to the Software Engineering Community, to InfoSec, DevOps and other teams. Defining and delivering secure software development of information to the software engineering teams. Escalating issues appropriately, to various teams and levels of authority inside the organisation. Interfacing with customers to ensure More ❯
Scott Air Force Base, Illinois, United States Hybrid / WFH Options
CEdge Software Consultants
that will inevitably take your career to unbelievable levels! Clearance Requirements: Secret Clearance . Duties & Responsibilities: Responsible for working with network administration and system administration teams to ensure operational security of DoD networks and systems Install, configure, administer, and maintain DoD information assurance and cyber security tools including HBSS, ACAS, Nessus, Fortify, IDS systems, firewalls, etc. Continuously monitor … systems for security, appropriate access per authorization, and configuration integrity Conduct vulnerability scans of software and systems Review and analyze security-related reports and logs from tools including Splunk, Nessus, HBSS, ACAS, IDS systems, firewalls, etc. Track and manage resolution of POA&Ms Review and take corrective action with IAVA, SCAP and ACAS vulnerabilities Coordinate with and assist … experience (or 3 years of experience for Intermediate Level Positions; or 5+ years of experience for Senior Level positions) with each of the following technology skills: Experience using DoD securitymanagement tools including ACAS and eMASS Experience reviewing and applying STIGs Experience using security scanning tools including Fortify and Nessus Experience using log analysis tools such as More ❯
in energy. Help us make a real impact on shaping a better, more sustainable future. We are very excited to be building a small and efficient Cyber and Information Security team at Octopus Energy Group. We are looking for ambitious, knowledgeable, and experienced InfoSec Analysts to join our team, to grow with the rest of the company, and ensure … we continue to do so in a secure and safe way. You will be a key partner in defining what Security is at Octopus Energy Group. We will be shaping this team to provide a world class support service to our employees, building our way out of problems and undertaking transformational organisational change. You'll be primarily supporting our … to business challenges and opportunities to continually improve our services. Specifically, we're looking for InfoSec Analysts with at least 2 years of relevant experience to help us improve security across the Octopus Energy Group. If you're passionate about Information Security and driving a positive security culture, we encourage you to apply! What you'll do More ❯