Come make your mark with Watermark! FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business. SUBJECT MATTER EXPERTS specializing in security and risk management. We're intimately familiar with DOD security programs and mission requirements. OUR CORE VALUES drive every action we take as a company. We strive to … This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Systems Security Officer II The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the … ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
As Hargreaves Lansdown (HL) continues it digital journey, we are enhancing our Cloud Assurance capabilities, within our Information Security Team. We are seeking a highly skilled Senior Security Analyst with a proven track record in delivering and maintaining Cloud assurance, preferably within a financially regulated enterprise environment or similar. The Senior Security Analyst is a specialist lead … SME role with the primary focus on AWS Cloud Security Assurance, as well as Governance, Risk and supporting Compliance. You will be supporting the Information Security function to ensure HL remains effective in protecting critical information assets within risk appetite. You will be working with a highly skilled and committed Security, Digital IT and Cloud teams. You … will play a significant role in our Cloud journey, working with our AWS and Azure Cloud platforms and security toolsets. We offer a commitment to your career development through training, mentoring and internal opportunities. What you'll be doing You will be the SME and lead for the technical aspects of Cloud security assurance risk and controls. You More ❯
Information Security Manager - Rail Sector, URGENT HIRE Lawrence Harvey is delighted to be exclusively supporting a leading rail client once again to support with the growth of their exceptional technology team for their Information Security Manager. The Role: Leading management of information security which includes ISO27001, PCI-DSS, and vulnerability management. Working alongside the DPO and … Head of Technology to support on areas of data protection. Lead collaboration with key partners for train onboard systems cyber security assessments and risk management Establish and maintain appropriate policies, procedures, and practices in relations to cyber, data and governance practices Manage the information security incident response program Manage implementation and deployment of Information SecurityManagement System (ISMS). Line management of the internal InfoSec specialists. Requirements Extensive experience working with PCI-DSS and ISO27001 Strong understanding on security tools such as IDS/IPS. Demonstrable experience of leading Information Security, Governance, Compliance teams. Ideally a form of cybersecurity qualification such as CISM or CISSP Benefits: Salary between More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Lawrence Harvey
Information Security Manager - Rail Sector, URGENT HIRE Lawrence Harvey is delighted to be exclusively supporting a leading rail client once again to support with the growth of their exceptional technology team for their Information Security Manager. The Role: Leading management of information security which includes ISO27001, PCI-DSS, and vulnerability management. Working alongside the DPO and … Head of Technology to support on areas of data protection. Lead collaboration with key partners for train onboard systems cyber security assessments and risk management Establish and maintain appropriate policies, procedures, and practices in relations to cyber, data and governance practices Manage the information security incident response program Manage implementation and deployment of Information SecurityManagement System (ISMS). Line management of the internal InfoSec specialists. Requirements Extensive experience working with PCI-DSS and ISO27001 Strong understanding on security tools such as IDS/IPS. Demonstrable experience of leading Information Security, Governance, Compliance teams. Ideally a form of cybersecurity qualification such as CISM or CISSP Benefits: Salary between More ❯
london, south east england, united kingdom Hybrid / WFH Options
Lawrence Harvey
Information Security Manager - Rail Sector, URGENT HIRE Lawrence Harvey is delighted to be exclusively supporting a leading rail client once again to support with the growth of their exceptional technology team for their Information Security Manager. The Role: Leading management of information security which includes ISO27001, PCI-DSS, and vulnerability management. Working alongside the DPO and … Head of Technology to support on areas of data protection. Lead collaboration with key partners for train onboard systems cyber security assessments and risk management Establish and maintain appropriate policies, procedures, and practices in relations to cyber, data and governance practices Manage the information security incident response program Manage implementation and deployment of Information SecurityManagement System (ISMS). Line management of the internal InfoSec specialists. Requirements Extensive experience working with PCI-DSS and ISO27001 Strong understanding on security tools such as IDS/IPS. Demonstrable experience of leading Information Security, Governance, Compliance teams. Ideally a form of cybersecurity qualification such as CISM or CISSP Benefits: Salary between More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Lawrence Harvey
Information Security Manager - Rail Sector, URGENT HIRE Lawrence Harvey is delighted to be exclusively supporting a leading rail client once again to support with the growth of their exceptional technology team for their Information Security Manager. The Role: Leading management of information security which includes ISO27001, PCI-DSS, and vulnerability management. Working alongside the DPO and … Head of Technology to support on areas of data protection. Lead collaboration with key partners for train onboard systems cyber security assessments and risk management Establish and maintain appropriate policies, procedures, and practices in relations to cyber, data and governance practices Manage the information security incident response program Manage implementation and deployment of Information SecurityManagement System (ISMS). Line management of the internal InfoSec specialists. Requirements Extensive experience working with PCI-DSS and ISO27001 Strong understanding on security tools such as IDS/IPS. Demonstrable experience of leading Information Security, Governance, Compliance teams. Ideally a form of cybersecurity qualification such as CISM or CISSP Benefits: Salary between More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Lawrence Harvey
Information Security Manager - Rail Sector, URGENT HIRE Lawrence Harvey is delighted to be exclusively supporting a leading rail client once again to support with the growth of their exceptional technology team for their Information Security Manager. The Role: Leading management of information security which includes ISO27001, PCI-DSS, and vulnerability management. Working alongside the DPO and … Head of Technology to support on areas of data protection. Lead collaboration with key partners for train onboard systems cyber security assessments and risk management Establish and maintain appropriate policies, procedures, and practices in relations to cyber, data and governance practices Manage the information security incident response program Manage implementation and deployment of Information SecurityManagement System (ISMS). Line management of the internal InfoSec specialists. Requirements Extensive experience working with PCI-DSS and ISO27001 Strong understanding on security tools such as IDS/IPS. Demonstrable experience of leading Information Security, Governance, Compliance teams. Ideally a form of cybersecurity qualification such as CISM or CISSP Benefits: Salary between More ❯
Position Summary Odyssey Systems has an exciting new opportunity for a Senior Acquisition Security Manager supporting the Air Force Life Cycle Management Center's Integrated Development Office, located at Wright Patterson AFB, OH. Responsibilities Duties include, but not limited to: Lead and implement program securitymanagement in collaboration with government personnel, prime contractors, and subcontractors. Develop … update, and maintain security documentation including classification guides, Program Protection Plans (PPP), OPSEC plans, security CONOPS, and related materials. Review and evaluate contractor deliverables (software/hardware) and acquisition documentation for compliance with security policies and regulations. Plan and conduct security-related surveys, studies, risk analyses, and assessments throughout the program life cycle. Administer and monitor … databases for classified material, visits, clearances, and audits; ensure accountability and secure handling. Establish and maintain physical, personnel, documentation, and COMSEC security protocols for secure environments. Provide security education, awareness training, and support to source selection activities and Special Access Programs (SAP). Demonstrated knowledge and hands-on experience in acquisition program security across defense systems. Familiarity More ❯
PMs, and engineers to ensure secure systems are authorized and maintained in accordance with DoD and Air Force policies. Responsibilities Duties include, but not limited to: Develop and maintain security documentation including System SecurityManagement Plans, Program Protection Plans, OPSEC Plans, and Risk Analyses in accordance with DoDI 5000.02, DoDI 8510.01, and MIL-STD 1785. Support RMF … compliance databases and tools. Manage user account provisioning, port/protocol authorizations, access control lists, and Public Key Infrastructure (PKI) identity requirements. Coordinate the implementation, distribution, and remediation of security updates, configurations, and software patches in compliance with DoD directives. Evaluate systems for vulnerabilities and provide recommendations for mitigation based on technical assessments and policy review. Promote security awareness across program stakeholders and ensure alignment with cybersecurity principles and business goals. Conduct security audits, contingency planning reviews, and risk assessments to ensure organizational resilience. Advise on security architecture and participate in systems design to ensure alignment with cybersecurity best practices. Review, evaluate, and recommend security mechanisms, including configurations and waivers to policy when appropriate. More ❯
Aberdeen, Aberdeenshire, Scotland, United Kingdom Hybrid / WFH Options
AWD Online
Support Technician you will have experience at a technical level in the development, deployment, support and maintenance of IT infrastructure components such as servers, storage, virtualisation, desktop systems, identity management, security etc. As an IT Systems Engineer/2nd Line & 3rd Line Support Technician you will be part of the team responsible for the design, development and support … and deploy Applications (e.g. using System Center Configuration Manger, Citrix, Intune, JAMF) and provide third line support where required VDI development and support Develop and manage the universities Identity Management Systems Administer, maintain and support M365 services, providing and implementing recommendations for change SAN management and development Develop and support Windows 10/11 and macOS systems and … reflect changes and additions to the Universitys infrastructure Adhere and contribute to change control processes Adhere to project development standards Ensure work is delivered in accordance with current IT security and quality standards and procedures Act as a mentor to colleagues developing their technical skills and understanding of the universities IT systems and standards CANDIDATE REQUIREMENTS ESSENTIAL Educated to More ❯
Information System Security Officer 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned … responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and … updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense agencies, such as HQ Air Force, Office of the Secretary of Defense and Military Compartments efforts. The position More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO 2) is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is … assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing … and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments More ❯
Information System Security Officer (ISSO) 2 - The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many … organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to … include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and More ❯
This position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts support functions are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cyber Systems Engineer Project Management Technical Support provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to: Support the front Office elements (Director, Deputy, COS, Business … cybersecurity and information assurance Assist in the development of execution reviews, acquisition roadmaps and transition plans Assist with the development, documentation and communication of office initiatives geared toward enterprise security Provide technical recaps of customer meetings with cyber security contractors Assesses contractor performance using evaluation criteria and technical performance measures Assist in the development of technical requirements Produces More ❯
to who we are and where we're headed. We're proud to share our story and Make Amazing Happen at CDW. Job Summary As the Head of Information Security for the UK and International business you will report into the global CISO and also dotted line into the Director of Technology for UK&I and will be accountable … for all aspects of Information Security in the UK&I business. You will work as part of the global security leadership team to represent the UK&I business and as part of the UK&I Technology leadership team to implement global security best practices, protect our operations from threats and ensure compliance with customer and regulatory requirements. … What you will do Own and drive all aspects of Information Security across the UK&I business Build partnerships with UK&I leadership to ensure that local priorities and needs are understood while instilling a strong cybersecurity culture across the organisation Act as a senior member of the global Information Security team to represent UK&I priorities and More ❯
to who we are and where we're headed. We're proud to share our story and Make Amazing Happen at CDW. Job Summary As the Head of Information Security for the UK and International business you will report into the global CISO and also dotted line into the Director of Technology for UK&I and will be accountable … for all aspects of Information Security in the UK&I business. You will work as part of the global security leadership team to represent the UK&I business and as part of the UK&I Technology leadership team to implement global security best practices, protect our operations from threats and ensure compliance with customer and regulatory requirements. … What you will do Own and drive all aspects of Information Security across the UK&I business Build partnerships with UK&I leadership to ensure that local priorities and needs are understood while instilling a strong cybersecurity culture across the organisation Act as a senior member of the global Information Security team to represent UK&I priorities and More ❯
Information System Security Officer (ISSO) 2- This is a future position that may come open in the future. We are currently building our pipeline. Responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and … expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the … ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAP) supporting Department of Defense More ❯
Aima Data Management is looking for a Special Security Program (SAP) to work in Fort Belvoir, Virginia. To join our team of outstanding professionals, apply today! Responsibilities Plans, develops, and analyzes security measures to protect critical information from counter-threats and possible attacks. Protects sensitive information by ensuring required software is functioning and being used correctly. Monitors … ensure compliance with government regulations. Performs work under general supervision. Handles moderately complex issues and problems and refers more complex issues to higher-level staff. Detailed knowledge of SAP securitymanagement and procedures. Knowledge of SAP Markings. Knowledge of SAP Reporting Requirements. Qualifications Associate degree. Three (3) years of experience (within a SAP). Completion of SAP Mid … Level SecurityManagement Course SA201.01 (or equivalent course). Must have TS/SCI clearance. Job ID 9 Work Type On-Site Company Description Work Where it Matters Akima Data Management (ADM), an Akima company, is not just another federal IT contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal More ❯
in safeguarding digital assets by designing, implementing, and maintaining robust cybersecurity infrastructure. You will work collaboratively with cross-functional teams to identify vulnerabilities, develop solutions, and ensure compliance with security protocols and industry standards. Staying informed about emerging trends and threats in the cybersecurity landscape, you will proactively enhance defenses through innovative tools and methodologies. Additionally, you will conduct … risk assessments, implement security controls, and support incident response efforts to minimize risks and maintain the integrity of our systems and data. We know that you can't have great technology services without amazing people. At MetroStar, we are obsessed withour people and have led a two-decade legacy of building the best and brightest teams. Because we know … think you can see yourself delivering our mission and pursuing our goals with us, then check out the job description below! What you'll do: Design, implement, and manage security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to ensure the organization's networks and systems remain secure. Conduct regular security assessments to More ❯