in safeguarding digital assets by designing, implementing, and maintaining robust cybersecurity infrastructure. You will work collaboratively with cross-functional teams to identify vulnerabilities, develop solutions, and ensure compliance with security protocols and industry standards. Staying informed about emerging trends and threats in the cybersecurity landscape, you will proactively enhance defenses through innovative tools and methodologies. Additionally, you will conduct … risk assessments, implement security controls, and support incident response efforts to minimize risks and maintain the integrity of our systems and data. We know that you can't have great technology services without amazing people. At MetroStar, we are obsessed withour people and have led a two-decade legacy of building the best and brightest teams. Because we know … think you can see yourself delivering our mission and pursuing our goals with us, then check out the job description below! What you'll do: Design, implement, and manage security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to ensure the organization's networks and systems remain secure. Conduct regular security assessments to More ❯
in safeguarding digital assets by designing, implementing, and maintaining robust cybersecurity infrastructure. You will work collaboratively with cross-functional teams to identify vulnerabilities, develop solutions, and ensure compliance with security protocols and industry standards. Staying informed about emerging trends and threats in the cybersecurity landscape, you will proactively enhance defenses through innovative tools and methodologies. Additionally, you will conduct … risk assessments, implement security controls, and support incident response efforts to minimize risks and maintain the integrity of our systems and data. We know that you can't have great technology services without amazing people. At MetroStar, we are obsessed withour people and have led a two-decade legacy of building the best and brightest teams. Because we know … think you can see yourself delivering our mission and pursuing our goals with us, then check out the job description below! What you'll do: Design, implement, and manage security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to ensure the organization's networks and systems remain secure. Conduct regular security assessments to More ❯
one dies from skin cancer. London based - Hybrid (3 days a week in the office) The role The Quality Systems Manager ensures the effectiveness of our quality and information security systems, supporting compliance with global medical device regulations. They lead audit preparation, certification efforts, and continuous system improvements. This role also supports the integration of AI-specific quality standards … ll be at the forefront of a cutting-edge AI product that's revolutionising medical diagnostics and transforming patient care. Key Responsibilities Oversee and develop our medical device Quality Management System (QMS) and Information SecurityManagement System (ISMS), ensuring compliance with ISO 13485, MDSAP, US FDA QSR, EU MDR and ISO 27001. Implement and secure certification for … an Artificial Intelligence Management System in line with ISO 42001 and/or equivalent CENELEC standard(s). Act as primary liaison for certification bodies and regulatory authorities during external audits and inspections. Oversee the drafting and updating of QMS, ISMS procedures, work instructions and forms; ensure effective document control and distribution. Oversee CAPA and complaint investigations for our More ❯
based - Hybrid (3 days a week in the office) As a Senior Clinical Safety Officer you will ensure clinical safety and compliance of our digital health products through risk management, safety governance, and regulatory documentation. This role directly supports safe scaling into new products, markets, and regulatory domains, while maintaining safety in existing services. Key Responsibilities Be a part … update safety cases and clinical ops after launch, and manage post-deployment monitoring and improvement and clinical governance processes Keep winning the NHS - ongoing support for all clinical risk management tasks and refining bigger picture safety processes. Cross functional working - working with internal teams and stakeholders eg. Product, Transformation, Clinical Operations and Client Operations Team with escalation of clinical … in dealing with triage clinical queries. Skin Analytics manufactures medical devices and complies with ISO standards 13485 and 27001. As part of your employment, you will be assigned Quality Management System (QMS) and Information SecurityManagement System (ISMS). We require that our employees agree to complete their assigned training and diligently follow all company quality managementMore ❯
solving advanced infrastructure and systems administration challenges. About the Role You will take ownership of resolving complex issues escalated from first and second line support, with responsibilities spanning infrastructure management, systems administration, application packaging and technical operations. This role also contributes to service continuity planning, change implementation and ongoing service improvement initiatives. Key Responsibilities Resolve advanced technical incidents and … enterprise or multi-supplier environment In-depth understanding of Microsoft technologies, Azure, M365, virtualisation and enterprise storage Hands-on experience with software packaging and deployment Knowledge of access and securitymanagement best practices Excellent communication, organisation and analytical skills Ability to manage multiple priorities and perform well under pressure Familiarity with IT service management tools and standards More ❯
solving advanced infrastructure and systems administration challenges. About the Role You will take ownership of resolving complex issues escalated from first and second line support, with responsibilities spanning infrastructure management, systems administration, application packaging and technical operations. This role also contributes to service continuity planning, change implementation and ongoing service improvement initiatives. Key Responsibilities Resolve advanced technical incidents and … enterprise or multi-supplier environment In-depth understanding of Microsoft technologies, Azure, M365, virtualisation and enterprise storage Hands-on experience with software packaging and deployment Knowledge of access and securitymanagement best practices Excellent communication, organisation and analytical skills Ability to manage multiple priorities and perform well under pressure Familiarity with IT service management tools and standards More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Police Digital Services
Services Directorate to ensure it meets its responsibilities to deliver National IT systems to UK Policing, and one of the core pillars of this Directorate will be the Product Management function. The objectives of this function are to ensure that products are fit for purpose, cost effective and meet the needs of all policing stakeholders. We are seeking a … skilled and customer-oriented Product Manager to join our Product Management team, with specific focus on the provision of managed Microsoft Azure and M365 environments. You will play a pivotal role in the product development process as well as the operational ?run' for Microsoft capabilities, delivering for both internal and external stakeholders across UK Policing. The role of Product … completed with limited supervision. The role will report to the Product Lead, but currently this role is awaiting being filled. The successful applicant will report to Head of Product Management in the interim. Why Join us? You can find out more here: Benefits - Police Digital Service (pds.police.uk) Key Responsibilities Strategic Planning : Develop and implement strategic plans for IT systems More ❯
and documentation to support the following skills and characteristics: Documented leadership skills. Extensive mentorship experience. Successful experience with the supervision of staff in a complex organization and the successful management of multiple programs in a higher education setting. Highly developed human relations skills, leading to the ability to work well with staff and volunteers of all levels and backgrounds … organization. Strong communication skills: written, oral, public speaking and listening. Strong planning and organizational skills, including ability to manage multiple relationships in a highly matrixed organization. Budget and financial management experience. Desire and ability to enact change, strong task orientation and high level of energy. Personal characteristics associate with successful academic professionals, including a vigorous work ethic, sound judgment … in 2018 to 50 in 2024. The school is building a strong momentum in externally funded research with increasing number of awards from the National Science Foundation, National Security Agency, Office of Naval Research, and other agencies. The school offers Bachelor of Science degrees in computer science, information technology, cybersecurity, cyber operations, cybersecurity engineering, and biomedical systems engineering. At More ❯
receipt and administration of incident alerts. To liaise with the Patient Safety Team's Patient Safety Quality and Data Assurance Officers To supply guidance and advice on reported data security and protection incidents To secure evidence relating to information incidents when required, whilst maintaining its integrity in line with forensic readiness best practice. To assist with and support activities … colleagues within the team to ensure that the Trust works towards compliance with nationally recognised standards and expectations. For example, but not limited to, ISO 27001 and NHS Data Security and Protection Toolkit - Cyber Assurance Framework (DSPT - CAF). About us We are the Mental Health & Learning Disability NHS Trust for County Durham and Darlington, Teesside, North Yorkshire, York … software; Word, Excel, Outlook Demonstrable knowledge to degree level in the following areas: UK Data Protection legislation (UK GDPR and Data Protection Act 2018) Information Governance topics including: Information Security, Confidentiality, Data Quality, Encryption and Data Transfer. Understanding of Trust Policies on Information Governance, Information Risk and Records Policies (or within agreed timescales). Ability to remain impartial at More ❯
The Senior Intelligence Analyst (Controlled Access Program Control Officer/Representative) will oversee, manage, and track Controlled Access Programs actions, including compartmented intelligence management, and oversee controlled access program control officer/representative policies to ensure secure access, handling ,and dissemination of classified intelligence. Key Responsibilities: • Oversee and enforce controlled access policies to ensure secure handling and dissemination of … need-to-know policies are upheld. • Manage Alternate Compensatory Control Measures (ACCM) processes for personnel, ensuring proper authorization and need- to-know policies are upheld. • Develop and implement access management strategies, ensuring compliance with national and agency-specific security directives. • Conduct classification reviews of intelligence products to ensure proper handling, storage, and dissemination of sensitive information. • Advise senior … leadership on access control best practices, compartmentalization policies, and risk mitigation strategies. • Coordinate with security officers, information assurance personnel, and classification management teams to uphold security and information sharing policies. Oversee the establishment, modification, and enforcement of access control lists (ACLs) for intelligence systems and databases. • Conduct periodic audits and compliance assessments to ensure adherence to CAPCO More ❯
to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. The Systems Security Engineering (SSE) is seeking a highly motivated and qualified Principal Systems Engineer (Level 3) for Program Protection and Supply Chain Risk Management. You will be responsible for performing system … security threat assessments and risk mitigation for the overall program, supply chain elements, processes, and actors and provide results. This position is located in Huntsville, Alabama and may offer a competitive relocation package. Specific duties to include, but are not limited to the following: Designs and implements security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and securitymanagement). Establishes and implements system security designs; additionally, you will assess and mitigate system security threats and risks throughout the program life cycle. Validates system security requirements definition and analysis. Verifies securityMore ❯
Overview: The Security Coordinator is responsible for coordinating, developing, and evaluating organizational security programs to ensure their effectiveness and alignment with company policies and regulatory requirements. This role involves supporting the implementation of security measures, identifying areas for improvement, and recommending resource needs. The position provides the opportunity to gain exposure to more complex tasks within the … security function. Responsibilities: Coordinate and support the development, implementation, and evaluation of security programs across the organization. Assess the effectiveness of current security measures and recommend improvements or additional resources as needed. Assist in ensuring compliance with internal policies and external regulations. Monitor security-related activities and contribute to incident response efforts as directed. Prepare reports … and documentation to support security initiatives and audits. Collaborate with departments to align security practices with operational needs. Gain exposure to complex security tasks and occasionally receive direction in multiple aspects of the work. Qualifications: Bachelor's degree in criminal justice, SecurityManagement, Information Security, or a related field. 2 to 4 years of More ❯
Certifications Required: CompTIA Security+ (required) About the Position We are seeking a Physical Security Specialist to support the administration, maintenance, and operation of our organization's physical security infrastructure in Doral, Florida. This critical role ensures the ongoing integrity, functionality, and security of our access control systems, video surveillance, and alarm systems. As a key member of … the security team, you will collaborate with cross-functional departments to ensure seamless operations and implement best practices in physical security management. Your contributions will directly support the protection of personnel, facilities, and critical infrastructure. Key Responsibilities System Administration: Operate, maintain, and troubleshoot the Lenel OnGuard Access Control System, including user profiles, badge issuance, access levels, and reporting. … Surveillance: Administer and support video monitoring systems, including Pelco camera systems, ensuring full coverage and proper storage of surveillance footage. Technical Troubleshooting: Diagnose and resolve issues related to physical security software, hardware, servers, and network interfaces. Systems Maintenance: Perform scheduled maintenance, software updates, patch management, and database backups to ensure optimal system performance. Department Collaboration: Work closely with More ❯
Job Description: Our client is seeking a National Industrial Security Program (NISP) Security Manager to support multiple clients primarily in the greater Northern Virginia area (NoVA/NCR). This is a full-time, immediate-hire position offering a competitive salary and comprehensive benefits. The selected candidate will oversee securitymanagement operations, serving as a Facility … Security Officer (FSO), Information Technology Personnel Security Officer (ITPSO), and Contract Program Security Officer (CPSO), ensuring compliance with all federal security requirements. Responsibilities: Manage and implement security policies and procedures in accordance with National Industrial Security Program Operating Manual (NISPOM) and 32 CFR Part 117. Serve as the FSO/ITPSO/CPSO, ensuring … compliance with all security regulations and client requirements. Maintain and oversee security accounts within Defense Information Security System (DISS), National Background Investigation Services (NBIS), and National Industrial Security System (NISS). Conduct security briefings, debriefings, and training for personnel. Ensure compliance with Defense Counterintelligence and Security Agency (DCSA) and Intelligence Community (IC) regulations. Develop More ❯
are inspired by making a positive impact through developing data driven solutions, FTI would appreciate the opportunity to learn more about you. We are seeking a highly qualified SAP Security Specialist to support the B-2 System Program Office (SPO) at Wright-Patterson Air Force Base, OH. In this role, you will serve as the primary liaison between the … Chief of the Security-Facilities Branch, the Site Security Lead, internal staff, and external agencies. The role involves managing a complex and diverse security program in strict compliance with U.S. Government regulations, including Dept. of Defense (DoD), SCI, and SAP requirements across multiple programs of varying size and scope. You will be the key point of contact … for all matters related to information, industrial, and personnel security. You will also ensure that all security integration efforts are thoroughly coordinated with the Advanced Programs and Integrated Functional Capability Branches. Additional key responsibilities include implementing, updating, and overseeing security policies and procedures within the B-2 Division to ensure full compliance with all relevant federal securityMore ❯
Senior Information Systems Security Officer (ISSO)/Project Manager Work Location: Reston, VA; work may also be performed at locations in the Washington, DC National Capital Region (NCR) (i.e., The District of Columbia; Arlington, Fairfax, Loudon, Prince William, and Stafford counties in VA (including incorporated cities) and Prince George and Montgomery Counties in Maryland and at additional CONUS Government … combatant commanders, as needed. Kwaan Tech is seeking a highly qualified professional to join our team in support of a government customer. We are looking for Senior Information Systems Security Officer (ISSO) to act as the onsite Project Manager for both on-premises and cloud-native environments. The Senior ISSO/Project manager will serve as an on-site … the effective performance of the contract, to include monitoring the work assignments of contractor personnel. The Senior ISSO shall have the detailed knowledge and expertise required to manage the security aspects of an information system and will be assigned responsibility for the day-to-day security operations of a system. Core Duties: Coordinate or participate in meetings as More ❯
supporting national priority programs through our strategic solutions in the areas of Information Technology, Test & Evaluation, Program Mission Support, Engineering & Analysis, and Training. Responsibilities As a Senior Information Systems Security Officer with AMERICAN SYSTEMS you will have the opportunity to do the following: Ensure the appropriate operational security posture is maintained for an information system and as such … works in close collaboration with the ISSM and ISO. Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Develop physical or logical topologies for a system, assist the ISSM in meeting their duties and responsibilities Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are … in place for clearing, sanitizing, and destroying various types of hardware and media Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure securityMore ❯
We are seeking a Site Security Director to lead and oversee the security operations of our facility, ensuring compliance with industrial, Special Access Programs (SAP), and Sensitive Compartmented Information (SCI) security requirements. This role requires a leader who is mission-oriented, deeply committed to protecting national security interests, and culture-driven, fostering an environment of accountability … trust, and excellence within the security team and across the organization. The ideal candidate will bring extensive experience in security program management, government regulations, and classified environments, while also demonstrating strong leadership, collaboration, and people development skills to create a superior security culture. On any given day, you will be responsible for: Security Leadership & Culture … Development Lead all aspects of the security program, ensuring compliance with DoD, IC, and federal security regulations (e.g., NISPOM, ICDs, DoDM 5205.07, 32 CFR Part 117, and other applicable directives). Establish and maintain a strong security culture that aligns with both mission-critical customer needs and employee engagement-ensuring security is not just a compliance More ❯
Trellix/Endpoint Security Engineer Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: CACI has an exciting opportunity for a Senior Endpoint Security Engineer to join our Transport & Cybersecurity Services (TCS) team in either Springfield … VA. Our Endpoint Security team is rapidly growing! This is one of several New positions that we have added to the TCS program. This is an exceptional opportunity for a TS/SCI cleared professional to join an incredibly talented team, work with cutting edge technologies, and propel your career within the Cyber realm! Responsibilities: TCS is a long … term, CACI Prime contract with the National Geospatial-Intelligence Agency (NGA) in support of the customer's GEOINT mission. The Endpoint Security Engineer will support our Intelligence Community customer's various endpoint security platforms. Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access. Provide engineering More ❯
Information Systems Security Manager SME role located at Peterson, SFB. Why ARS? Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous mission support.Awarded a Best Places to Work nominee since 2020, ARS recognizes that without our career- driven, loyal … Systems include fixed site, mobile, and airborne strategic Military SATCOM (MILSATCOM) terminals; aircrew alerting; strategic messaging; and PNVC capabilities. Responsibilities include: The ISSM (SME) serves as the Information System Security Manager (ISSM Advanced) and acts as technical advisor to the Program Manager (PM) and Systems Engineer (SE), are primarily responsible for maintaining the overall security posture of the … Component guidance. Participate in meetings/teleconferences, change control boards (CCBs) and working groups (WGs) to ensure the continued alignment of cybersecurity requirements in the technical baselines, the system security architecture, information flows, design, and the security controls. Evaluate system sources of changes such as Deficiency Reports (DRs), Problem Reports (PRs), Change Requests/Proposals (CRs/CPs More ❯
Cyber Security Consultant - Cloud - Manchester Cyber Security Consultant with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So … you should have good knowledge of security tooling and processes, compliance and securitymanagement (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of … GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with security complience (e.g. NIST, ISO, PCI DSS etc) Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders, as well as the ability to provide training More ❯
Cyber Security Consultant - Cloud - Manchester Cyber Security Consultant with a cloud background (AWS, Azure or GCP) is required to join our client's UK cybersecurity team. This in house role is predominantly advising on security best practices, vulnerability management and security standard compliance (e.g. NIST, ISO, PCI DSS etc), and leading audits and examinations. So … you should have good knowledge of security tooling and processes, compliance and securitymanagement (endpoint protection, cloud, SIEM etc). There is an opportunity to build out a cyber security team in the future with this role Skills & Experience Required: 3+ years of experience working in Cyber Security within an cloud environment (AWS, Azure of … GCP) Any experience with CrowdStrike/Endpoint Protection would be a bonus Good experience with security complience (e.g. NIST, ISO, PCI DSS etc) Strong Security standard knowledge and experience, consulting on a range of security policies and standards such as GDPR, ISO, PCI, NIST Confidence when speaking with stakeholders, as well as the ability to provide training More ❯
Reading: Senior Information Security Consultant European Bank for Reconstruction and Development Job Description Description -> As the Head of Information Security, you will report to the Director, Operational Risk Management (ORM) and be responsible for leading the Bank's Information Security risk identification and remediation activities. Responsibilities Measure and report on the implementation and compliance of the … Bank's Information Security framework (policies, procedures, guidance) throughout the organisation and verify the implementation of Information Security controls and evaluate their effectiveness. Manage internal teams and external consultants as they provide support in the delivery of risk mitigation activities. Influence and support change by aligning policy updates with new regulations and business needs and critically, emerging security threats. Manage the programmes which provide security oversight over internal IT and Business projects and external suppliers. Act as the Information Security SME to support the Bank's delivery of the new GRC solution, ensuring that existing solutions and services which deliver risk assessments, and third party supplier assurance assessments, are successfully transitioned over to the new More ❯
/PEO Installation Data Environment Repository (SPIDER), Visio, Microsoft Office Suite, Navy Data Environment (NDE), Open Architecture Retrieval System (OARS), Configuration Data Managers Database-Open Architecture (CDMD-OA), Configuration Management Professional (CMPro), Navy Tool for Interoperability Risk Assessment (NTIRA), NSERC, Assured Compliance Assessment Solution (ACAS), Enterprise Mission Assurance Support Service (eMASS) database, Federal Information SecurityManagement Act … Xacta Information Assurance (IA) Manager database, PEO C4I Risk Exchange Online Server Tool, Jira Online Tool, DoD Information Technology (IT) Portfolio Repository-DON (DITPR-DON), and DON Application Database Management System (DADMS). The salary for this position is $125,000-$135,000. Required Skills and Experiences: 10 years professional experience in configuration management Navy configuration management processes including (but not limited) engineering change request, ships alterations, temporary alterations, software document changes, and engineering change orders Must be a U.S. citizen A secret security clearance Degree Requirements: Bachelor's level degree in any field All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin More ❯
/PEO Installation Data Environment Repository (SPIDER), Visio, Microsoft Office Suite, Navy Data Environment (NDE), Open Architecture Retrieval System (OARS), Configuration Data Managers Database-Open Architecture (CDMD-OA), Configuration Management Professional (CMPro), Navy Tool for Interoperability Risk Assessment (NTIRA), NSERC, Assured Compliance Assessment Solution (ACAS), Enterprise Mission Assurance Support Service (eMASS) database, Federal Information SecurityManagement Act … Xacta Information Assurance (IA) Manager database, PEO C4I Risk Exchange Online Server Tool, Jira Online Tool, DoD Information Technology (IT) Portfolio Repository-DON (DITPR-DON), and DON Application Database Management System (DADMS). The salary for this position is $115,000-$125,000. Required Skills and Experiences: 3 years professional experience in configuration management Must be a U.S. … citizen A secret security clearance Degree Requirements: Bachelor's level degree in any field All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. ORBIS offers an excellent benefits package and a competitive salary in a professional atmosphere. More ❯