This position is contingent upon award. Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination … and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cyber Data Science Engineer provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to: Utilize analytical, statistical, and programming skills to collect, analyze … and interpret large cybersecurity data sets Develop data-driven solutions Analyze data sets found in the customer's vulnerability scanning, authorization, and configuration management tools Import and transform data into usable sets for analysis tools used by the customer (e.g., Tableau) Provide analysis and graphical presentations of collected metrics for IA compliance status reporting Support legacy visualization and situational More ❯
Full job description We are currently seeking a talented and motivated Facility Security Officer (FSO) to support our industrial security program in support of multiple contracts. The candidate will be a part of a collaborative team responsible for maintaining a compliant security program at SMX. This role will be on site. Essential Duties & Responsibilities Serve as FSO … for multiple Facility Clearances (FCLs) within the SMX security program in compliance with the 32 CFR Part 117, National Industrial Security Program Operating Manual (NISPOM) and other client-specific requirements. Serve as point of contact and develop and maintain positive working relationships with the Defense Counterintelligence and Security Agency (DCSA) and client-specific security. Develop, maintain, and … implement standard operating procedures and standard practices and policies to ensure compliance. Manage and process personnel security clearances (initial, reinvestigations) utilizing DISS and NBIS systems to include records management in SIMS. Develop, conduct, and track required in-house training and briefings in support of the industrial security program, including initial, annual refresher, foreign travel, courier, derivative classification More ❯
supporting national priority programs through our strategic solutions in the areas of Information Technology, Test & Evaluation, Program Mission Support, Engineering & Analysis, and Training. Responsibilities As a Senior Information Systems Security Officer with AMERICAN SYSTEMS you will have the opportunity to do the following: Ensure the appropriate operational security posture is maintained for an information system and as such … works in close collaboration with the ISSM and ISO. Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Develop physical or logical topologies for a system, assist the ISSM in meeting their duties and responsibilities Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are … in place for clearing, sanitizing, and destroying various types of hardware and media Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure securityMore ❯
Job Number: R Cybersecurity Architect The Opportunity: As a Cybersecurity Architect at Booz Allen, you'll support the program management of a suite of cybersecurity tools, deliver a Zero T rus t Architecture roadmap, and develop an Enterprise Integration Strategy for Modernization, artifi cia l intelligence ( AI ) , and machine learning ( ML ) capabilities. You'll coordinate work with in-house … and go where the industry is going. You'll lead the team through a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs. This is a chance to make a difference in the security of cyber defense network environments. Your technical expertise will be vital as you help … customers overcome their most difficult challenges by integrating secure practices such as SIEM, SOAR, CI, and CD, endpoint securitymanagement, and advanced analytics. You'll be able to broaden your skillset into areas such as Zero T rus t Architecture, AI and ML-informed response, automation and orchestration of security events, and Cloud-based security, while More ❯
and international organizations. With over 60 years of experience, Amentum supports the execution of complex and critical missions by providing global logistics and stability operations, technical services and national security solutions to customers around the world. Amentum has a workforce of approximately 50,000 people in over 80 countries on all seven continents and is headquartered in Chantilly, VA. … Job Description This position is contingent upon several items including, but not limited to, contract award, security processing, ability to pass a CI polygraph and position availability, which may lead to a lengthy hiring process. The PSS provides support for security assessment investigations, including background investigations, periodic reinvestigations, and security clearances. Employment suitability determinations and continuous evaluation … of employees to ensure eligibility for employment. Independently develops various types of manuals, forms, instructions, and the like, to facilitate operation of the FBI Security Program. Participates in special projects such as planning the implementation of new or revised programs. Conducts exhaustive and extensive checks in accordance with the FISs, Federal guidelines, policies and procedures. Demonstrates innovative and imaginative More ❯
and international organizations. With over 60 years of experience, Amentum supports the execution of complex and critical missions by providing global logistics and stability operations, technical services and national security solutions to customers around the world. Amentum has a workforce of approximately 50,000 people in over 80 countries on all seven continents and is headquartered in Chantilly, VA. … Job Description This position is contingent upon several items including, but not limited to, contract award, security processing, ability to pass a CI polygraph and position availability, which may lead to a lengthy hiring process. The PSS provides support for security assessment investigations, including background investigations, periodic reinvestigations, and security clearances. Employment suitability determinations and continuous evaluation … of employees to ensure eligibility for employment. Independently develops various types of manuals, forms, instructions, and the like, to facilitate operation of the FBI Security Program. Participates in special projects such as planning the implementation of new or revised programs. Conducts exhaustive and extensive checks in accordance with the FISs, Federal guidelines, policies and procedures. Demonstrates innovative and imaginative More ❯
months Job role The IT Operations Manager is responsible for ensuring the smooth, secure, and efficient operation of the organisation's IT environment. This role oversees the management and optimisation of IT infrastructure, networks, systems, and cloud services, while leading the IT Support Desk to deliver high-quality, responsive technical assistance to end users. The postholder will plan and … aligned with organisational goals. Working closely with stakeholders across the business, the IT Operations Manager will drive continuous improvement, manage suppliers and service levels, and uphold best practices in security, availability, and service delivery. Key Responsibilities Service Desk & End-User Support Microsoft 365 Administration Service Management & Reporting HALO ITSM Administration Infrastructure & Project Delivery Infrastructure Support & Maintenance RMM, Patch … SecurityManagement Data Backup & Business Continuity Security & Compliance Cyber Security Network & Telephony Management Leadership & People Management ECS Recruitment Group Ltd is acting as an Employment Business in relation to this vacancy. More ❯
looking for a hands on IT Operations Manager who is responsible for ensuring the smooth, secure, and efficient operation of the organisation's IT environment. This role oversees the management and optimisation of IT infrastructure, networks, systems, and cloud services, while leading the IT Support Desk to deliver high-quality, responsive technical assistance to end users. The postholder will … aligned with organisational goals. Working closely with stakeholders across the business, the IT Operations Manager will drive continuous improvement, manage suppliers and service levels, and uphold best practices in security, availability, and service delivery. Key Responsibilities Service Desk & End-User Support Microsoft 365 Administration Service Management & Reporting HALO ITSM Administration Infrastructure & Project Delivery Infrastructure Support & Maintenance RMM, Patch … SecurityManagement Data Backup & Business Continuity Security & Compliance Cyber Security Network & Telephony Management Leadership & People Management ECS Recruitment Group Ltd is acting as an Employment Agency in relation to this vacancy. More ❯
months Job role The IT Operations Manager is responsible for ensuring the smooth, secure, and efficient operation of the organisation's IT environment. This role oversees the management and optimisation of IT infrastructure, networks, systems, and cloud services, while leading the IT Support Desk to deliver high-quality, responsive technical assistance to end users. The postholder will plan and … aligned with organisational goals. Working closely with stakeholders across the business, the IT Operations Manager will drive continuous improvement, manage suppliers and service levels, and uphold best practices in security, availability, and service delivery. Key Responsibilities Service Desk & End-User Support Microsoft 365 Administration Service Management & Reporting HALO ITSM Administration Infrastructure & Project Delivery Infrastructure Support & Maintenance RMM, Patch … SecurityManagement Data Backup & Business Continuity Security & Compliance Cyber Security Network & Telephony Management Leadership & People Management ECS Recruitment Group Ltd is acting as an Employment Business in relation to this vacancy. More ❯
looking for a hands on IT Operations Manager who is responsible for ensuring the smooth, secure, and efficient operation of the organisation's IT environment. This role oversees the management and optimisation of IT infrastructure, networks, systems, and cloud services, while leading the IT Support Desk to deliver high-quality, responsive technical assistance to end users. The postholder will … aligned with organisational goals. Working closely with stakeholders across the business, the IT Operations Manager will drive continuous improvement, manage suppliers and service levels, and uphold best practices in security, availability, and service delivery. Key Responsibilities Service Desk & End-User Support Microsoft 365 Administration Service Management & Reporting HALO ITSM Administration Infrastructure & Project Delivery Infrastructure Support & Maintenance RMM, Patch … SecurityManagement Data Backup & Business Continuity Security & Compliance Cyber Security Network & Telephony Management Leadership & People Management ECS Recruitment Group Ltd is acting as an Employment Agency in relation to this vacancy. More ❯
across the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Information Assurance Analyst - Mid Level will support the Overseas Buildings Operations (OBO) Information System Security Officer (ISSO). The Senior Analyst will act as a subject matter expert (SME) for Federal Assessments & Authorizations (A&A); provides sound advice and recommendations to lower risk and … improve the overall defensive posture. Responsibilities Essential Job Functions: Assist in performing risk and vulnerability assessments on OBO systems to identify and mitigate potential security risks. Collaborate with the ISSO and senior team members to analyze risks and recommend security measures. Assist in planning and preparation for security Assessment and Authorization (A&A) as part of the … Department's Information Assurance policy and Federal Information SecurityManagement Act (FISMA) implementation efforts Help implement information security policies, procedures, and guidelines developed in collaboration with senior staff. Conduct risk assessments, vulnerability assessments, and system audits to identify potential security threats to OBO information systems. Provide recommendations to mitigate identified risks and ensure compliance with applicable More ❯
POSITION: Information Systems Security Engineer LOCATION: Colorado Springs, CO REQUIRED SECURITY CLEARANCE: Active TS with SCI; willing to take CI polygraph POSITION TYPE/STANDARD WORK HOURS: Full time, 40 hours THE OPPORTUNITY: Upon award, BTAS will be filling potential openings for the Space Systems Command (SSC). SSC plays a critical role in advancing the United States … located near Wright-Patterson Air Force Base in Beavercreek, OH. We have earned national and regional awards in the Department of Defense for our proven IT, Engineering, and Program Management capabilities. We are committed to working with exceptional quality and professionalism to deliver excellence to our customers, while providing our employees a stimulating and satisfying work environment as we … manage program Authority to Operate, Authority to Test, Authority to Connect, and Interim Authorities. Support cyber testing and assessment activities, documenting findings and corrective actions per the Federal Information SecurityManagement Act. Develop draft intelligence requirements and staffing packages. Advise on intelligence reports and translate program requirements into intelligence needs. Recommend courses of action to support mission-related More ❯
design, develop, test, and employ an effects-based simulation toolkit. This is a rare opportunity to create tools to generate viable data for use in analysis to inform national security decisions. You will provide technical advice as well as design and implement Continuous Integration and Continuous Delivery (CI/CD) patterns to enable analytical toolkit modernization to meet customers … a high-performance environment using Agile Software Development processes to support system design, architecture, application development, integration, deployment, and maintenance. Create, develop, and implement solutions to address infrastructure and security requirements. Identify the needs for building automation, designing, and implementing CI/CD solutions. Consult on DevSecOps requirements from diverse applications/lines of customers. Create plug-and-play … code quality checks, and deployment best practices are followed. Monitor and manage logging systems to track performance and troubleshoot issues. Automate repetitive tasks to improve team efficiency. Conduct regular security audits and assist in addressing findings. Maintain documentation of infrastructure, processes, and procedures and ensure knowledge share with the team. Build or maintain CI/CD building blocks and More ❯
Top Skills' Details Active: TS/SCI - with ability to obtain a polygraph Oracle experience, Oracle Exadata experience preferred. Oracle Identity Management (OIM) experience preferred Cloud migration experience Previous ICAM experience a plus. Job Description YSI is seeking a Senior DBA Engineer to join our growing team in support of a high-profile federal customer based in the Washington … will be managing and optimizing performance across both on-prem and cloud-based platforms. This is an exciting opportunity to work on mission-critical systems that directly support national security objectives. • Respond to Tier-3 and 4 service tickets and special projects with senior level engineering • Must have a Top-Secret Clearance with ability to obtain SCI-Poly • Bachelor … infrastructure, application, and DBA teams for successful cloud adoption and modernization efforts. Exadata Skills: • Exadata Architecture: Strong understanding of Exadata components, architecture, and how Exadata optimizes database performance. • Storage Management: Experience with Exadata Storage Server, Smart Scans, and Hybrid Columnar Compression. • Performance Tuning: Expertise in database performance tuning specifically on Exadata. • Backup & Recovery: Experience with Exadata backup and recovery More ❯
Arlington, Virginia, United States Hybrid / WFH Options
CGI
Position Description: CGI Federal has an exciting opportunity for a Linux Systems Administrator within our Intel sector advancing the national security mission through cutting edge technology. You must have a passion for keeping pace with rapidly evolving technology advancements and leveraging your knowledge on a highly collaborative team to deliver state-of-the-art capabilities. The Linux Systems Administrator … manages and maintains an organization's Linux-based servers and infrastructure, ensuring their stability, security, and optimal performance. Key responsibilities include installing and configuring systems, managing user accounts, monitoring system health, implementing security protocols, performing backups and recovery, and automating tasks with scripting languages like Bash or Python. They also troubleshoot issues, apply patches and upgrades, maintain system … model is acceptable. Your future duties and responsibilities: • System Installation and Configuration: Install, configure, and maintain Linux operating systems and applications on physical and virtual servers. • User and Access Management: Create and manage user accounts, groups, and permissions, ensuring access control and security protocols are followed. • System Monitoring: Continuously monitor server performance, resource consumption, and system logs to More ❯
Company Overview: At CenCore Group, we take security solutions from the industry standard to the CenCore standard. CenCore Group specializes in designing, building, securing, and maintaining AI ecosystems at the intersection of big technology and national security. CenCore Group strives to be the trusted and primary source for insight, analysis, and implementation of physical and digital security solutions … of artificial intelligence and machine learning in the NatSec space. We are seeking a qualified Construction Surveillance Technician (CST) for a short-term contract position. With a Top-Secret security clearance or higher to join our dedicated team. Job Summary: The Compliance Program Manager will be responsible for the oversight, development, and implementation of compliance strategies within secure data … data center operations. • Develop and maintain compliance programs aligned with DoD, DNI, and other federal guidelines (NISPOM, ICD 705, CMMC, etc.). • Partner with FSO, ISSM/ISSO, and security teams to manage incident response, access control, and visitor control protocols. • Conduct periodic internal audits, assessments, and risk analyses of classified facility operations. • Collaborate with engineering, IT, and facility More ❯
expertise across the cybersecurity field provides customized solutions to our customer's unique needs. Summary: The Senior Information Assurance Analyst will support the Overseas Buildings Operations (OBO) Information System Security Officer (ISSO). The Senior Analyst will act as a subject matter expert (SME) for Federal Assessments & Authorizations (A&A); provides sound advice and recommendations to lower risk and … improve the overall defensive posture. Responsibilities Essential Job Functions: Assist in planning and preparation for security Assessment and Authorization (A&A) as part of the Department's Information Assurance policy and Federal Information SecurityManagement Act (FISMA) implementation efforts Conduct risk assessments, vulnerability assessments, and system audits to identify potential security threats to OBO information systems. … Provide recommendations to mitigate identified risks and ensure compliance with applicable regulations and standards. Provide support for and where necessary to create security documentation for the required phases of the DOS A&A process in support of obtaining Authority to Operate (ATO) approvals of OBO systems Perform Security Impact Analysis (SIA) review of change requests and provide reporting More ❯
Peerless is looking for an Information Systems Security Officer candidate to oversee the information SecurityManagement function within the Air Force Civil Engineering Center (AFCEC), including the development, documentation, implementation, operation, and maintenance of an information Security program, and manages ongoing activities to preserve the availability, integrity, and confidentiality of organization information resources in compliance with … applicable security policies and standards. Safeguards the organization's computers, networks and data against threats, such as Security breaches, computer viruses, or attacks by cyber-criminals, avoiding loss of confidential information, lost revenue, and fines from regulatory agencies for failing to protect data. Manages staff, providing line management, leadership, motivation and strategic direction. communicates regularly with other … managers and brings the organization's information Security risks under explicit management control. Requirements: Familiarity with Meters such as Nexus, Schneider, EMON, Elster A3, and Shark is preferable Familiarity with the AF meter security specifications and DOD guidance with the ability to identify compliant devices as well as the ability to identify configuration options based upon the More ❯
Summary Chenega Corporation is seeking a highly skilled and motivated Information Systems Security Manager (ISSM) to join our team in support of the Naval Sea Systems Command (NAVSEA). As an ISSM, you will play a critical role in ensuring the security and integrity of our information systems, supporting large-scale government operations with cutting-edge technology. This … and implement a comprehensive cybersecurity strategy that aligns with NAVSEA's mission and evolving threat landscape. Lead the identification, assessment, and mitigation of cybersecurity risks, balancing operational needs with security requirements. Establish and maintain security policies, procedures, and standards that meet or exceed DoD and NAVSEA best practices. Ensure adherence to all relevant security regulations, including NIST … RMF, DoD STIGs, and NAVSEA-specific mandates. Promote a strong security culture within the organization, fostering awareness and proactive engagement through training programs. Lead and mentor a team of cybersecurity professionals, fostering a high-performing and collaborative environment. Develop and implement an effective incident response plan, ensuring swift detection, containment, and remediation of security incidents. Establish a robust More ❯
Arlo Solutions is seeking an experienced Insider Threat Information Technology (IT) Portfolio Support Specialist to provide direct support to the Office of the Under Secretary of Defense for Intelligence & Security (OUSD(I&S . This role will play a critical part in advancing enterprise-wide insider threat (InT) IT initiatives, ensuring compliance with Department of Defense (DoD), Intelligence Community … IC), and federal IT security standards, and providing portfolio management support across multiple mission areas. Location: Arlington, VA Clearance: Active TS/SCI Key Responsibilities Enterprise Architecture Development: Collaborate with DoD Components to design and evolve enterprise architecture frameworks that integrate security systems across the DoD Insider Threat enterprise. Contribute to the development and sustainment of hundreds … of DoD InT architecture artifacts. Ensure architecture content is captured, maintained, and stored within OUSD(I&S) knowledge repositories. Knowledge Management & Compliance: Provide knowledge management support for DoD InT business processes and IT system data. Ensure architecture alignment with DoD and IC standards within the Defense Security Enterprise (DSE) mission area. Drive compliance with DoD Chief Information More ❯
delivery. Maintain strong relationships with internal supplier resolver teams. Ensure a seamless experience for the customer through effective operations. Essential Skills (Please ensure your CV reflects these skills) SOC (Security Operations Centre) experience. Cyber security expertise Securitymanagement Risk management proficiency Technical support experience Operational analysis skills Why Work Here? Join an environment that values … Contacting Us" section of our Online Privacy Notice at (url removed)/en-gb/privacy-notices for details on how to contact us. To protect your privacy and security, we may take steps to verify your identity, such as a password and user ID if there is an account associated with your request, or identifying information such as More ❯
team. This role focuses on two critical areas: operational support for GDPR compliance , particularly handling Data Subject Access Requests (DSARs ), and ensuring day-to-day adherence to their Information SecurityManagement System (ISMS). Key Responsibilities of the Data Protection Officer: 1. GDPR Compliance & DSAR Handling Act as the main point of contact for receiving, investigating, and responding … audit requirements. Provide input on GDPR matters where necessary, without being responsible for policy creation or process design. 2. ISMS Oversight & Compliance Support the ongoing maintenance of the Information SecurityManagement System (ISMS) . Conduct regular checks and reviews to confirm that existing security policies and processes are being followed. Identify gaps in compliance and follow up More ❯
Northampton, Northamptonshire, England, United Kingdom
VIQU IT Recruitment
team. This role focuses on two critical areas: operational support for GDPR compliance , particularly handling Data Subject Access Requests (DSARs ), and ensuring day-to-day adherence to their Information SecurityManagement System (ISMS). Key Responsibilities of the Data Protection Officer: 1. GDPR Compliance & DSAR Handling Act as the main point of contact for receiving, investigating, and responding … audit requirements. Provide input on GDPR matters where necessary, without being responsible for policy creation or process design. 2. ISMS Oversight & Compliance Support the ongoing maintenance of the Information SecurityManagement System (ISMS) . Conduct regular checks and reviews to confirm that existing security policies and processes are being followed. Identify gaps in compliance and follow up More ❯
This is a contingent opportunity The ISSO is responsible for the administration and management of the Information Security program for Headquarters United States Space Force (HQ USSF) Staff Security Office. Duties: Provide Information Systems Security Officer duties for USSF, to include coordination of software and hardware change/problem resolution, account access, data transfers, scanning, and … copying data to/from external media; Attend required technical and security training (e.g. Operating system, networking, securitymanagement) relative to assigned duties; Maintain compliance for designated HQSF locations throughout HQSF Area of Responsibility (AOR) IAW AF, DoD and IC guidance; Conduct annual Cyber Assurance self-assessments and program reviews for all assigned SCI and/or … years experience in cybersecurity and Network Infrastructure Working knowledge if Local Area Network (LAN) and Wide Area Network (WAN) technologies and data backup technologies to include Communication Security (COMSEC) integration Working-level knowledge of applicable security policy manuals, DCIDs, JAFANs, and other policy documents. Certification: Security+ is required Clearance: Active TS/SCI clearance Benefits : K2 Group's More ❯
for smart meters is transforming Britains energy system and helping the countrys fight against climate change: we want you to be part of our journey. The role: The Information Security Assurance Manager is a hands-on, multi-disciplinary role combining project assurance, governance, risk management, and compliance. You will work across business units, projects, and suppliers to ensure … security is embedded in everything we dofrom design to delivery. You will also support the development and maintenance of our Information SecurityManagement System (ISMS), lead internal audits, and provide expert guidance on risk mitigation and regulatory compliance. Key Responsibilities: Security Assurance & Project Engagement Provide end-to-end security assurance across the Licence Renewal programme … Attend programme meetings to represent Information Security and provide expert guidance. Review technical documentation (e.g., designs, network diagrams, data flows) to ensure alignment with security policies and architecture. Conduct Information Security Impact Assessments and Data Protection Impact Assessments. Support penetration testing and vulnerability assessments, tracking remediation to closure or handover to BAU. Translate technical risks into business More ❯