Job Title: Information Security Manager Basis: Full-time, permanent Location: Canary Wharf, London - WeWork Reporting to: Co-founder About Onetrace Great products start with great people. Our relentless focus on user experience has been the cornerstone of our growth, helping us become the market leading software for fire protection subcontractors across the UK. We've grown by staying obsessed … matter, and your work shapes what comes next. Want to learn more about our journey? Check out our LinkedIn page. About the Role We're looking for an Information Security Manager to lead the systems, practices, and frameworks that protect Onetrace's data, people and infrastructure as we grow. This is a cross-functional, hands-on role with a … strong strategic lens -you'll own our information security posture end-to-end, ensuring we maintain our ISO 27001 accreditation, while preparing for other relevant accreditations (such as SOC2 and Cyber Essentials). You'll proactively manage risks and help create a secure environment where teams can move fast without compromising on trust or safety. You'll also guide More ❯
connected powerhouse of diverse teams and take your career wherever you want it to go. Join EY and help to build a better working world. Government & Public Sector - Cyber Security Risk - Architect From strategy to execution, the Government & Public Sector practice of Ernst& Young provides a full range of consulting and audit services to help our Federal, State, Local … GPS). This role is part of our Cybersecurity - Strategy, Risk, Compliance & Resiliency ("SRC&R") team within our Service Delivery Center. This team assists our clients with aligning a securitymanagement strategy with their business goals by assessing, designing, training, implementing and operating cybersecurity processes and solutions. This function is supported by our strategic alliances with third-party … cybersecurity troubleshooting, analysis, and technical expertise, oversees the work of junior team members, and serves as escalation point for more complex technical issues. Your Key Responsibilities Design and assess security architecture for technologies such as SaaS, PaaS, laaS, AI/ML, and Zero Trust Architecture (ZTA) Develop and implement application and cloud security architectures, primarily in AWS as More ❯
Lead_Analyst Information Security Governance Risk Compliance Job Category : Information Security and Compliance Requisition Number : LEADA001461 Apply now Posted : July 10, 2025 Full-Time Remote Locations Showing 1 location Remote, EMEA 00000, GBR Description Title: Lead Analyst, Information, Security, Governance, Risk and Compliance Location: Remote-UK Salary: £60,000/annually About PSI We are PSI Services. … is critical to our success. That's why you'll find these ideals are intrinsic to our company culture and applied throughout the employee lifecycle. The Lead Analyst, Information Security - GRC plays a key role in supporting PSI's commitment to data security, privacy, and compliance. This role is responsible for driving core activities across quality, risk management, Information Security, data protection, and audit readiness to ensure the organization meets ISO, PCI, SOC 2, and other relevant standards. The position helps deliver assurance to stakeholders that PSI prioritizes the security and privacy of its data and systems. This is a full-time, permanent role, Monday to Friday, with flexible working hours around a standard More ❯
immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. Responsibilities: • Assisting technical/management leadership on major tasks or technology assignments • Establishing goals and plans that meet project objectives • Assisting in direction and control activities, having overall responsibility for securitymanagement, methods, and staffing to ensure that technical requirements are met • Participating in client negotiations and interfacing with senior management • Supporting decision making and domain knowledge that may have a critical impact on overall project implementation • Providing support to plan, coordinate, and implement a cybersecurity lab's information security - Providing support for facilitating and helping the lab identify … its current security infrastructure and define future programs, design and implementation of security related to lab systems • Assisting the efforts of security staff to design, develop, engineer and implement solutions to security requirements • Implementing and development of the DHS IT security standards • Gathering and organizing technical information about the lab's mission goals and needs More ❯
Position Title: Information Systems Security Engineer (ISSE) Security Clearance: Top Secret/SCI Eligible (verifiable in DISS) Position Location: Washington, D.C. (five days a week on-site) Employment Status: W2/Independent Consultant/1099 (Full-time) Travel: No Tentative Start Date: ASAP Compensation/Hourly Rate: Negotiated during the final interview Position Description: We are seeking a … highly skilled Information Systems Security Engineer (ISSE) to provide cybersecurity support as a member of a Risk Management Framework (RMF) Team. The candidate should possess an expert knowledge of RMF/Authority to Operate (ATO) package requirements and eMASS. The ISSE will support the Information System Security Manager (ISSM) and Program Manager (PM)/Information System Owner … with NIST/CNSS guidance. The ISSE will guide efforts to obtain and maintain RMF ATO requirements within the customer's complex network infrastructure, spanning multiple platforms, networks and security enclaves. Job requirements (minimum): RMF and A&A Support: Provide Risk Management Framework (RMF) and Assessment and Authorization (A&A) support, including developing and maintaining systems' Authority to More ❯
Eagle Harbor, a subsidiary of Three Saints Bay, LLC and a federal contracting leader is looking for an Information Systems Security Engineer. The Information System Security Engineer supports the Information System Security Manager (ISSM) and the National Training Center (NTC) security and management staffs with the deployment, development, operation, and maintenance of NTC cyber security solutions and supports the NTC Information System Security Officer (ISSO) by providing technical subject matter expertise during the assessment and authorization (A&A) of NTC information systems in accordance with the Federal Information SecurityManagement Act (FISMA) and Department of Energy (DOE) requirements. The ISSE also reviews audit data for suspicious activity to protect information and … prevent unauthorized access, performs asset vulnerability and compliance audits, reviews change requests, and hardware and software requests. The ISSE responds to computer security incidents and participates in exercises as a member of the NTC Incident Response Team. The Information System Security Engineer responsibilities and duties are as follows: Description of Responsibilities: • The Information Systems Security Engineer (ISSE More ❯
Responsibilities: Lead and execute Security Assessment and Authorization (SA&A) activities for assigned systems, ensuring full compliance with Risk Management Framework (RMF) and Security & Privacy Assessment & Authorization (SPAA) Handbook guidance. Prepare, update, and maintain security authorization packages for Authorization to Operate (ATO) and Authorization to Test (ATT), including System Security Plans, Configuration Management Plans … DOJ-approved templates, with meticulous attention to detail (including formatting, grammar, and compliance). Conduct and document annual core controls assessments, periodic vulnerability and compliance scans, audit log reviews, Security Impact Analyses (SIAs), and risk-based decision memoranda with actionable remediation and mitigation plans. Oversee Plan of Action and Milestones (POA&M) development, tracking, and reporting; ensure weaknesses, vulnerabilities … and mitigation milestones are promptly documented, managed, and independently closed per DOJ policy. Maintain and update system security documentation and records (e.g., ATO, ATT, ISCP, IRP, CMP, POA&M, BIA, IPA, PIA, RIMcert) in the Joint Cybersecurity Assessment Management (JCAM) system as operational events require. Ensure ongoing information system compliance through continuous monitoring (CM), including periodic review and More ❯
of our customer's cybersecurity program, ensuring the protection and resilience of our information systems and networks. This position requires a deep understanding of cybersecurity principles, DoD systems, and security protocols, as well as the ability to lead and implement complex security initiatives across the organization. The ideal candidate will have extensive experience in cybersecurity, particularly within the … DoD environment. You should be well-versed in Risk Management Framework (RMF), NIST standards, and DoD cybersecurity directives. Strong leadership and program management skills are essential, as you will be responsible for guiding the overall direction of our cybersecurity efforts. Responsibilities: The Cyber Analyst responsibilities will include, but not be limited to: Lead and coordinate all aspects of … the organization's cybersecurity program. Develop and implement strategic cybersecurity plans aligned with organizational goals and DoD requirements Oversee the implementation of security controls and ensure compliance with DoD cybersecurity policies and regulations Manage and coordinate security assessments, vulnerability scans, and penetration testing activities Lead the development and maintenance of cybersecurity documentation, including policies, procedures, and incident response More ❯
seeking a skilled and experienced Cybersecurity Analyst to serve as a Cyber Control Assessor. In this critical role, you will be responsible for evaluating and validating the implementation of security controls across our customer's information systems and networks. This position requires a deep understanding of cybersecurity principles, risk management frameworks, and DoD security requirements. The ideal … candidate will have extensive experience in cybersecurity, particularly in assessing and implementing security controls within the DoD environment. You should be well-versed in the Risk Management Framework (RMF), NIST standards, and DoD cybersecurity directives. Strong analytical skills and attention to detail are essential for this role. Responsibilities: Conduct comprehensive assessments of security controls across information systems … and networks Evaluate the effectiveness of implemented security measures and identify potential vulnerabilities Develop and maintain RMF documentation, including System Security Plans (SSPs) and security assessment reports Perform security control validation using various tools and methodologies Collaborate with system owners and IT teams to implement and improve security controls Provide recommendations for remediation of identified More ❯
Technical Director Location: 471 East C Street Norfolk, Virginia 23511 Clearance Level: Active DoD - Secret Required Certification(s): DoD IAM Level II Certification. Certified Authorization Professional (CAP), CompTIA Advanced Security Practitioner (CASP+) CE, Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP) or Associate, GIAC Security Leadership Certification (GSLC) or Higher-level certification. SUMMARY … Provide the Military Sealift Command (MSC) Business Systems Branch with program management, systems engineering, software development and integration, advanced data services, and customer focused operational support. As technology evolves, introduce emerging technologies, embrace forward-looking strategies, and implement new and/or significant enhancements to existing Business Systems. The ISSO Team Lead protects all MSC Business Systems information and … information systems in a manner that is commensurate with the national security classification level, sensitivity, value, and criticality of the information, including protecting MSC Business Systems information from unauthorized disclosure, destruction, or modification while the information is being collected, processed, transmitted, stored, or disseminated. JOB DUTIES AND RESPONSIBILITIES The ISSO Team Lead support includes: Managing the security of More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Gordons
You don't need to be a lawyer to be a leader in this supportive and inclusive professional environment. Just be yourself. And start by being a totally uniqueInformation Security Graduate. ABOUT ADDLESHAW GODDARD As an international law firm working for many thousands of leading organisations in over 100 countries, we don't deal in typical problems, typical solutions … Leeds and Edinburgh offices but they support the entire global business. These teams all work closely together to find innovation solutions and provide the best possible service. The Information Security team is instrumental in ensuring the firms security certifications are compliant and all regulations are in place. Our two-year Information Security Graduate programme is designed to … equip you with the knowledge, skills and experience to become an Information Security specialist in a large organisation. Based in our Manchester office, you will gain hands on experience with our Information Security team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and Compliance, Security Certifications More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Tussell Limited
don't need to be a lawyer to be a leader in this supportive and inclusive professional environment. Just be yourself. And start by being a totally unique Information Security Graduate. The IT teams are Addleshaw Goddard are located across our London, Manchester, Leeds and Edinburgh offices but they support the entire global business. These teams all work closely … together to find innovation solutions and provide the best possible service. The Information Security team is instrumental in ensuring the firms security certifications are compliant and all regulations are in place. Our two-year Information Security Graduate programme is designed to equip you with the knowledge, skills and experience to become an Information Security specialist in … a large organisation. Based in our Manchester office, you will gain hands on experience with our Information Security team and exposure to our wider IT teams. You will build knowledge in the following areas: Risk Management, Policy and Compliance, Security Certifications, Supplier Due Diligence, Incident Response and Awareness, and Security Awareness, as well as working on More ❯
Description: Systems Security Administration (SSA) Management Team Lead (15.23) OCT Consulting is a business management and technology consulting firm that provides support to Federal Government clients. We provide consulting services in the areas of Strategy, Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology. Responsibilities and Duties OCT currently has … an opening for a Systems Security Administration (SSA) Management Team Lead to work with a technology division within the Federal Bureau of Investigation (FBI). This role will require strong leadership and information system skills. The contractor shall oversee several Systems Security Administrators and advise on risk, compliance and security, as described below. This position is … contingent upon contract award. Day to day responsibilities include: Support change management processes and ensure SSA controls are consistently implemented and applied Provide system security project management support. Provide status reporting of security activities to include risk posture and compliance. Identify Information System SSA gaps and offer mitigation strategies. Advise on new user account profiles and More ❯
SAVA is hiring a Cybersecurity Management Specialist to support a critical Information Technology role at the U.S. Army Test and Evaluation Command (ATEC), located at Aberdeen Proving Ground, MD. The ideal candidate will exhibit exceptional customer service, deep subject matter expertise, a strong work ethic, and a steadfast commitment to the mission. Responsibilities Serve as a Subject Matter Expert … in the development, implementation, maintenance, and interpretation of cybersecurity plans, policies, and procedures across a range of areas, including but not limited to: configuration management, contingency and disaster recovery, incident response, account and access management, and media control. Provide incident response support in accordance with established protocols and best practices. Perform cybersecurity assessments and inspections. Conduct risk management … Perform scanning, analysis and remediation with the Enterprise provided tool and provide reports. Create, update, and implement cybersecurity policies and procedures aligned with DoD regulatory compliance requirements and information securitymanagement frameworks, including NIST SP 800-37 and the DoD Risk Management Framework (RMF). Review and support Authorization and Assessment (A&A) packages by evaluating securityMore ❯
Agile is seeking an Information Systems Security Officer -, responsibilities include the following: Active TS/SCI clearance is required: Certification Requirements: CISM and one of the Following: (CGRC), Certified in Risk and Information Systems Control (CRISC), Information Systems SecurityManagement Professional (ISSMP), Certified Information Systems Auditor (CISA), Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH … principal advisor to the Authorizing Official (AO) and System/Service Owner (SO) on all matters involving information system security. Develop, implement, assess, and maintain system-level information system security controls in accordance with Department of Justice, NIST 800-53, and other federal regulations. Support data calls, audits, system security assessments & authorizations, continuous monitoring, and ongoing authorizations. Work … with the System Owner to categorize the information system, identify the appropriate control baseline, and assess correlating security controls. Create, capture, and maintain artifacts and documented processes to support control assessment results Qualifications: Minimum of 2 years of hands-on experience and knowledge in the Risk Management Framework (RMF) and NIST publications. Experience in developing, maintaining, assessing, and More ❯
Herndon, Virginia, United States Hybrid / WFH Options
VTG
Overview The Information System Security Manager (ISSM) is responsible for the overall security posture of information systems within the SCIF and other secured environments. The ISSM ensures compliance with federal regulations, security policies, and accreditation requirements to safeguard classified information. This role requires strong technical expertise, a proactive mindset, and a commitment to maintaining the confidentiality, integrity … compliance team. This role is hybrid, based out of Herndon, and supports multiple facilities in the DMV area (Herndon, Manassas, and Washington D.C.). What will you do? System SecurityManagement: Oversee the implementation and management of system security measures in compliance with National Industrial Security Program Operating Manual (NISPOM), Risk Management Framework (RMF … Intelligence Community Directives (ICDs), and other applicable regulations. Maintain the security posture of classified systems by ensuring compliance with Assessment and Authorization (A&A) requirements. Risk Assessment and Mitigation: Conduct regular risk assessments, vulnerability scans, and security audits to identify and mitigate potential threats. Develop, implement, and manage security policies and procedures to address identified risks. Monitoring More ❯
Security Task Lead Job Category: Security Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: We are seeking a highly skilled and experienced Security Task Lead to oversee and manage all security-related aspects of our … for the Department of Defense, with work locations at several sites in the metropolitan Washington, D.C. area. This position is responsible for ensuring the implementation and maintenance of robust security measures across all project areas, encompassing both cybersecurity and physical security in compliance with DoD standards. The position is contingent upon award of the Office of the Department … of Defense (DoD) Chief Information Officer (CIO) DCIO for Information Enterprise (IE) and Special Access Program Information Technology (SAP IT) Support Services Task Order. The Security Task Lead plays a vital role in safeguarding our IT systems, physical assets, and personnel while ensuring compliance with DoD security requirements. This position demands a security expert with strong leadership More ❯
our next ISSO, Staff at Schriever Space Force Base, CO Responsibilities Provide technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Design, develop and implement security requirements within an organization's business processes. Prepare documentation from information obtained from customer using accepted guidelines such as DITSCAP (DoD Information … Technology Security Certification and Accreditation Process). Prepare Security Test and Evaluation plans. Provide certification and accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyze policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develop and completes system security plans and contingency … plans. Recommend system enhancements to improve security deficiencies. Develop, test and integrate computer and network security tools. Secure system configurations and installs security tools, scan systems to determine compliancy and report results and evaluate products and various aspects of system administration. Conducs security program audits and develop solutions to lessen identified risks. Develop strategies to comply More ❯
Security Compliance Specialist, Amazon Stores Security Are you interested in driving exceptional security for customers? Do you see information security as a business enabler? Amazon's Stores Security organization is seeking an experienced Security Compliance Specialist. As part of the Amazon Stores Security InfoSec Japan team, this role will build the bridges between … security, technology, and compliance by working across remote and local teams within Amazon Security organization, healthcare business teams, and related Amazon corporate teams. This candidate should be an innovative security/compliance professional who has the ability to dive deep into a variety of complex issues, understand IT processes, and drive compliance assessment to existing and emerging … Japan healthcare information security standards. The ideal candidate will have strong leadership and problem-solving skills, excellent communication skill, and effectively work with cross-functional Amazon teams to support service build-up, service launch and on-going service operation activities. Key job responsibilities This position will be responsible for: - Establish credibility and maintain strong working relationships with groups involved More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
Information Security Analyst - 6-Month FTC Governance, Risk and Compliance Location: London/Hybrid Contract Type: Fixed Term (6 months) Salary: Competitive A global professional services firm is seeking a proactive Information Security Analyst to support the delivery of robust security and privacy policies across its global operation. This role is ideal for someone with hands-on … experience in information risk management, policy compliance, ISO 27001 , and client security due diligence . Key Responsibilities: Maintain and evolve the firm’s Information SecurityManagement System (ISMS) and associated documentation Support audits and ensure security practices align with industry standards (e.g., ISO 27001, Cyber Essentials) Assist with Business Continuity Management (BCM) - including BIAs … BCPs, exercises, and training Manage and respond to security incidents, conducting root cause analysis and recommending improvements Deliver risk assessments , Data Privacy Impact Assessments (DPIAs) , and third-party compliance checks Handle client cyber due diligence questionnaires and close remedial actions Work closely with Risk & Compliance, IT, and other business teams to embed security practices into operations Support the More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework … RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cyber Enterprise Vulnerability and Remediation Engineer provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to: Coordinate and prepare Inspector General (IG) FISMA closure requests from field reps and … program Information System Security Engineers (ISSEs) Update and manage metrics reporting for several database sources Coordinate with RMF stakeholders on closure Body of Evidence (BoE) for Enterprise Vulnerability and Remediation (EVAR) tracked findings Prepare and update slides for weekly and monthly deliverables for contract and EVAR meetings Research trending vulnerabilities being reported through enterprise security tools Support automation More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework … RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Information Security Continuous Monitoring Validator provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to: Supports the Information Security Continuous Monitoring (ISCM) Program Lead and Validator Lead … Lead with developing ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve fidelity of ConMon BOEs More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework … RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Information Security Continuous Monitoring Validator Lead provides support to the customer in the area of Cyber Security. Daily tasks include, but are not limited to: Supports the Information Security Continuous Monitoring (ISCM) Program Lead in standing … ConMon) program. Develop ConMon Validation process improvement activities Validates, for efficacy, ConMon control Bodies-of-Evidence (BOEs) entered in the ConMon tool Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve ConMon BOE entry language Guides, mentors and instructs program Information System Security Officers (ISSOs) on methods to improve fidelity of ConMon BOEs More ❯
Senior Cyber Security Engineer Excellent opportunity for an experienced Cyber Security Engineer with MSP experience to join a high-performing team delivering security solutions across Microsoft technologies and supporting compliance frameworks. Full-time, permanent position based in London with hybrid working (3 days in office, 2 remote), offering up to £60,000 depending on experience. Immediate start … available - candidates with hands-on Microsoft Security experience and relevant certifications are highly encouraged to apply. To apply, please email Who are the client? Our client is a recognised UK-based Managed Services Provider with strong accreditations and a reputation for excellence in technology and employee development. They are an IASME certification body and work with a broad client … base across sectors to deliver robust cyber security strategies. The company is growing and offers an outstanding culture of innovation, development, and recognition. What will you be doing? This senior, client-facing cyber security position is ideal for someone who enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Searchability (UK) Ltd
Senior Cyber Security Engineer Excellent opportunity for an experienced Cyber Security Engineer with MSP experience to join a high-performing team delivering security solutions across Microsoft technologies and supporting compliance frameworks. Full-time, permanent position based in London with hybrid working (3 days in office, 2 remote), offering up to £60,000 depending on experience. Immediate start … available - candidates with hands-on Microsoft Security experience and relevant certifications are highly encouraged to apply. To apply, please email Who are the client? Our client is a recognised UK-based Managed Services Provider with strong accreditations and a reputation for excellence in technology and employee development. They are an IASME certification body and work with a broad client … base across sectors to deliver robust cyber security strategies. The company is growing and offers an outstanding culture of innovation, development, and recognition. What will you be doing? This senior, client-facing cyber security position is ideal for someone who enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key More ❯