a culture of learning within the team, enhancing the professional capabilities of team members. Who We Look For Bachelor’s degree or higher, with 5+ years of experience in security assessment, IT audit, or consulting at a leading professional consulting firm or legal firm, in-house experience working in multinational company is a bonus Strong understanding of global compliance … marketing) and experience in compliance/product workflow design; experience in the internet/gaming industry is a plus. Expertise in global privacy regulations, including privacy principles, operational legal security frameworks, and compliance solutions. Proficient in IT audit, information securitymanagement, and IT/technology risk management, with the ability to resolve compliance risks effectively. Knowledge … of security control frameworks (e.g., ISO27001, ISO20000, ITIL, COBIT) and experience collaborating with information security teams to implement compliance requirements. Strong problem-solving skills, proactive work ethic, flexible thinking, and the ability to thrive under pressure. Able to use English and Chinese as working language to interact with stakeholders across the global Location: This role can be based More ❯
a culture of learning within the team, enhancing the professional capabilities of team members. Who We Look For Bachelor’s degree or higher, with 5+ years of experience in security assessment, IT audit, or consulting at a leading professional consulting firm or legal firm, in-house experience working in multinational company is a bonus Strong understanding of global compliance … marketing) and experience in compliance/product workflow design; experience in the internet/gaming industry is a plus. Expertise in global privacy regulations, including privacy principles, operational legal security frameworks, and compliance solutions. Proficient in IT audit, information securitymanagement, and IT/technology risk management, with the ability to resolve compliance risks effectively. Knowledge … of security control frameworks (e.g., ISO27001, ISO20000, ITIL, COBIT) and experience collaborating with information security teams to implement compliance requirements. Strong problem-solving skills, proactive work ethic, flexible thinking, and the ability to thrive under pressure. Able to use English and Chinese as working language to interact with stakeholders across the global Location: This role can be based More ❯
london (city of london), south east england, united kingdom
Tencent
a culture of learning within the team, enhancing the professional capabilities of team members. Who We Look For Bachelor’s degree or higher, with 5+ years of experience in security assessment, IT audit, or consulting at a leading professional consulting firm or legal firm, in-house experience working in multinational company is a bonus Strong understanding of global compliance … marketing) and experience in compliance/product workflow design; experience in the internet/gaming industry is a plus. Expertise in global privacy regulations, including privacy principles, operational legal security frameworks, and compliance solutions. Proficient in IT audit, information securitymanagement, and IT/technology risk management, with the ability to resolve compliance risks effectively. Knowledge … of security control frameworks (e.g., ISO27001, ISO20000, ITIL, COBIT) and experience collaborating with information security teams to implement compliance requirements. Strong problem-solving skills, proactive work ethic, flexible thinking, and the ability to thrive under pressure. Able to use English and Chinese as working language to interact with stakeholders across the global Location: This role can be based More ❯
programing, designing, analyzing, coding, impletemention, documentation, and testing. Have experience on an agile team and adhere to agaile methodologies; Creating project work estimates. Implementing solutions and identify operational or management issues Systems designing, policy development, and database development and management, and user interface development Utilizing available Commercial Off The Shelf (COTS) software to the maximum extent practicable in … designing software applications, avoiding implementation of a proprietary system Knowledge of current Federal Information SecurityManagement Act of 2002 (FISMA) Strong interpersonal attributes required: The ability to effectively communicate verbally and written ideas and concepts to teammates A proactive nature as it relates to 'getting the job done' as opposed to 'staying in a set or specific lane … company recognition program to receive monetary or non-monetary recognition awards. Other incentives may be available based on position level and/or job specifics. About BAE Systems Intelligence & Security BAE Systems, Inc. is the U.S. subsidiary of BAE Systems plc, an international defense, aerospace and security company which delivers a full range of products and services for More ❯
on low-code platforms, specifically Appian. The ideal candidate will have expertise in the Appian platform, with a strong understanding of how to build, deploy, and manage business process management (BPM) solutions. Analyze business processes to identify automation opportunities and design robust, scalable, and efficient LCAP solutions. Manage the platform environment, including user and group management, access controls … and security settings. Handle application deployments across different environments (development, testing, production), working closely with DevOps teams. Monitor system performance, perform regular health checks, and identify bottlenecks to ensure smooth operation. Apply platform patches, updates, and upgrades in a timely and coordinated manner. Troubleshoot and resolve production issues related to infrastructure, networking, and application functionality. Maintain accurate and up … or citizen developers Build and maintain integrations with external systems and databases using APIs, web services, and platform-specific connectors. Create and maintain data models, including complex relationships and security rules within the low-code environment. Utilize platform-specific testing tools and apply debugging procedures to resolve issues. Ensure adherence to design patterns and development best practices for optimal More ❯
resolved in a timely manner. He/she will be responsible for ensuring server and desktop configurations are optimized and running continuously and efficiently. The individual will also perform securitymanagement and application performance optimization functions. Additional responsibilities may include: Administration/sustainment of a system that provides a web-based application for storing, sharing, and distributing information. … Creating and maintaining complex server enclaves, including analyzing system scanning reports, patching, cert renewals, vulnerability management assessments, and active directory configurations. Identifying and correcting hardware and software issues. Responding to system administration, operations, and maintenance problems and developing re-work solutions. Creating and maintaining documentation of complex server/network environments to ensure that clear, concise and accurate information … is readily available for incident resolution. Communicating with users and external support personnel regarding system outages and upgrades and conferring with upper management regarding recommended resolution options. Desired Skills and Qualifications: Previous experience as a systems administrator. Must be proficient with Windows Server 2012R2, 2016, 2019, and Active Directory. Must have experience with Linux and Microsoft-based servers and More ❯
Zachary Piper Solutions is currently seeking a Sr. Network Engineer (Tier 3) to support the National Nuclear Security Agency in Washington, DC. The Network Engineer Tier 3 will implement, provide, and monitor technical support of customer environments, conduct, and maintain inventories of client systems, support operating systems, desktop peripherals, software, core desktop applications and imaging of computers. The Sr. … maintenance of computer systems and computer environments. Location: Washington, DC Duties & Responsibilities: • Install, configure, maintain, and optimize LAN and WAN infrastructure, including routers, switches, VPN appliances, load balancers, and security devices. • Ensure timely application of security patches to all network infrastructure devices, including routers, switches, voice and video systems, and security appliances. • Monitor and analyze network performance … using network management tools, troubleshooting network issues, and optimizing performance based on industry best practices. • Maintain an up-to-date inventory of network assets, including hardware and software components, and ensure efficient asset tracking and lifecycle management. • Provide design recommendations, technical feedback, and support during engineering meetings to contribute to the planning and execution of network projects. • Manage data More ❯
business continuity and disaster recovery planning and testing Manage internal audits, compliance reporting, and remediation activities Coordinate GDPR compliance and data protection processes across the organisation Drive improvements in security culture through awareness and training Collaborate with stakeholders to identify and address control deficiencies Qualifications & Experience Substantial relevant experience in control management for governance, compliance, IT audits, IS … assurance and risk management programmes Understanding of regulatory requirements, including cross-industry regulations (e.g., GDPR, Data Protection Act) and industry-specific regulations Knowledge of common information securitymanagement frameworks, such as ISO/IEC 27001, ITIL, COBIT as well as those from NIST, including 800-53 and Cybersecurity Framework Knowledge of OneTrust risk management toolset or More ❯
for our Enterprise NG9-1-1 solution supporting customer's Public Service Answering Points (PSAP) across CONUS, Hawaii, and Guam. This role is vital in ensuring the reliability and security of our network that transports both data and voice communications. The ideal candidate will possess extensive experience with Cisco switches, routers, and firewalls, and demonstrate a strong commitment to … for mission-critical applications. Network Monitoring and Troubleshooting: Proactively monitor network performance, identify potential issues, and implement solutions. Utilize tools for network analysis and diagnostics to resolve problems swiftly. SecurityManagement: Implement and maintain robust security measures to protect the network infrastructure. Regularly assess and update security protocols and practices to safeguard sensitive data and voice … to public safety communications. Stay current with industry trends, best practices, and new technologies. Training and Development: Conduct training sessions for team members on network operations, troubleshooting techniques, and security protocols. Qualifications Required: Bachelor's degree in Computer Science, Information Technology, or a related field. Minimum of 10 years of experience in network engineering, with a strong emphasis on More ❯
mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Senior Associate, Info Security Sys Engineering Job Code: 28683 Job Location: Colorado Springs, CO Job Schedule: 9/80 Job Description: Applies current systems security engineering methods, practices and technologies to the … architecture, design, development, evaluation and integration of systems and networks to maintain system security. Works closely with Government customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity and rigor, early and in a sustainable manner throughout the life cycle of system that will allow for the security authorization of … or commercial product vendors in the design and evaluation of state-of-the-art secure systems, networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods into a cohesive system security perimeter and environment and the policies and procedures necessary to monitor and maintain such an environment. More ❯
Position Title: ISSO - Information Assurance Clearance: Top-Secret/Location: APG Education: Bachelor's Degree in Cyber Security, Computer Science, Information Systems, Engineering, or related scientific or technical discipline. (Can be substituted with an additional 5 years of related Information Assurance experience and CISSP, CISM, CAP, CeH, or equivalent certifications.) Position Overview: We are looking for an experienced Information … Assurance Specialist to provide architecture support, certification and accreditation (C&A) expertise, and manage security monitoring activities. The role requires comprehensive experience in DoD cybersecurity authorization processes, familiarity with relevant Army and DoD regulations, and the ability to manage test events and cybersecurity monitoring. Key Responsibilities: Provide Information Assurance (IA) architecture support and facilitate certification and accreditation (C&A … processes. Conduct security scans, and oversee other test events to ensure compliance with established standards. Collaborate with engineering teams to ensure system designs meet the Risk Management Framework (RMF) subsystem requirements, ensuring alignment with The Federal Information SecurityManagement Act (FISMA) and DoD and Army cybersecurity policies and regulations. Support the design, development, and implementation of More ❯
ValidaTek, Inc. is an award-winning Small Business that provides high-security mission-critical IT services to the Federal Government. Our commitment to excellence in service delivery has resulted in dramatic growth and an expanding client base that includes several U.S. Federal Departments. The corporate infrastructure is robust and based on industry best practices as evidenced by our DCAA … highly skilled in troubleshooting & supporting end-user and/or systems requiring timely solutions. Expertise in LAN, WAN, MAN, load balancing & Wireless administration. Demonstrated knowledge utilizing network diagnostic and management tools to include packet and traffic analysis network environments. Extensive expertise in project planning and best practices setups, change management procedures, system design and configuration planning practices and … outage analysis and streamline incident resolution. Familiarity with Federal Information SecurityManagement Act (FISMA) and National Institute of Standards and Technology (NIST) security standards and able to incorporate into IT solutions. Demonstrated expertise in technical communications with a strong desire to achieve customer satisfaction; will work alongside USSS staff from the Network, Cyber Security and/ More ❯
Alto, F5 and the maintenance of computer systems and computer environments. Requirements Install, configure, maintain, and optimize LAN and WAN infrastructure, including routers, switches, VPN appliances, load balancers, and security devices. Ensure timely application of security patches to all network infrastructure devices, including routers, switches, voice and video systems, and security appliances. Monitor and analyze network performance … using network management tools, troubleshooting network issues, and optimizing performance based on industry best practices. Maintain an up-to-date inventory of network assets, including hardware and software components, and ensure efficient asset tracking and lifecycle management. Provide design recommendations, technical feedback, and support during engineering meetings to contribute to the planning and execution of network projects. Manage data … optimizations. Demonstrate expertise in routing, switching, and firewall configuration, supporting complex and secure LAN/WAN networks. Understand and support Linux/Unix and Windows operating systems, including system securitymanagement, to ensure smooth integration with network services. Submit detailed and accurate reports on network performance, incidents, upgrades, and infrastructure status as required. Act as the primary point More ❯
and schedule all required inspection and accreditation activities to ensure continuous access to the SCIF for planning and operations. Maintain workstations in compliance with Information Assurance (IA), Federal Information SecurityManagement Act (FISMA), and Cyber Security Work Force (CSWF) standards and ensure appropriate accreditation documentation is available for the SCIF. Serve as a Communications Security Material … Systems (CMS) user and be responsible for all regulations related to being a Communications Security (COMSEC) user including receiving, documenting, tracking, inventorying, and destroying COMSEC material in accordance with COMSEC guidelines. Coordinate daily operations of the SCIF and serve as a conduit to the Special Security Representative (SSR). Interface between current and future SCIF Tenants. Provide Common … SCIF and ensure that they adhere to SCIF policies, ensure all SCI material is maintained and destroyed in accordance with DoD 5105.21-M-1 and report/document SCI security incidents to the SSR. Maintain the SCIF calendar of events and meetings. Qualifications Required Education and Experience: Bachelors and two (2) years or more experience; Masters and zero More ❯
Scott Air Force Base, Illinois, United States Hybrid / WFH Options
CEdge Software Consultants
that will inevitably take your career to unbelievable levels! Clearance Requirements: Secret Clearance . Duties & Responsibilities: Responsible for working with network administration and system administration teams to ensure operational security of DoD networks and systems Install, configure, administer, and maintain DoD information assurance and cyber security tools including HBSS, ACAS, Nessus, Fortify, IDS systems, firewalls, etc. Continuously monitor … systems for security, appropriate access per authorization, and configuration integrity Conduct vulnerability scans of software and systems Review and analyze security-related reports and logs from tools including Splunk, Nessus, HBSS, ACAS, IDS systems, firewalls, etc. Track and manage resolution of POA&Ms Review and take corrective action with IAVA, SCAP and ACAS vulnerabilities Coordinate with and assist … experience (or 3 years of experience for Intermediate Level Positions; or 5+ years of experience for Senior Level positions) with each of the following technology skills: Experience using DoD securitymanagement tools including ACAS and eMASS Experience reviewing and applying STIGs Experience using security scanning tools including Fortify and Nessus Experience using log analysis tools such as More ❯
resolved in a timely manner. She/he will be responsible for ensuring server and desktop configurations are optimized and running continuously and efficiently. The individual will also perform securitymanagement and application performance optimization functions. Additional responsibilities may include: Administration/sustainment of a system that provides a web-based application for storing, sharing, and distributing information. … Creating and maintaining complex server enclaves, including analyzing system scanning reports, patching, cert renewals, vulnerability management assessments, and active directory configurations. Identifying and correcting hardware and software issues. Responding to system administration, operations, and maintenance problems, and developing re-work solutions. Creating and maintaining documentation of complex server/network environments to ensure that clear, concise and accurate information … is readily available for incident resolution. Communicating with users and external support personnel regarding system outages and upgrades and conferring with upper management regarding recommended resolution options. Basic Qualifications: Must have at least 8 years of relevant experience. Must have experience as a systems administrator providing direct support to end users and technical staff (developers, testers, engineers, etc.). More ❯
for monitoring and protecting classified information and sensitive government operations during construction or renovation projects. This role requires a current Top-Secret clearance or higher and relevant experience in security monitoring and construction environments. Responsibilities : Monitor construction activities to ensure that no unauthorized access to classified information occurs. Manage and enforce access control procedures for the construction site, ensuring … that only cleared personnel are present. Document and report any suspicious activities, security breaches, or deviations from approved construction plans. Conduct inspections of materials, tools, and equipment entering the construction area to ensure compliance with security requirements. Work closely with security officers, project managers, and construction personnel to ensure security protocols are followed. Provide timely and … accurate communication to the securitymanagement team regarding any potential threats or concerns. Ensure that all activities comply with relevant government security standards and regulations. More ❯
Type: Full-time Clearance Level: Top secret/SCI Job Location: Arlington VA Salary: 132K Background Collaborate with DoD Components to design and evolve enterprise architecture frameworks that integrate security systems across the DoD Insider Threat enterprise Contribute to the development and sustainment of hundreds of DoD InT architecture artifacts Ensure architecture content is captured, maintained, and stored within … OUSD(I&S) knowledge repositories Provide knowledge management support for DoD InT business processes and IT system data Drive compliance with DoD Chief Information Officer (CIO) and Deputy Chief Management Officer (DCMO) IT directives, Federal Information SecurityManagement Act (FISMA) requirements, and related cybersecurity policies Support the development, transition, and modernization of systems using system-to … operational activity architecture method Provide portfolio management oversight and data support for OUSD(I&S) Insider Threat IT system architectures Collaborate closely with the DoD CIO to align User Activity Monitoring (UAM) efforts strategically across the DoD InT enterprise Support approximately 24 annual DoD security and InT IT policy processes, including drafting, revising, coordinating, adjudicating comments, and conducting More ❯
and Communications (NC3) programs. Active Top-Secret Clearance or Top-Secret Clearance, eligibility is required. You will leverage your knowledge in systems engineering, Model-Based Systems Engineering (MBSE), and security engineering to support a range of initiatives, including modernization and lifecycle management of PMW 770 programs. This position also involves collaboration with key stakeholders and partner organizations, such … including networking and transport issues. Document risks, issues, and opportunities; develop mitigation strategies and contingency plans; and track their resolution through completion. Document and manage system baseline and change management processes. Ensure alignment of baseline changes, Engineering Change Requests (ECRs), Ship Specification Change Requests, and Temporary Alterations (TEMPALTs) with the Model-Based Systems Engineering (MBSE) baseline. Review these changes … documentation for milestone decisions, System Engineering Technical Reviews (SETR), assessments, and evaluations. Generate accurate documentation derived from MBSE models, ensure consistency with model data, and recommend corrections as necessary. SECURITY AND PRIVACY DUTIES AND RESPONSIBILITIES Individuals working for DSS will be subject to security and privacy requirements as explained in HIPAA, FedRAMP, and NIST 800-53. Additionally More ❯
patches. Troubleshoot and resolve issues related to MECM clients, deployment failures, and other endpoint-related issues. Monitor and maintain MECM infrastructure and ensure it meets organizational needs for scalability, security, and performance. Lead the implementation and configuration of AdminStudio to support application packaging, deployment, and software virtualization. Collaborate with application owners to create, test, and deploy application packages in … AdminStudio. Ensure compatibility of applications with endpoint systems and manage packaging processes to streamline deployment. Develop, test, and maintain scripts (e.g., PowerShell, Batch, VBScript) to automate system management tasks such as software deployments, configuration changes, and system updates. Use scripting to improve efficiency in managing endpoint devices, reduce manual intervention, and ensure consistency across deployments. Work with other team … members to identify areas where automation and scripting can improve workflow efficiency. Work closely with security teams to ensure endpoints are compliant with security policies, patches, and software updates. Support endpoint configuration for compliance monitoring and reporting. Ensure all endpoints are adequately protected from vulnerabilities and potential threats. Create and maintain documentation for MECM configurations, packaging processes, and More ❯
in working in projects, preferably with larger companies (e.g. FTSE 100) Exposure to infrastructure and multi-platform environments; preferably within the energy or utility sector. Ability to demonstrate stakeholder management at most levels, including management, Information Technology colleagues and business representatives. Explaining to and communicating with non-technical audiences You will have awareness of common Information Securitymanagement frameworks such as ISO 27001, COBIT, Information Security Forum and NIST. More ❯
on low-code platforms, specifically on Appian. The ideal candidate will have expertise on Appain platform, with a strong understanding of how to build, deploy, and manage business process management (BPM) solutions. Analyze business processes to identify automation opportunities and design robust, scalable, and efficient LCAP solutions. Design, develop, and configure business process management (BPM) and case management … and business logic. Build and maintain integrations with external systems and databases using APIs, web services, and platform-specific connectors. Create and maintain data models, including complex relationships and security rules within the low-code environment. Conduct thorough unit, integration, and user acceptance testing to ensure applications meet quality standards and business requirements. Utilize platform-specific testing tools and … apply debugging procedures to resolve issues. Ensure adherence to design patterns and development best practices for optimal performance, scalability, and security Collaborate with business analysts, subject matter experts, and IT teams to gather requirements, define scope, and ensure alignment of automation solutions with business objectives. Participate in all security meetings and provide valuable insight as they have both More ❯
Engineer with a solid range of skills. The role: This area of the business plans, builds and runs the global infrastructure and is additionally responsible for the IT service management to the operating entities of the various Group markets. The Virtual Infrastructure Services team is committed to bringing the best computing experience to the internal clients (platforms, office and … routine system audits and capacity planning Collaboration and Documentation: work with development teams and other IT staff to support infrastructure needs and maintain comprehensive documentation of systems and procedures SecurityManagement: implement and maintain security best practices for infrastructure, including patch management, antivirus solutions, and vulnerability assessments (Support) The automation of recurrent activities Propose harmonisation of … support (incident, alerts, changes. Provide on-call support during out-of-business hours (24/7 watch duty)- one is every eight weeks. Take part in the disaster recovery management for the virtual infrastructure. Offer consulting services to "OS" teams (Windows, Linux, Office, Tandem, Mainframe), projects and other customers Develop solutions based on analysis of business and technical requirements. More ❯
role in shaping our technology landscape. Initially managing external service providers, you'll transition us toward a scalable internal IT model. You'll lead IT governance, systems integration, cyber security, and service delivery across our international operations. This is a unique opportunity for a hands-on senior engineer or systems administrator to step into a strategic leadership role and … compliance requirements across all regions. Ensure full compliance with GDPR, ISO standards (27001, 27002, etc.), and global cyber regulations, including leading certification processes. Design and implement a comprehensive Information SecurityManagement System (ISMS) and establish breach protocols, disaster recovery, and business continuity plans. Lead integration of business systems across HR, finance, CRM, and operations platforms, managing complex transformation … projects globally. Recruit, onboard, and mentor IT professionals, building a high-performing team to support Fulkrum's international operations. Monitor system performance, security, and compliance, using metrics and reporting tools to inform leadership and drive continuous improvement. Research and implement AI and emerging technologies to enhance operational efficiency, innovation, and data-driven decision-making. Manage IT assets, procurement, licensing More ❯
About Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical … or downtime. Evaluate New Cloud Technologies: Work closely with the team and sponsors to evaluate the latest cloud technologies and determine their potential impact on enterprise applications. Backup & Data Management: Manage cloud data backups and restoration processes using AWS tools like EBS volumes and snapshots. Collaborative Development: Collaborate with fellow engineers and developers to design and implement optimal cloud … address issues across development, test, and production environments. Linux & Scripting: Configure and monitor Linux-based systems, leveraging tools like netstat, vi, and custom scripts for efficient operation. S3 & DNS Management: Manage S3 buckets and DNS requests, ensuring seamless data integrity and availability. SSL & SecurityManagement: Regularly update SSL certificates for AWS RDS databases, ensuring robust securityMore ❯