CISM - Certified Information Security Manager Around the world, demand for skilled information securitymanagement professionals is on the rise, and the CISM certification is the globally accepted standard of achievement in this area. The uniquely management-focused CISM certification ensures holders understand business, and know how to manage and adapt technology to their enterprise and industry. … CISM holders are consistently recognized among the most qualified professionals in the information security and risk management fields. Effective Information Security Managers need to understand more than just Firewalls and Phishing. Having a clear Strategy and Roadmap with strong Governance and Charter is perhaps more important. Learn how to use COBIT methodology and security architectures like … TOGAF and SABSA to build a value focused InfoSec programme with RiskIT and ValIT. Uniquely focused on the management and implementation of successful information security programmes, this event is more like an MBA than MSCE or CCNA! Objective: This workshop fully covers the current ISACA CISM exam syllabus by explaining how to use COBIT, ValIT and RiskIT to More ❯
Principal Security Engineer The Role: Synoptix are expanding their Cyber Security capability by applying it to Systems Thinking, allowing for delivery of Cyber Security Solutions to both defence and commercial clients. We re looking for a technically strong, client-focused Principal Security Engineer to support the development, implementation, and assurance of secure system architectures and solutions. … This role sits within our Secure by Design capability and supports both internal development projects and external client engagements. Working alongside the existing team, contributing to security requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key … Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be responsible for the technical content of client deliverables, for example. SecurityManagement Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test More ❯
Principal Security Engineer The Role: Synoptix are expanding their Cyber Security capability by applying it to Systems Thinking, allowing for delivery of Cyber Security Solutions to both defence and commercial clients. We're looking for a technically strong, client-focused Principal Security Engineer to support the development, implementation, and assurance of secure system architectures and solutions. … This role sits within our Secure by Design capability and supports both internal development projects and external client engagements. Working alongside the existing team, contributing to security requirements definition, risk assessments, technical security design, and security documentation for both internal platforms and client systems. Dynamic Working: A blend of home and office-based working is encouraged Key … Responsibilities: Lead and Deliver Cyber Security work packages to clients, this includes applying Systems Engineering methodologies into Cyber solutions. Risk identification and management Requirements Capture Validation Verification Be responsible for the technical content of client deliverables, for example. SecurityManagement Plans Security Case Report following Secure by Design through life principals Verification Plans Validation Test More ❯
Description Position Overview: This Program Security Representative (PSR) position requires a solid foundation in all disciplines of security to include, but are not limited to, knowledge of the basics of program protection (P2), classification marking requirements, Special Access Program (SAP) and Sensitive Compartmented Information (SCI) policies, Operations Security (OPSEC), Communications Security (COMSEC), and requirements for sensitive … test planning, intelligence & counterintelligence threat support requirements, and secure information transmission. The ideal candidate will possess relevant experience demonstrating direct support for the security needs of senior military (O-7 and above) and/or USG SES/SIS personnel. Duties and Responsibilities Review and edit for proper classification marking, executive level briefing documents that support the Director's … program objectives for individual engagements. Function as an official courier of classified materials to support leadership engagements as required. Research and recommend long and short-range program horizontal protection security strategies for new and established programs, as well as changes in program development. Using knowledge of the various security disciplines (e.g. physical, information, personnel, etc.) determine, apply, and More ❯
gTANGIBLE Corporation (gTC) is a S corporation and a registered Government contractor that provides services and solutions in: National Security Programs Professional, Administrative, and Management Support Mission and Warfighter Support We are a Service Disabled Veteran Owned Small Business (SDVOSB) and the founder has years of successful experience in the Government contracting arena. Our leadership team is an … group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent (Open) Position Status: Full Time Position Title: Information Systems Security Officer (ISSO) III Location: Colorado Springs, CO Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph Duties and Responsibilities The Air Force (AF … Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management. This support provides multi- disciplinary security support, including specialized analytical/program protection support, while being responsive and flexible to More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
Information Security & Compliance Lead Chesterfield £50,000 to £60,000+ Excellent Benefits Your new company Hays Technology are recruiting for an Information Security & Compliance Lead to join a large public sector organisation based in the Chesterfield area. You will be reporting to the Head of Digital, Data & Technology. This is a new role to establish and make your … own. Your new role In your new role, you will be responsible for ensuring the security and protection of the organisation's information systems, networks, and data, whilst playing a critical role in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise the impact of security incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 More ❯
Security Architect • Newport – 4 days per week onsite • 6 month contract initially • £85 per hour umbrella (inside IR35) • 35 hours per week – 4 days onsite and Fridays offsite Please note active SC clearance is required and applicants must be SOLE British nationals Join a high-profile defence programme where your expertise as a Security Architect will directly shape … the protection of national security systems and platforms. This is a hands-on role for an architect who thrives in complex, high-assurance environments, working alongside government security authorities and engineering teams to deliver robust, secure solutions. Responsibilities • Design, develop, and maintain secure system architectures for MOD platforms, applications, and networks • Ensure alignment with relevant standards and frameworks … including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance • Produce and maintain security documentation including Security Architecture Documents, Security Risk Assessments and SecurityManagement Plans • Lead and support secure design reviews and contribute to engineering assurance gates • Liaise with security stakeholders (MOD, NCSC etc.), Information Assurance teams More ❯
Job summary NHS England's Chief Information Security Office (CISO) Function's purpose is to enable safe care and build public trust by strengthening the cyber resilience of the NHS. The CISO supports the Transformation Directorate's purpose of delivering the best care and outcomes for patients, and enables faster, safer digital transformation of the NHS. As part of … the CISO Function the Senior Cyber Security Advisor sit in the Secure Consulting Team who provide specialist cyber security consultancy services to NHS England's Critical National Infrastructure and major national services, ensuring these services and digital programmes are Secure by Design. Senior Cyber Security Advisors ensure NHS England's systems operate from a cyber resilient architecture. … They provide detailed cyber guidance to programme delivery teams, including architecture, software engineering and infrastructure, supporting the management of cyber risk. This is an exciting opportunity to help deliver cyber resilient systems for the NHS. You'll be given the support and autonomy to use your skills, knowledge, and experience, to make a real impact on improving people's More ❯
Security Architect 6 month contract Based in Newport Offering 85ph Inside IR35 Do you have experience in Secure by Design? Do you have knowledge of MOD security requirements? Do you want to work with an industry-leading company? If your answer to these is yes, then this could be the role for you! As the Security Architect … applications, and networks Ensure alignment with relevant standards and frameworks including; NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance Produce and maintain security documentation including; Security Architecture Documents, Security Risk Assessments, and SecurityManagement Plans Lead and support secure design reviews and contribute to engineering assurance gates Liaise … with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and other stakeholders to support security assurance processes Collaborate with engineering and development teams to ensure security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Your skillset may include: Proven experience in cyber securityMore ❯
Security Architect 6 month contract Based in Newport Offering £85ph Inside IR35 Do you have experience in Secure by Design? Do you have knowledge of MOD security requirements? Do you want to work with an industry-leading company? If your answer to these is yes, then this could be the role for you! As the Security Architect … applications, and networks Ensure alignment with relevant standards and frameworks including; NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance Produce and maintain security documentation including; Security Architecture Documents, Security Risk Assessments, and SecurityManagement Plans Lead and support secure design reviews and contribute to engineering assurance gates Liaise … with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and other stakeholders to support security assurance processes Collaborate with engineering and development teams to ensure security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Your skillset may include: Proven experience in cyber securityMore ❯
our next ISSO, Staff at Schriever Space Force Base, CO Responsibilities Provide technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems. Design, develop and implement security requirements within an organization's business processes. Prepare documentation from information obtained from customer using accepted guidelines such as DITSCAP (DoD Information … Technology Security Certification and Accreditation Process). Prepare Security Test and Evaluation plans. Provide certification and accreditation support in the development of security and contingency plans and conducts complex risk and vulnerability assessments. Analyze policies and procedures against Federal laws and regulations and provides recommendations for closing gaps. Develop and completes system security plans and contingency … plans. Recommend system enhancements to improve security deficiencies. Develop, test and integrate computer and network security tools. Secure system configurations and installs security tools, scan systems to determine compliancy and report results and evaluate products and various aspects of system administration. Conducs security program audits and develop solutions to lessen identified risks. Develop strategies to comply More ❯
Koniag Management Solutions, a Koniag Government Services company, is seeking a Help Desk Specialist with a Top-Secret clearance with the ability to obtain a SCI to support KMS and our government customer in Washington, DC. This position is for a Future New Business Opportunity. We offer competitive compensation and an extraordinary benefits package including health, dental and vision … insurance, 401K with company matching, flexible spending accounts, paid holidays, three weeks paid time off, and more. Koniag Management Solutions, a Koniag Government Services company, is seeking a Help Desk Specialist to provide Tier I and Tier II technical support within a classified environment for our government client. This position requires an active Top-Secret clearance with eligibility to … obtain SCI access. The role includes SCIF securitymanagement responsibilities and COMSEC duties. This position is based in Washington, DC and includes on-call requirements. Essential Functions, Responsibilities & Duties may include but are not limited to: The Help Desk Specialist will serve as the primary point of contact for end-user technical support while managing SCIF securityMore ❯
We're looking for a proactive and detail-oriented Cyber Security Officer to join our IT team. You'll support the Head of IT Governance in developing and delivering a Cyber Security Strategy and Information SecurityManagement Plan , ensuring robust systems and processes are in place to protect the organisation. Key Responsibilities Support implementation of the … cyber security strategy and management plan. Monitor global threats and assess potential organisational impact. Coordinate penetration testing and manage remediation actions. Assist with maintaining Cyber Essentials certification and internal audits. Work with IT colleagues to plan and implement security improvements. About You Strong skills in communication, report writing, planning, and problem solving. Genuine interest in cyber security and willingness to continue learning. Studying toward or interested in a Cyber Security qualification. Collaborative, detail-oriented, and proactive in a fast-paced environment. Benefits Supportive team with training and development opportunities. Benefits may include a pension scheme, staff discounts, cycle-to-work scheme, free parking, and early Friday finishes. Main Purpose Support the delivery of IT cyber More ❯
Information Systems Security Manager (ISSM) Location: Remote (onsite visits to Oakridge, TN as needed) Salary: $190,000+/year DOE Clearance: Active Q or TS Security Clearance Required Schedule: Full-time Remote Cybersecurity & Enterprise SecurityManagement About the Role Central Texas Recruiting is seeking an experienced Information Systems Security Manager (ISSM) to support mission-critical … cybersecurity initiatives for government systems. In this remote role, youll lead the analysis, integration, and operational maintenance of enterprise security systems, applying advanced cybersecurity principles to ensure confidentiality, integrity, and availability across complex IT environments. This position provides a unique opportunity to directly impact national and global security operations. Key Responsibilities Lead the integration, testing, operations, and maintenance … of security systems and processes Conduct Security Control Assessments (SCA) and manage Security Information and Event Management (SIEM) operations Apply cybersecurity frameworks and standards (e.g., NIST SP 800-53, CIS CSC, Cybersecurity Framework) to assess and enforce system security controls Analyze threats, vulnerabilities, and risks across IT, industrial control, and supervisory systems Manage configuration, access More ❯
Overview Silveredge Government Solutions is seeking a Security Specialist to coordinate visitor security and control; operations security (OPSEC); communication security (COMSEC); security education; resolving administrative issues with all aspects of securitymanagement; preparation and presentation of briefings on security programs and administrative services to PM personnel; maintain and control government databases; interpreting … DoD Instructions and Army Regulations; and support for security and facility inspections. The assistance to ensure adequate measures are in place to protect their technology, components, and information. Conduct security training and evaluate staff processes and procedures for security risks. Maintain and update security files. Required Qualifications High School Diploma/GED is required to support … this effort Three years coordinating visitor security and control and utilizing personnel control records systems. Active TS/SCI Clearance Required Desired Qualifications Some college preferred Previous service within a military security environment Active Polygraph About SilverEdge SilverEdge Government Solutions was founded on the belief that nurturing talent and collaborating closely with our customers enables us to think More ❯
Overview Silveredge Government Solutions is seeking a Senior Security Specialist to coordinate visitor security and control; operations security (OPSEC); communication security (COMSEC); security education; resolving administrative issues with all aspects of securitymanagement; preparation and presentation of briefings on security programs and administrative services to PM personnel; maintain and control government databases … interpret DoD Instructions and Army Regulations; and support for security and facility inspections. The assistance to ensure adequate measures are in place to protect their technology, components, and information. Conduct security training and evaluate staff processes and procedures for security risks. Maintain and update security files. Required Qualifications High School Diploma/GED is required to … support this effort 10 years coordinating visitor security and control and utilizing personnel control records systems. Active TS/SCI Clearance Required Desired Qualifications Some college preferred. Previous service within a military security environment is desirable Active Polygraph About SilverEdge SilverEdge Government Solutions was founded on the belief that nurturing talent and collaborating closely with our customers enables More ❯
Security Architect 6 month contract Based in Newport Offering £85ph Inside IR35 Do you have experience in Secure by Design? Do you have knowledge of MOD security requirements? Do you want to work with an industry-leading company? If your answer to these is yes, then this could be the role for you! As the Security Architect … applications, and networks Ensure alignment with relevant standards and frameworks including; NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance Produce and maintain security documentation including; Security Architecture Documents, Security Risk Assessments, and SecurityManagement Plans Lead and support secure design reviews and contribute to engineering assurance gates Liaise … with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and other stakeholders to support security assurance processes Collaborate with engineering and development teams to ensure security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Your skillset may include: Proven experience in cyber securityMore ❯
Security Architect 6 month contract Based in Newport Offering £85ph Inside IR35 Do you have experience in Secure by Design? Do you have knowledge of MOD security requirements? Do you want to work with an industry-leading company? If your answer to these is yes, then this could be the role for you! As the Security Architect … applications, and networks Ensure alignment with relevant standards and frameworks including; NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance Produce and maintain security documentation including; Security Architecture Documents, Security Risk Assessments, and SecurityManagement Plans Lead and support secure design reviews and contribute to engineering assurance gates Liaise … with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and other stakeholders to support security assurance processes Collaborate with engineering and development teams to ensure security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Your skillset may include: Proven experience in cyber securityMore ❯
Company Overview: At CenCore Group, we elevate security solutions beyond the industry standard to our exclusive CenCore standard. As a top-tier provider in the rapidly evolving intelligence community, CenCore Group is at the forefront of designing, building, securing, and maintaining AI ecosystems where big technology meets national security. With a track record of proven performance in the NatSec … space, we have become the trusted source for insight, analysis, and the implementation of both physical and digital security solutions. Our company is experiencing massive growth, driven by our strong leadership and exceptional work culture. We are currently seeking a reliable, cleared professional to join our dedicated team. Job Summary: The Director - Security Operations Support provides executive-level … leadership and technical oversight for all support activities enabling secure operations under an access control and security staffing contract within the Intelligence Community. This role drives excellence in access control support functions, physical security integration, policy adherence, and operational reporting in a multi-site, SCIF-heavy environment. The Director will serve as a strategic partner to government securityMore ❯
tomorrow. So, ready to dive in? Your journey begins with that application - and who knows where it could take you in our vibrant team! Position The Role The Information Security Manager will be responsible for developing, implementing, and managing best practices in information security across M247. This role requires a deep understanding of data management, information security frameworks, and regulatory compliance. The ideal candidate will have a proven track record in creating efficient security processes and play a key role in fostering a culture of security awareness throughout the organisation. Security Strategy Development: Design and implement a comprehensive information security strategy that aligns with business objectives and complies with ISO 27001 standards. … Microsoft 365 Expertise: Leverage Microsoft 365 tools to enhance security measures, ensuring optimal configuration and deployment to protect data and information assets. Data and Information Management: Oversee data governance policies and practices to ensure the integrity, confidentiality, and availability of sensitive information. Operational Efficiency: Identify opportunities to consolidate security processes and improve efficiencies across various departments, driving More ❯
gTANGIBLE Corporation (gTC) is a S corporation and a registered Government contractor that provides services and solutions in: National Security Programs Professional, Administrative, and Management Support Mission and Warfighter Support We are a Service Disabled Veteran Owned Small Business (SDVOSB) and the founder has years of successful experience in the Government contracting arena. Our leadership team is an … exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent Position Status: Full Time Position Title: Security Contract Manager Location: Washington, DC Security Clearance Level: Secret Duties and Responsibilities Duties include the following: Develop and implement a draft Project Management Plan and Integrated Master Schedule to … Control organizational process assets for use in future projects such as document templates, project plans, and procedures. Assist in project coordination efforts amongst FPS Program Offices, project teams, senior management, and external stakeholders as it relates to Visitor Management and Access Control. Develop training materials, presentations, spreadsheets, flowcharts, and diagrams in support of FPS mission objectives. Track required More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Job Number 707755BR Description:Lockheed Martin is a pioneer in cyber security-partnering, innovating, and building cutting edge solutions. Our talented employees tackle the world's toughest engineering challenges every day, leveraging their unique skills and experiences to design and deliver breakthrough technology. We empower our people to think big, perform with excellence, and create extraordinary products. If you … build a better tomorrow. We provide the resources, inspiration, and focus you need to succeed. Lockheed Martin's Rotary & Mission Systems (RMS) division is seeking an experienced Information System Security Officer (ISSO) to protect mission critical information systems. This role ensures confidentiality, integrity, and availability in line with DoD, NIST, and Lockheed Martin security policies, while providing day … to day oversight across the system lifecycle. The Information System Security Officer (ISSO) will serve as a primary guardian of mission critical information systems at Lockheed Martin's Hanover, Maryland site (with monthly support in Washington D.C.). This role ensures the confidentiality, integrity, and availability of all systems in strict compliance with DoD, NIST, and Lockheed Martin securityMore ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
University of Birmingham
Head of Information Security vacancy at the University of Birmingham £75,000 - £87,500 with potential for market rate supplement Hays Technology and The University of Birmingham are working in partnership to recruit a Head of Information Security on a permanent basis. About the University of Birmingham The University of Birmingham has been part of the city for … campus offers excellent transport links and a vibrant atmosphere, with a sports centre, shops, cafés, an art gallery, museum, and botanical gardens. About the role The Head of Information Security will be tasked with leading, defining and driving the Universitys information security strategy whilst taking ownership of its security posture. The role oversees all IT security … activities and manages all risks to the Universitys systems and data from internal and external threats. As such, the successful candidate will be developing and maintaining the Universitys IT security policies and procedures in accordance with best practice security standards and frameworks, leveraging existing technology, internal skillsets and external technology providers. What youll be doing Developing and executing More ❯
Birmingham, West Midlands, England, United Kingdom
Birmingham City University
Head of Information Security vacancy at the University of Birmingham £75,000 - £87,500 with potential for market rate supplement Hays Technology and The University of Birmingham are working in partnership to recruit a Head of Information Security on a permanent basis. About the University of Birmingham The University of Birmingham has been part of the city for … campus offers excellent transport links and a vibrant atmosphere, with a sports centre, shops, cafés, an art gallery, museum, and botanical gardens. About the role The Head of Information Security will be tasked with leading, defining and driving the University’s information security strategy whilst taking ownership of its security posture. The role oversees all IT security … manages all risks to the University’s systems and data from internal and external threats. As such, the successful candidate will be developing and maintaining the University’s IT security policies and procedures in accordance with best practice security standards and frameworks, leveraging existing technology, internal skillsets and external technology providers. What you’ll be doing Developing and More ❯
Overview Systems Planning and Analysis, Inc. (SPA) delivers high-impact, technical solutions to complex national security issues. With over 50 years of business expertise and consistent growth, we are known for continuous innovation for our government customers, in both the US and abroad. Our exceptionally talented team is highly collaborative in spirit and practice, producing Results that Matter . … Support professional in support of its Caledonia effort supporting a local Intelligence Community (IC) customer. Caledonia will provide support to Systems Engineering and IT Service Strategy; Enterprise Planning and Management; and Enterprise Acquisition and Contract Management functions. Responsibilities The successful candidate will work as members of the Caledonia Program Corporate Support team performing the activities required for property … and asset management, strategy development, governance, policy, records management and infrastructure management. Develop, deliver, and manage plans, processes, assessments, reports and briefings to the customer supporting logistics, property management, asset management, application portfolio management and capitalized property acquisitions activities. Perform Supply Chain Risk Management activities within acquisition, property, or asset management. Maintain Corporate Product More ❯