ValidaTek, Inc. is an award-winning Small Business that provides high-security mission-critical IT services to the Federal Government. Our commitment to excellence in service delivery has resulted in dramatic growth and an expanding client base that includes several U.S. Federal Departments. The corporate infrastructure is robust and based on industry best practices as evidenced by our DCAA … highly skilled in troubleshooting & supporting end-user and/or systems requiring timely solutions. Expertise in LAN, WAN, MAN, load balancing & Wireless administration. Demonstrated knowledge utilizing network diagnostic and management tools to include packet and traffic analysis network environments. Extensive expertise in project planning and best practices setups, change management procedures, system design and configuration planning practices and … outage analysis and streamline incident resolution. Familiarity with Federal Information SecurityManagement Act (FISMA) and National Institute of Standards and Technology (NIST) security standards and able to incorporate into IT solutions. Demonstrated expertise in technical communications with a strong desire to achieve customer satisfaction; will work alongside USSS staff from the Network, Cyber Security and/ More ❯
PMs, and engineers to ensure secure systems are authorized and maintained in accordance with DoD and Air Force policies. Responsibilities Duties include, but not limited to: Develop and maintain security documentation including System SecurityManagement Plans, Program Protection Plans, OPSEC Plans, and Risk Analyses in accordance with DoDI 5000.02, DoDI 8510.01, and MIL-STD 1785. Support RMF … compliance databases and tools. Manage user account provisioning, port/protocol authorizations, access control lists, and Public Key Infrastructure (PKI) identity requirements. Coordinate the implementation, distribution, and remediation of security updates, configurations, and software patches in compliance with DoD directives. Evaluate systems for vulnerabilities and provide recommendations for mitigation based on technical assessments and policy review. Promote security awareness across program stakeholders and ensure alignment with cybersecurity principles and business goals. Conduct security audits, contingency planning reviews, and risk assessments to ensure organizational resilience. Advise on security architecture and participate in systems design to ensure alignment with cybersecurity best practices. Review, evaluate, and recommend security mechanisms, including configurations and waivers to policy when appropriate. More ❯
Frankfurt am Main, Hesse, Germany; London, England, United Kingdom This is a hybrid role and can be based in London or Frankfurt. The Role As a Senior IT Security Analyst at euNetworks, you will play a key role in protecting the organisation against information security threats by implementing and maintaining both technical and organisational safeguards. Working closely with … the Information Security Steering Team and as part of the broader IT function, you will be instrumental indriving forward our security posture. What will you be doing? Administer and maintain the Security Information and Event Management (SIEM) system and other IT security platforms. Review and evaluate security aspects of IT projects, identifying risks and … ensuring appropriate controls are implemented. Investigate and respond to security incidents and queries, coordinating with relevant teams. Continuously monitor IT infrastructure for vulnerabilities, anomalies, and other potential security issues. Plan and coordinate external penetration tests to identify and address security weaknesses. Compile and deliver regular reports (monthly and quarterly) on the organisation's security status and More ❯
Administrator for the TMAS 2 Contract, supporting the 48 Cyberspace Test Squadron. Our cybersecurity team is searching for a new member that can support system administration as well as security analysis on Air Force/Space Force systems and/or software. This individual is responsible for ensuring the appropriate operational security posture is maintained for Air Force … DESIRED QUALIFICATIONS/SKILLS Experience with Docker Experience with Kubernetes Experience with PowerShell Knowledge of Cloud based computing (AWS or Azure) Knowledge of Infrastructure as Code Understanding of network security/engineering. Knowledge of host-based firewalls Experience with STIG compliance assessment RESPONSIBILITIES Administer laptop computers, software deployment, security updates and patches. User administration (setup and maintaining account … Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures as outlined in the security authorization package Attend required technical and security training (e.g., operating system, networking, securitymanagement) relative to assigned duties Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any More ❯
library of all supporting documentation. Qualifications Required Skills/Experience : Mid Level: 5 years of experience Microsoft Windows Active Directory Understanding of NIST 800 series publications and Federal Information SecurityManagement Act (FISMA) compliance Must be a U.S. Citizen An active DoD Top Secret clearance with SCI eligibility is required to perform this work. Candidates are required to … employment. Education Requirements : BS or B.A. Degree Preferred Qualifications: Microsoft Windows Server Hybrid Administrator Associate VMWare Data Center Virtualization (VCP-DCV) Cisco Certified Network Professional (CCNP) Certified Information Systems Security Professional (CISSP) VMWare vSphere 7 experience (P) Cisco Networking (P) Dell Server, and SAN Storage hardware experience (P) Familiarity with system accredita ti on and authorization and the FBI More ❯
ll be a key part of ourBusiness Support Function, implementing and managing our Data Protection Strategy, leading on our privacy compliance framework and supporting the wider team with Information Security matters. You'll be the subject matter expert and go-to person for all things data protection, ensuring we uphold the highest standards for our people, our partners and … Group. Review and manage vendor and customer contracts for data protection risk. Responding to and processing Subject Access Requests (SARs). Work closely with our IT Manager and Group Security Manager on developing and maintaining our Information Security policy. Support our IT Manager with the governance and upkeep of ISO 27001 certification and coordinate information security monitoring. … To advise on any changes required to maintain organisational compliance with Information Security, Data Protection and Records Management procedures, supporting Managers to implement action plans and have accountability for providing assurance to the Board and Senior Management teams regarding compliance. To provide strategic direction, advice and guidance on the diverse range of topics and issues that constitute More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
GreatFind Recruitment
this newly-created role, you’ll lead the execution of the Group GRC programme, align risk and compliance efforts with wider business goals, and ensure robust governance across information security and operational practices. Key Responsibilities: Develop and implement a comprehensive GRC framework across the group Conduct regular risk assessments and support vulnerability management Maintain and evolve security … of risk awareness through training and communication Monitor changes in regulation and adapt the GRC framework accordingly Ideal Candidate Profile: Minimum 5 years' experience in GRC, compliance, or risk management Solid understanding of regulatory frameworks and industry standards Hands-on experience with risk assessments and compliance auditing Strong communication and stakeholder engagement skills Professional certifications such as CISSP, CISM … governance and compliance strategy of a global business. You’ll gain exposure to high-profile projects and contribute to the company’s ongoing commitment to excellence in risk and security management. More ❯
Are you looking for an exciting new opportunity? Join a London based, product-agnostic consultancy specialising in information security governance, risk, and compliance management for clients across Europe. With a deep-rooted passion for cyber risk, the team excels at developing measurable controls that align with an organisation's risk appetite, capacity, and tolerance for breaches. Known for … crafting innovative and cost-effective Information SecurityManagement Systems (ISMS), the consultancy enables quantifiable compliance with key information security legislation, regulations, and industry standards, including PCI DSS, the UK Data Protection Act 2018 (DPA 2018), GDPR, and ISO/IEC 27001. If you would like to learn more about this opportunity, feel free to reach out and … of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and written communication skills, especially for client-facing engagements. More ❯
delivery of Information Governance support to DHU Healthcare. In this role, you will assist in managing external auditors, stakeholders, and third parties in line with the ISO 27001 ISMS Management System. Supporting the internal audit team, handling complaints and incidents, and responding to queries will also be part of your responsibilities. Main duties of the job To provide support … external stakeholder etc.) Support DHU Healthcare with Data Privacy Impact Assessments across new projects. Coordinate and support the development of IG Action Plans with the IG lead and applicable management teams to ensure evidence remains current and appropriate on an ongoing basis; reviewing relevant policies and agreeing any changes needed with the manager responsible. Administration of the annual Data … Security and Protection Toolkits as per contractual and legal requirements. Attending the Information Governance & Security Sub- Committee and provide reports from meetings to the Clinical Governance Oversight Committee as part of the overall Information Governance Management systems and Strategy. Liaising with the nominated Data Protection Officer, Caldicott Guardians and Senior Information Risk Owner in relation to IG More ❯
Contract Type: Permanent Hours: 37.5 hours per week In this role, you will assist in managing external auditors, stakeholders, and third parties in line with the ISO 27001 ISMS Management System. Supporting the internal audit team, handling complaints and incidents, and responding to queries will also be part of your responsibilities. What your typical day looks like: To provide … Support DHU Healthcare with Data Privacy Impact Assessments across new projects. Coordinate and support the development of Information Governance Action Plans with the Information Governance Action lead and applicable management teams to ensure evidence remains current and appropriate on an ongoing basis; reviewing relevant policies and agreeing any changes needed with the manager responsible. Attending the Information Governance & Security Sub- Committee and provide reports from meetings to the Clinical Governance Oversight Committee as part of the overall Information Governance Management systems and Strategy. Liaising with the nominated Data Protection Officer, Caldicott Guardians and Senior Information Risk Owner in relation to IG & ISMS tasks & issues. Deputise for the Information Governance Lead & ISO Business Systems Manager as required. Assist More ❯
Description SAIC is seeking a highly qualified and experienced Contract Program Security Officer (CPSO) to oversee and manage the security operations for a Sensitive Compartmented Information Facility (SCIF) in San Diego, CA . The ideal candidate will have extensive experience in building ICD 705 Physical Security construction designs, as well as expertise in TEMPEST requirements and procedures. … Responsibilities: SecurityManagement: Oversee and enforce security policies, procedures, and protocols to ensure compliance with all relevant regulations and guidelines. Manage and administer security clearances, briefings, and debriefings. Conduct security audits, inspections, and investigations to identify and mitigate potential security risks. ICD 705 Physical Security: Design and implement physical security measures in … accordance with ICD 705 standards to safeguard classified information. Develop and review construction security plans (CSPs) and manage the accreditation process for SCIFs. Collaborate with architects, engineers, and contractors to ensure security requirements are integrated into construction projects. TEMPEST Compliance: Implement and oversee TEMPEST measures to prevent compromising emanations from electronic equipment within the SCIF. Conduct TEMPEST testing More ❯
Solutions 71 is seeking an Information System Security Officer (ISSO), to support a Department of Defense customer. The ISSO will assist the embedded US Army Program Executive Office (PEO) Combat Support & Combat Service Support Engineering Team to design comprehensive cyber security program protection plans. This position will directly support the Program Information Security System Manager (P-ISSM … and the Chief Information Officer (CIO). The ISSO position will also have comprehensive information security responsibilities that include verification of security measures and procedures, and the reporting of incidents briefing the P-ISSM and the CIO verbally and in documentation. Specific Duties/Tasks (included, but not limited to): • Supports the CS&CSS ISSM and CIO in … the information security planning, design, and execution for all aspects of the PEO CS&CSS mission. • Perform technical reviews of security controls, assess the adequacy of protective measures, evaluate residual risk, and determine the applicable severity value for each control. • Support all steps of the RMF process as defined in DoDI 8510.01, using NIST controls and tools like More ❯
This is a contingent opportunity Information Systems Security Manager (ISSM) K2 Group is searching for an ISSM to support the Air Force Research Laboratory Sensors Directorate (AFRL/RY) at Wright-Patterson Air Force Base, OH. Duties: Be the Directorate's Certification & Accreditation (C&A) process expert. Perform C&A duties in compliance with the Risk Management Framework … review eMASS registration workbooks, recommend changes/clarification and submit updated workbooks to HQ AFRL for registration of Point-to-Point, Standalone, Standalone Enclave systems having a Federal Information SecurityManagement Act (FISMA) requirement. Coordinate any changes or modifications to hardware, software, or firmware of a system directly with the Authorizing Official (AO)/Delegated Authorizing Official (DAO … coordinate with system program managers to create, update, and maintain system documentation and supporting artifacts related to the RMF process. Requirements: Five (5) years of relevant experience Certifications: SPēD Security Fundamentals Professional Certification (SFPC) - required at start Microsoft SQL Server Management Studio (or Security+) - required at start SPēD Security Asset Protection Professional Certification (SAPPC) - required within More ❯
Company Description Since 2006, MAXISIQ has advanced the state of Cyber RDT&E by bringing together industry expertise in software, hardware, communications and security, and leveraging decades of operational experience to deliver exceptional value to communities and the critical missions they support. Join us where we innovate, develop smarter solutions, technologies, services, and actionable capabilities for our clients- right … when they need it most. Job Description MAXISIQ is seeking a Cloud Security Engineer (Principal) to support mission critical operations in Arlington, VA. This is a full-time position pending award, expected in March 2025. What You'll Be Doing: Assist in the design and management of the client's cloud systems, applications, network operations, policies, and strategy. … applications and infrastructure on cloud service platforms. Identify and evaluate the best cloud solutions for the organization. Create a well-informed cloud strategy and manage the adaption process. Incorporate securitymanagement and privacy requirements into cloud hardware, software, and applications. Design controls and processes that utilize available audit tools. Support cross functional teams with implementing the Risk ManagementMore ❯
Company Description Since 2006, MAXISIQ has advanced the state of Cyber RDT&E by bringing together industry expertise in software, hardware, communications and security, and leveraging decades of operational experience to deliver exceptional value to communities and the critical missions they support. Join us where we innovate, develop smarter solutions, technologies, services, and actionable capabilities for our clients- right … when they need it most. Job Description MAXISIQ is seeking a Cloud Security Engineer (Senior) to support mission critical operations in Arlington, VA. This is a full-time position pending award, expected in March 2025. What You'll Be Doing: Assist in the design and management of the client's cloud systems, applications, network operations, policies, and strategy. … applications and infrastructure on cloud service platforms. Identify and evaluate the best cloud solutions for the organization. Create a well-informed cloud strategy and manage the adaption process. Incorporate securitymanagement and privacy requirements into cloud hardware, software, and applications. Design controls and processes that utilize available audit tools. Support cross functional teams with implementing the Risk ManagementMore ❯
POSITION: Information Systems Security Engineer LOCATION: Colorado Springs, CO REQUIRED SECURITY CLEARANCE: Active TS with SCI; willing to take CI polygraph POSITION TYPE/STANDARD WORK HOURS: Full time, 40 hours THE OPPORTUNITY: Upon award, BTAS will be filling potential openings for the Space Systems Command (SSC). SSC plays a critical role in advancing the United States … located near Wright-Patterson Air Force Base in Beavercreek, OH. We have earned national and regional awards in the Department of Defense for our proven IT, Engineering, and Program Management capabilities. We are committed to working with exceptional quality and professionalism to deliver excellence to our customers, while providing our employees a stimulating and satisfying work environment as we … manage program Authority to Operate, Authority to Test, Authority to Connect, and Interim Authorities. Support cyber testing and assessment activities, documenting findings and corrective actions per the Federal Information SecurityManagement Act. Develop draft intelligence requirements and staffing packages. Advise on intelligence reports and translate program requirements into intelligence needs. Recommend courses of action to support mission-related More ❯
competition, Anduril is committed to bringing cutting-edge autonomy, AI, computer vision, sensor fusion, and networking technology to the military in months, not years. ABOUT THE TEAM The Global Security, Systems & Infrastructure (GSSI) team at Anduril leads the charge in protecting our people, assets, and innovations. We design and implement cutting-edge security solutions that integrate physical and … to stay ahead of evolving threats. Our mission is to create a secure environment that enables Anduril's transformative work in defense technology. We're not just responding to security challenges - we're anticipating and solving them, ensuring Anduril's continued growth and innovation in a complex global landscape. ABOUT THE JOB The Security Hardware Specialist will play … a crucial role in designing, implementing, and maintaining cutting-edge security systems for Anduril's facilities and operations. Reporting to the Security Systems & Infrastructure Manager, this position requires a highly skilled professional with a strong background in security technology, project management, and system integration. The ideal candidate will have the ability to bridge the gap between More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
Cyber Security Specialist Location: Havant Job Type: Full-time, Hybrid (3-4 days per week), 12-month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new Information SecurityManagement System (ISMS) and ensure compliance with security standards. This role … is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa 500 IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards … and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify and assess security risks and vulnerabilities, developing mitigation strategies. * Support regular audits and assessments to ensure adherence to security policies. * Provide reporting on security incidents, compliance status, and risk assessments. * Collaborate More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework … RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description The Cyber Trainer provides support to the customer in the area of Cybersecurity policy, process, and tool training. Daily tasks include, but are not limited to: Works with the training team to provide IA training as directed by the … delivery, and follow-up Create and update training materials as new Cyber tools and capabilities are fielded or processes are created or modified Provide training related to ServiceNow, Risk Management Framework (RMF), Continuous Monitoring, Privileged Users, Information Assurance, Information System Owner cyber responsibilities, etc. Job Requirements Qualifications Required: Current U.S. Government Top Secret clearance with SCI eligibility Favorably adjudicated More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
Security & Compliance Lead Chesterfield £50,000 to £55,000+ Excellent Benefits Your new company Hays Technology are recruiting for an Information Security & Compliance Lead to join a large public sector organisation based in the Chesterfield area. You will be reporting to the Head of Digital, Data & Technology. This is a new role to establish and make your own. … Your new role In your new role, you will be responsible for ensuring the security and protection of the organisation's information systems, networks, and data, whilst playing a critical role in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise the impact of security incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ikhoi Recruitment
A fantastic award winning MSP is looking for a talented Senior Cyber Security Engineer to come and join their team. This is a fantastic opportunity for someone who wants to work for one of the best MSP and voted the best work place. The role is 3 days in the office and 2 days WFH. Excellent Benefits After … to Work scheme, quarterly team nights out/events, monthly games night with pizzas and breakfast on Wednesdays Job Description This great MSP is looking for a Senior Cyber Security Engineer to join their expanding UK based Cyber Security Projects team. The ideal candidate would be someone that is already in a similar role and has minimum of …/2-year experience. As a Senior Cyber Security Engineer, you will be primarily responsible for deploying Security Technology Solutions for our clients together with assisting our Chief Information Security Officer with Cyber Essentials and Cyber Essentials Plus Audits and Assessment. You will be reporting to the Project Management Office Team on a Daily Basis and More ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework … RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cyber Data Science Engineer provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to: Utilize analytical, statistical, and programming skills to collect, analyze, and interpret large cybersecurity data sets … Develop data-driven solutions Analyze data sets found in the customer's vulnerability scanning, auditing, authorization, and configuration management tools Import, transform, analyze, and visualize data and report actionable insights to the customer (e.g., Tableau) Provide analysis and graphical presentations of collected metrics for IA compliance status reporting Support and evolve legacy visualization and situational awareness tools based on More ❯
Information Security Lead - create the security strategy for a SaaS startup - £60,000 - £75,000 + 10% Bonus A dynamic and rapidly expanding technology company focused on revolutionizing learning and upskilling is seeking its first dedicated Information Security Lead. This is a crucial role for a fast-growing SaaS platform that empowers individuals to learn what they … need, when they need it, and is already trusted by major organizations. This is an exciting opportunity for an experienced Information Security professional to be the subject matter expert and build the security function from the ground up. You will take ownership of identifying, assessing, and mitigating information security risks across the business, as well as establishing … and maintaining robust security processes and controls to support commercial, engineering, and product teams. The ideal Information Security Lead will be responsible for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information SecurityManagement System (ISMS) lifecycle. Performing regular risk assessments, developing More ❯
The program provides Systems Engineering and Technical Assistance (SETA) support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment … and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Mission Defense Team (MDT) SETA provides support to the customer in the area of Cybersecurity. Daily tasks include, but are not limited to: Identify baseline, capability and coverage gaps Recommend process improvements Plan future requirements and capabilities Support specific technical efforts to enable mission assurance, resiliency … and supervision Experience briefing senior customer personnel Ability to organize and prioritize numerous customer requests in a fast-paced deadline driven environment Familiarity with customer's IA processes Travel Security Clearance Top Secret/SCI/CI Poly More ❯
Travel: The Opportunity: We are seeking a highly skilled and motivated Delegated Authorizing Official Representative to join our team. This position is responsible for assisting in identifying the overall security requirements for protecting data and ensuring the implementation of appropriate information security controls. The ideal candidate will have expertise in performing and analyzing security risk assessments, risk … analysis, and security control assessments, as well as a deep understanding of securitymanagement processes. You will play a key role in supporting the organization's cybersecurity objectives, interacting with IT staff, customers, and high-level corporate officers. Key Responsibilities: Perform security planning, security assessment, risk analysis, risk assessment, and risk management support activities … Perform risk assessment and management to support integration of legacy systems into existing IT environment Review and analyze Cybersecurity built into systems to be deployed to operational environments Prepare risk assessment, plan of actions, authorization recommendations, and related security authorization documentation Qualifications: Required: Current Active TS/SCI with POLY Eight (8) years of experience as an IT More ❯