Information Systems SecurityManager - Level 2 Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: The Opportunity: We are seeking a highly skilled and experienced professional to provide … comprehensive management support for an organization's Information Assurance (IA) program. The ideal candidate will play a key role in ensuring the security of information systems by overseeing the proposal, coordination, implementation, and enforcement of security policies, standards, and methodologies. Responsibility: The candidate will be responsible for managing … the operational security posture of an Information System, ensuring compliance with established policies, procedures, and standards. In this role, the candidate will work closely with Information System Security Engineers (ISSEs) and Information System Security Officers (ISSOs) to evaluate security solutions and assess their effectiveness in protecting More ❯
Information SecurityManager 📍 Bristol | 5 Days Onsite | circa £65,000 TRIA are supporting a leading Logistics & Transportation company in Bristol, seeking an Information SecurityManager to drive cybersecurity strategy and enhance security across critical infrastructure. You’ll be at the forefront of their information security strategy, ensuring the confidentiality, integrity, and availability of cyber and information security assets. You will lead the security team, manage third-party SOC operations, and be accountable for progressing the Cyber Assurance Framework (CAF). The Role Lead and mature the Cyber Assurance Framework (CAF) Assess and … mitigate risks across networks, systems, and applications Manage security team & third-party SOC operations Implement security controls, policies & awareness programs Monitor threats, lead incident response & drive security culture Report security posture & metrics to IT Director & leadership Oversee security assessments, audits & penetration testing What You’ll More ❯
Position Overview We are seeking an experienced Program Manager with a strong background in physical security to oversee and enhance the performance of a key government contract. This role requires a strategic leader who can coordinate with stakeholders, ensure compliance with contract requirements, and drive operational efficiency while … maintaining a high standard of physical security program management. The ideal candidate will have experience managing security-focused contracts, overseeing physical security solution implementations, and working closely with internal teams and government customers to ensure optimal security operations. This position involves strategic program oversight and hands … on project execution within a government security environment. Program & Contract Oversight Serve as the primary liaison with the Contracting Officer's Representative (COR) regarding contract performance and compliance. Oversee contract deliverables, ensuring all performance metrics align with the Performance Work Statement (PWS). Track and manage contract vacancies, collaborating More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Anson McCade
Senior Manager - Senior Manager Information Security I Professional Services | £85k | Hybrid (2-3 days in office) A consulting firm is looking for a Senior Manager - Senior Manager - Information Secuirty to advise and support various business units. Reporting to the COO, CTO, and Directors, this role … bridges stakeholders and technical teams, enhancing security strategies across the firm. Key Responsibilities: Act as a trusted security advisor, aligning security with business objectives. Translate security concepts into business language for stakeholders. Foster a strong security culture and awareness. Shape future security strategies within … the organization. Collaborate with CIOs, CTOs, COOs, and key business leaders. Mentor a small team while guiding security initiatives. Leverage industry contacts to support security goals. Ideal Candidate: 7+ years in Information Security, GRC, or Risk (BISO background preferred but not essential). Experience in financial or More ❯
Job Description IT SecurityManager Our Client is a large international organisation who are looking to recruit an IT SecurityManager with at least 5 to 8 years proven expertise. Provide advice, support and guidance to all Company Corporate functions to assist them to maintain and … improve their information security maturity. To work collaboratively with all areas of the Company Corporate and build networks and relationships to promote Information Security. Act as subject matter expert on for IT Security, including legal and regulatory compliance Advise Company Corporate functions on how to achieve the required … controls and assist with solutions to support them. Eg Support in the development of standards and their application in line with Group security policies. Participate in Company BU's Projects giving support, guidance, control validation and overall security assurance. This could also involve sitting on major project steering More ❯
Job Description IT SecurityManager Our Client is a large international organisation who are looking to recruit an IT SecurityManager with at least 5 to 8 years proven expertise. Provide advice, support and guidance to all Company Corporate functions to assist them to maintain and … improve their information security maturity. To work collaboratively with all areas of the Company Corporate and build networks and relationships to promote Information Security. Act as subject matter expert on for IT Security, including legal and regulatory compliance Advise Company Corporate functions on how to achieve the required … controls and assist with solutions to support them. Eg Support in the development of standards and their application in line with Group security policies. Participate in Company BU's Projects giving support, guidance, control validation and overall security assurance. This could also involve sitting on major project steering More ❯
Information Assurance SecurityManager Contract London Day rate: 500 - 650 inside IR35 We're currently seeking an experienced and ambitious Information Assurance SecurityManager to work with our exceptional client, a world class brand in a secure environment to support major challenging and highly rewarding projects … across this complex organisation. This contract role will require you to conduct security clearance prior to assignment. This opportunity is based in London. You will be responsible for the establishment and maintenance of an information assurance framework and associated security documentation, whilst remaining aligned to corporate information security … organisational goals. The role is responsible for the protection of information assets by identifying, evaluating and reporting on information assurance framework controls and information security risk in a manner that supports compliance, governance, regulatory requirements and the overarching risk posture of the enterprise. Responsibility as the local SME on More ❯
City of London, London, Lime Street, United Kingdom
Guidant Global
Information Assurance SecurityManager Contract London Day rate: £500 - £650 inside IR35 We're currently seeking an experienced and ambitious Information Assurance SecurityManager to work with our exceptional client, a world class brand in a secure environment to support major challenging and highly rewarding projects … across this complex organisation. This contract role will require you to conduct security clearance prior to assignment. This opportunity is based in London. You will be responsible for the establishment and maintenance of an information assurance framework and associated security documentation, whilst remaining aligned to corporate information security … organisational goals. The role is responsible for the protection of information assets by identifying, evaluating and reporting on information assurance framework controls and information security risk in a manner that supports compliance, governance, regulatory requirements and the overarching risk posture of the enterprise. Responsibility as the local SME on More ❯
Overview M.C. Dean is currently looking to hire a Site SecurityManager for our facility in Ruther Glen, Caroline County, Virginia. The campus currently consists of five structures, including administrative, manufacturing and warehouse space. The Site SecurityManager (SSM) will report to the Vice President of … Corporate Security, however will be responsible for working effectively with the campus leadership team. Duties include: Supervising the activities and rotation of a contract security force of four people. Inspecting the campus and buildings daily to identify any security issues or security maintenance requirements Ensuring appropriate … reports on Security matters are accurately completed and submitted in a timely manner. Work effectively and collaborate with other members of M.C. Dean Security and groups including, but not limited to: MCD Leadership Team, Strategic Business Units, Human Resources, Safety, Logistics, Manufacturing and Warehousing. Respond to off-hour More ❯
Title: Information Systems SecurityManager (ISSM) Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on … the country's most critical role - protecting our national security. KBR is seeking an Information Systems SecurityManager (ISSM) to join our team in El Segundo CA. This is an excellent opportunity to join a small, hand selected systems security engineering team defining the next generation of … innovation, fostering a supportive and intellectually stimulating workplace. Impactful Work: Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense. Key Responsibilities: Maintain and enforce all cybersecurity policies, standards, and directives to ensure assessment and authorization of More ❯
re looking for talented people who want to help. You'll join a diverse team of software, hardware, and network engineers, supply chain specialists, security experts, operations managers, and other vital roles. You'll collaborate with people across AWS to help us deliver the highest standards for safety and … security while providing seemingly infinite capacity at the lowest possible cost for our customers. And you'll experience an inclusive culture that welcomes bold ideas and empowers you to own them to completion. For our data centres and other facilities we are looking for Data Centre SecurityManager (DCSM) to work closely with the Cluster SecurityManager and oversee security excellence across the Region. The DCSM is responsible for the execution of the Security Program in the Data Centre Cluster. They will provide on-site direction, consistency and guidance to the contract securityMore ❯
in London. Reporting the to the Head of IT, the successful candidate will play a key role protecting IT services and infrastructure from cyber security threats. Role Overview The purpose of a Cyber SecurityManager role is to protect GTS Rail Operations Limited’s IT Services and … infrastructure from cyber threats. The role is responsible for designing, implementing, and maintaining security measures to ensure the confidentiality, integrity, and availability of data and services. The role includes identifying vulnerabilities, monitoring for security breaches, and responding to incidents. They also work to educate employees on best practices … for information security. Main Responsibilities Security Implementation and Management Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and mitigate potential threats. Design and enforce security controls based on identified requirements and gaps More ❯
in London. Reporting the to the Head of IT, the successful candidate will play a key role protecting IT services and infrastructure from cyber security threats. Role Overview The purpose of a Cyber SecurityManager role is to protect GTS Rail Operations Limited’s IT Services and … infrastructure from cyber threats. The role is responsible for designing, implementing, and maintaining security measures to ensure the confidentiality, integrity, and availability of data and services. The role includes identifying vulnerabilities, monitoring for security breaches, and responding to incidents. They also work to educate employees on best practices … for information security. Main Responsibilities Security Implementation and Management Deploy and optimise security solutions to safeguard IT services and infrastructure. Lead security assessments including vulnerability testing and risk analysis to identify and mitigate potential threats. Design and enforce security controls based on identified requirements and gaps More ❯
Overview SUMMARY: Seeking a highly experienced and dedicated Security Program Manager to oversee and manage comprehensive security programs at the Pentagon in various security domains, including Personnel Security (PERSEC), Physical Security (PHYSEC), Information Security (INFOSEC), Industrial Security (INDUSEC), Communications Security (COMSEC … Disclosure, Foreign Visits, Privacy, Antiterrorism/Force Protection (AT/FP), and Sensitive Compartmented Information (SCI) program management. DUTIES & RESPONSIBILITIES: Develop, implement, and manage security policies, procedures, and programs across multiple security domains. Ensure compliance with federal regulations and organizational policies related to security. Conduct risk assessments and … vulnerability analyses to identify and mitigate security threats. Oversee the protection of classified and sensitive information, ensuring adherence to INFOSEC and SCI protocols. Coordinate physical security measures to safeguard personnel, facilities, and assets. Implement and monitor industrial security programs to protect against espionage and unauthorized disclosures. Supervise More ❯
Job Description Cyber SecurityManager Our Client to be secured and protected from increased cyber threats and compliant to industry standards. This role covers information protection, including data loss protection and data classification, and threat protection, including security information and event management (SIEM), user and entity behaviour … consists of approximately 20 staff who support and operate the Company's services and there is an opportunity in that team for a Cyber SecurityManager to oversee and govern all security services. Reporting Lines This role reports to Head of Service Delivery Main Accountabilities Technical leadership … for all security solutions, including all the 3rd party managed services Maintain the overall security of Company's network, systems, and data Monitor security access and manage IDS/IPS configurations Establishing and implementing security 'best-practice' standards as well as departmental policies and procedures Responsible More ❯
Detroit, Michigan, United States Hybrid / WFH Options
OpTech
Great opportunity for a Sr. Cyber SecurityManager NO C2C, No sponsorships Location: Detroit, MI Salary Range: $120-150k with excellent employee benefits REQUIRED EDUCATION AND EXPERIENCE: • Relevant Bachelor's degree in Computer Science/Information Technology or equivalent education or work experience with an emphasis on … Cyber Security. • 5+ years of prior relevant experience in Cyber Security management • Knowledge of various anti-virus software tools including Microsoft Defender, Sophos End Point (Defender is a MUST) • Knowledge of various operating systems such as Windows 11 OVERVIEW; Cyber security managers are responsible for managing the cyber … security of an organization. They oversee a team of IT professionals who work to protect the company from cyber threats and attacks. Cyber security managers may also be tasked with developing and implementing policies that help ensure the safety of sensitive data or systems. This might include creating More ❯
Overview The IT SecurityManager (ITSM) acts as an interface between the Executive Director of IT and IT Security strategic and process-based activities and the work of the technology-focused analysts, engineers, and administrators in the Information Technology (IT) organization. The ITSM is a leadership role … and specifications, as well as develop metrics for ongoing performance measurement and reporting. Coordinates the IT organization's technical activities to implement and manage security infrastructure, and to provide regular status and service-level reports to management. Strategic Support: Works with the Executive Director of IT and IT Security to develop a security program and security projects that address identified risks and business security requirements. Manages the process of gathering, analyzing, and assessing the current and future threat landscape, as well as providing the Director of IT Security with a realistic overview of risks More ❯
Job Description Position is contingent upon award Active TS/SCI with Polygraph Clearance Required Manage the security program for multiple Fluor locations supporting Fluor Mission Solution Intelligence Group projects in Northern Virginia, as well as other CONUS and OCONUS sites. Position responsibilities include management and implementation of the … overarching Fluor security program, as well as oversight of security requirements across the Intelligence Group. Duties include the following: • Security management and oversight of classified projects in accordance with Intelligence Community Directives, Security Executive Agent Directives, and the National Industrial Security Program as appropriate. • As … member of corporate industrial security team, creates, executes and monitors security policies and procedures to safeguard national security information, processes and products. • Develops and implements procedures relating personnel security processing, as well as access control procedures, visitor access certifications and badging. • Maintains personnel security clearance More ❯
Member of and appropriate/relevant "Security Institute" Experience in public speaking and community liaison work Excellent communication, leadership and interpersonal skills Hold or be able to hold a UKSV Clearance (SC minimum) Experience as a SecurityManager in an organisation similar in size/capability to … STRABAG Experience using relevant technology and equipment (e.g. CCTV/Access Control) Experience in reporting and emergency response planning Excellent knowledge of security protocols and procedures The Nuclear Industries Security Regulations 2003 The Anti-Terrorism Crime and Security Act 2001 The Official Secrets Act ONR/Government … Classifications Policy 2023 ONR Security Assessment Principles (SyAps) and supporting TAG's DEFCON 658 DEFCON 659A DEFCON 660 Diploma in Security Management (BTEC Level 5) or appropriate/relevant technical/professional qualification BPSS/DBS clearance Solid understanding of threat analysis and asset protection Your contribution to More ❯
Herndon, Virginia, United States Hybrid / WFH Options
VTG
Overview The Information System SecurityManager (ISSM) is responsible for the overall security posture of information systems within the SCIF and other secured environments. The ISSM ensures compliance with federal regulations, security policies, and accreditation requirements to safeguard classified information. This role requires strong technical expertise … hybrid, based out of Herndon, and supports multiple facilities in the DMV area (Herndon, Manassas, and Washington D.C.). What will you do? System Security Management: Oversee the implementation and management of system security measures in compliance with National Industrial Security Program Operating Manual (NISPOM), Risk Management … Framework (RMF), Intelligence Community Directives (ICDs), and other applicable regulations. Maintain the security posture of classified systems by ensuring compliance with Assessment and Authorization (A&A) requirements. Risk Assessment and Mitigation: Conduct regular risk assessments, vulnerability scans, and security audits to identify and mitigate potential threats. Develop, implement More ❯
Must have an active (or ability to obtain) TS/SCI with CI Polygraph Clearance This position is contingent upon contract award Manage the security program for multiple Fluor locations supporting Fluor Mission Solution Intelligence Group projects in Northern Virginia, as well as other CONUS and OCONUS sites. Position … responsibilities include management and implementation of the overarching Fluor security program, as well as oversight of security requirements across the Intelligence Group. Duties include the following: • Security management and oversight of classified projects in accordance with Intelligence Community Directives, Security Executive Agent Directives, and the National … Industrial Security Program as appropriate. • As member of corporate industrial security team, creates, executes and monitors security policies and procedures to safeguard national security information, processes and products. • Develops and implements procedures relating personnel security processing, as well as access control procedures, visitor access certifications More ❯
This position is a contingency opportunity The Activity SecurityManager's primary function is to provide multi-disciplined security support to a customer's facility and organization. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. … The position will provide task coverage for all security functions/programs within the organization. This position also serves as Technical Security SME support to security program, provides validation site visits and augment IG for inspection of unit's and organizations performing SAP missions. Additional responsibilities include … access eligibility Perform data entry and record checks within Joint Access Database Environment (JADE) and maintains all customer sponsored personnel access information current; maintain security files IAW CAF guidance Assist with researching, processing, filing, and maintaining inbound and outbound visit notices Manage the organizations Physical and Technical SecurityMore ❯
an ISSM to lead and support other cybersecurity professionals in the execution of information assurance programs and will support other IT teams in implementing security measures. This is accomplished in compliance with CMMC and Risk Management Framework policies and procedures such as System Security Plans, Risk Assessment Reports … Plans of Actions and Milestones, Assessment & Authorization packages, and Security Control Traceability Matrices. The ISSM will maintain an operational security posture and ensure security policies, standards, and procedures are established and followed. The ISSM will perform vulnerability and risk assessment analyses to support Assessment & Authorization and will … provide configuration management for security software, hardware, and firmware. This position is based on multiple DoD Directives; including DoD 5205.07 volumes 1-4; DoDD 5205.02E; DoDI 5025.01, 5205.11, 5200.39, 5220.22, DoDM 3305.13; DoD 8140 series; Intelligence Community Directive Series 500/600/700; NIST 800 series special publications More ❯
management support for a program, organization, system, or enclave's Information Assurance program. Provide management support for proposing, coordinating, implementing, and enforcing Information System Security policies, standards, and methodologies. Manage operational security posture for an Information System or program to ensure Information System Security policies, standards, and … procedures are established and followed. Provide management of security aspects of the Information System and perform day-to-day security operations of the system. Assist ISSEs and ISSOs with evaluating security solutions to ensure they meet security requirements for processing classified information. Manage the performance of … vulnerability/risk assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System More ❯
Must have an Active and Current Top-Secret Clearance with Full Scope Polygraph. Pay will be based on experience with Benefits. RESPONSIBILITIES: Assists the SecurityManager(s) in their Services duties and functions as their backup. Assists in the recruitment, selection, orientation, training, development, and retention of unarmed … Supplier security personnel providing Services Ensures all Supplier security personnel providing Services are licensed as and meet the federal, state, and local requirements for unarmed security personnel. Ensures accountability, maintenance, and security for all Supplier provided equipment and expendable supplies required to provide Services under this … SOW. Maintains training records and other logs as required. Ensures all Supplier security personnel providing Services are competent and trained in the security systems, equipment, tools, and processes, appropriate to their Role. Continually prepares for internal and third-party audits, announced or unannounced, ensuring adherence with approved securityMore ❯