Description Leidos has an upcoming opening for an Information System SecurityOfficer (ISSO) at Scott AFB, IL. Candidates must already possess a current TS/SCI security clearance in order to be considered. The ISSO will provide cybersecurity support services to assist ACC Cybersecurity Chief Information SecurityOfficer and unit Information System Security Officers (ISSO) in maintaining an effective cybersecurity program that supports missions and adequately protects the confidentiality, integrity and availability of AF IC information resources. Duties include: Assist in the d evelop ment of local unit Cybersecurity programs and security plan … IC, and DOD guidance. Assist in gather ing data, analyze compliance and report results on the condition and progress of local unit Cybersecurity programs, security plans, plan of action and milestones (POA&M) and Assessment and Authorization (A&A) workflow tools data, patch management, information assurance vulnerability alerts (IAVA more »
General information Chief Information SecurityOfficer (CISO) Location: The Hague Industry: Financial Services Permanent Reason for Hiring: Due to the ever-changing landscape of regulations surrounding cybersecurity and IT, our client's organization is seeking a seasoned professional to assume the role of Chief Information SecurityOfficer … critical position, you will play a key role in leading the client through this continuous journey, ensuring compliance with evolving regulations and implementing robust security measures to protect our organization's digital assets. Key Responsibilities: You Bring a clear vision on Cyber Security and GRC; Due to your … the organisation in order to understand how the business is run. Thru that deep understanding you will help steer the organisation in its Information security strategy. You help develop and implement comprehensive information security strategies, policies, and procedures to ensure compliance with relevant regulations and standards, while leading more »
Great opportunity to work as a SecurityOfficer at a leading global security and outsourcing group, specialising in the outsourcing of business processes in sectors where security and safety risks are considered a strategic threat. Staffline is recruiting for a SecurityOfficer to work … 6am to 6pm. **Please note you must be over the age of 18 to apply for this role** Your Time at Work As a SecurityOfficer, you are more than a Security Guard. You'll ensure the safety of our customers staff, their buildings and assets, whilst … in a safe and secure environment. It's a varied role that includes greeting staff and visitors and ensuring they adhere to the required security protocols, conducting searches where required, patrolling the premises, and dealing with security incidents. You'll ensure visitors and staff are in a safe more »
Information SecurityOfficer Hours : part-time, 3 days per week Company : Growing Software Vendor Why : Support the build & maintenance ISO27001 and other policies Location : Greater Reading area office (hybrid, 1 day in the office initially then as and when needed) Do you have 3+ years' experience in a … commercial compliance or information security role? Have you been part of maintenance of ISO27001 policies and procedures? Are you a collaborative person that enjoys making a difference? The company are a leading software vendor, experiencing huge growth and with a reputation for being a market leader. They are looking … for an experienced Information SecurityOfficer to support the build and completion of ISO27001. You will work closely with C-suite level stakeholders and teams to build and maintain all ISO27001 processes and policies. Once this has been submitted, you will build and support compliance and securitymore »
Business Information SecurityOfficer (BISO) Location: Manchester, United Kingdom Salary: Up to £85,000 per annum + £5,900 benefits + £15,000 Bonus Are you a skilled Information Security professional with a passion for business enablement and risk management? Our esteemed Big 4 consulting firm is … seeking a talented individual to join our team as a Business Information SecurityOfficer (BISO) in Manchester. This role offers an exciting opportunity to lead information security initiatives and drive business success in a dynamic environment. As the Business Information SecurityOfficer (BISO), you will … integrity, and availability of our firm's information assets. Leveraging your expertise, you will collaborate with business stakeholders to develop and implement robust information security strategies and controls. This role offers the opportunity to make a significant impact while advancing your career within a globally recognized consulting firm. Key more »
Amersham, Buckinghamshire, South East, United Kingdom
ICTS (UK) Ltd
Established in 1987, ICTS is a multi-award-winning company, employing over 4,000 people in the UK: providing security solutions throughout Europe in manned guarding, control room services and technical aspects for a fully integrated security service. As a business, we take our commitment to the principles … earnestly and we look forward to welcoming you into our supportive working culture. Within this active role, you will be required to ensure the security and safety of warehouse stock, premises, and colleagues for the world's leading on-line retailer. Working as part of a team in a … continuously and welcomes any applicants who are reliable and flexible with great communication skills, both verbal and written. An SIA Door Supervision (DS) or Security Guarding (SG) license is essential for the role, and we can provide exceptional training and certification for the right candidate with transferable skills in more »
In this high-profile securityofficer role, you'll ensure the security and safety of the people and premises at prestigious client sites. An experienced SecurityOfficer, with exceptional customer-focus, you will carry out a range of duties including: Managing access control for buildings … team you will need to be flexible to support your colleagues, with short notice calls to cover shifts likely. Substantial experience as a Corporate SecurityOfficer is essential, and to succeed in this role you will also need: Excellent verbal and written communication skills Strong customer service, team … IT and administration skills including MS Outlook, Word & Excel Professional appearance and demeanour Willingness to undertake development training An SIA Door Supervision (DS) or Security Guarding (SG) license Five years' checkable history and references To pass a criminal records check (CRC) to the required standards The following is essential more »
Employment Type: Permanent
Salary: £12.46 Per Hour + minimum 5% increase Dec 19th 2024
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
We are currently recruiting for a Chief Information SecurityOfficer (CISO) , reporting to the Chief Technology Officer, to be responsible for ensuring the security, privacy, and compliance of Tunstall's operations on a global scale. This role could work on a hybrid basis from any of … you be doing in this role? As our CISO , you will safeguard the company's internal infrastructure, but also influence and contribute to the security and resilience of our operations, assets, and reputation. This role is not just the shaping of strategy but the execution and hands-on delivery … of this strategy. You will help shape and build a comprehensive cyber security and information security strategy that aligns with business objectives and play a pivotal role in ensuring the security of our SaaS products . The identification, assessment, and prioritisation of security risks associated with more »
Tewkesbury, Gloucestershire, South West, United Kingdom
Babcock
Job Title: SecurityOfficer Location: Tewkesbury, Gloucester - Onsite Compensation: Competitive Salary + Benefits Role Type: Full time/Permanent Role ID: SF56388 At Babcock we're working to create a safe and secure world, together, and if you join us, you can play your part as a SecurityOfficer at our Ashchurch site. The role As a SecurityOfficer, you'll have a role that's out of the ordinary. The security team ensures our premises are secure and continue to operate allowing our wider team to deliver projects and support services. Our … reporting irregularities, inform staff and visitors of policy and procedures; deter trespassers Compile reports by recording observations, information, occurrences, and surveillance activities Ensure the security, safety and well-being of all personnel, visitors, and the premises Respond to emergencies to provide necessary assistance to employees and customers This role more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
based on industry best practice and department of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized … DoD portals and tools (RAMs, IKE, JCC2, etc.) Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.) Skilled in building extended cyber security analytics (Trends, Dashboards, etc.). Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership. more »
Herndon, Virginia, United States Hybrid / WFH Options
Leidos
Description Leidos has an opportunity for an Information Systems SecurityOfficer (ISSO) to support the JIOC Program. The ideal candidate will be joining a small team and will share the knowledge, workload and the future for a mission critical application. Must be able to work on-site in … all information assurance matters, technical and otherwise, involving the classified information systems (IS) under her/his purview. Ensures IS compliance with agency information security policies, standards, and procedures that support maintaining the IS operational security posture. Develop and maintain Assessment & Authorization (A&A) Body of Evidence (BOE … documentation including System Security Plan (SSP), Security Test Plan (STP), Security Controls Traceability Matrices (SCTM), Plan of Actions and Milestones (POA&M) according to Risk Management Framework (RMF) processes (ICD 503, CNSSI-1253, NIST 800-37, NIST 800-53, etc.) via Xacta. Support IS security self more »
Exciting opportunity for an experienced Information SecurityOfficer to join a global professional services organisation based in Glasgow. You will have a key role in ensuring the security of their systems and data by evaluating the risks associated with third-party vendors and internal projects and recommending … appropriate risk mitigation strategies. You will work closely with cross-functional teams across the organisation to ensure compliance with security standards and best practices. Key responsibilities: Assessing Security Risks (SCTY - Level 4, BURM - Level 4) Conduct vendor risk assessments and project security risk assessments based on established … methodologies and frameworks. Evaluate security risks associated with third-party vendors and internal projects, considering factors such as security, privacy, and compliance. Identify vulnerabilities and potential risks and provide recommendations for risk mitigation strategies. Apply knowledge of industry best practices and regulatory requirements to assess and mitigate securitymore »
Role: Information SecurityOfficer Location: London Salary: £70,000+ Locke & McCloud have partnered with a global legal services firm who are looking to grow a well- established Information Security function. Keen to hear from individuals that have worked in highly regulated environments and have a clear track … record of delivering on team project work. This role reports into the Information Security Manager. Key Responsibilities: Perform vendor risk assessments and evaluate security risks. Assess security risks linked with both third-party vendors and internal projects. Apply risk management principles to identify, assess, and prioritise security risks. Collaborate with project managers and technical teams to assess security risks and propose appropriate risk mitigation strategies. Perform regular reviews and audits to verify adherence to security policies, standards, and regulatory mandates. Assist in creating and enforcing security policies, standards, and procedures concerning vendor management more »
Stevenage, England, United Kingdom Hybrid / WFH Options
Omega
Job Title: Product Cyber SecurityOfficer Location: Stevenage – Hybrid (1-2 days office work) Pay Range/details: up to £55k + bonus, pension and more. Contract Type: Permanent Full-time Our client, a global leading manufacturer at the forefront of weapons systems design, development, and deployment, is … seeking a Product Cyber Security Officer. The organisation develops Advanced Missile and Defence Systems, providing decisive national security capabilities to our Home Nations and strategic allies. As a Product Cyber Securityofficer, you will be an integral part of a small team that serves as the … for all matters related to the governance of Product Cyber Security. Your role will involve liaising with government agencies, advising and monitoring project cyber security architectures and implementations, and maintaining relationships with our shareholders, key suppliers, and academic bodies in this domain. Please note, due to the nature of more »
Senior Infrastructure SecurityOfficer My client is currently searching for a Senior Infrastructure SecurityOfficer To provide first level hardware and software support for all staff IT enquiries, escalating as appropriate and providing end-user guidance where required. Assist with administration of network virtual infrastructures, network … security, data management, and network user accounts. Assist with deployment and administration of Microsoft client and host software. Assist with procurement, installation and deployment of IT hardware and software. You will have experience with these: Creating and managing networks and virtual infrastructure Assessing network performance and functionality Implementing securitymore »