Cyber SecuritySpecialist (PAM/IAM Solutions/Application Control - whitelisting/blacklisting) Location: Dartford Salary: Competitive base, car/travel allowance + benefits Job Type: Permanent Be part of transforming the construction industry, be part of our Cyber Security team. Are you able to support comprehensive Cyber Security programs whilst optimising the operational performance and … reliability of Infrastructure technologies? Then we need your expertise in controls and activities for the effective management of critical cyber security platforms. Are you skilled with Privilege Access management, Application Control and Data Loss Prevention solutions? The we need you to help optimise performance and ensure compliance to our cyber security certification requirements. This position requires a deep … understanding of security protocols, risk management, and the ability to proactively identify and mitigate potential threats to the business, whilst delivering cyber security with a service mindset. You will work closely with cross-functional teams from infrastructure and network support analysts across the business units to ensure the integrity and security of our applications and data. Key More ❯
service life. The organization also maintains inactive ships for future disposal, donation, or transfer, to include follow-on technical support to our partner navies. Duties include: The Information System SecuritySpecialist is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated competency with … specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. The specialist should demonstrate a working knowledge of the Risk Management Framework (RMF) process and/or include prior experience with the Defense Information Assurance & Certification … Accreditation Process (DIACAP). Familiarity with security policies & guidance documents to assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements. The specialist is expected to evaluate security solutions to ensure they meet security requirements for processing up to classified information and supervise and/or More ❯
Type: Full Time Location: Washington, DC Overtime Exempt: No Reports To: ARMADA HQ Security Clearance Required: Active Top Secret CONTINGENT UPON AWARD Duties & Responsibilities: The Senior SecuritySpecialist IV shall monitor and manage security programs and operations supported by providing status reports and recommendations for decisions. The Senior SecuritySpecialist IV shall assist, collaborate … and coordinate with other SIS offices and divisions (SISP,SISO, SISI, SISM, SISX, SISS, etc.). The Senior SecuritySpecialist IV develops solutions and conveys to internal and external customers. Provide agency level technical expertise concerning the identified security disciplines and operations support. Monitor security applications through the review and analysis of appropriate metrics and maintain … required records. Prepare and disseminate security procedures/guidance. Provide guidance as required in implementing security requirements. Manage project milestones. Develop life cycle plans. Update and maintain appropriate records (e.g. database and hardcopy) of security actions. Conduct inspections and performs assistance visits, as required. Liaise with members of the DoD, the IC and other officials as required More ❯
DESCRIPTION As an Audit Specialist, you will work with Amazon technical business leaders (such as hardware and software engineering leaders and technical program managers) to conduct internal program reviews, facilitate external audits, and manage security risk. Amazon Web Services (AWS) is the leading cloud provider, providing infrastructure, storage, networking, messaging, and many other services to customers all over … to enterprises, run their operations and applications on AWS's multi-tenant infrastructure. Governmental organizations are also looking to, and depending on, AWS for cloud solutions and services. Amazon Security is looking for an Audit Specialist who will contribute to a small but growing audit and risk management team who supports government workloads. The person hired in this … Oxley Act (SOX) audits. You will coordinate with your commercial audit counterparts to complete large projects and leverage best practices. The team you will be part of leads a security risk management program. As a member of the team, you will help assess risks and determine areas for internal audits based on risk. In this role, you will gain More ❯
Lead Security Control Assessor (IA Specialist) Job Category: Security Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: Are you looking for a role that will impact protecting our Homeland Security? Do you thrive in Risk Management Framework … If yes, please keep reading! We are seeking a skilled and detail-oriented Senior Security Control Assessor and Validator to join our team. The successful candidate will be responsible for evaluating, testing, and validating the effectiveness of security controls within our organization's information systems and networks, with a strong emphasis on applying the Risk Management Framework (RMF … . Onsite position at Alexandria, VA for all 5 days! Responsibilities: The Security Control Assessor, you will be responsible for the following: Serve as senior member and representative of assigned team for meetings and efficiently lead internal resources to meet established milestones and targeted completion dates. Provide guidance, coaching and training to employees of assigned team. Provide the United More ❯
Job Description: Requires skills to assess, plan, and enact security measures to help protect an organization from security breaches and attacks on its computer networks and systems. Be able to identify vulnerabilities, interpret the test results of commonly used software to help protect the organization's data, and help users adhere to new regulations and processes to ensure … and servers. Monitors, reviews and reports on data restoration capabilities. Familiar with HBSS and ACAS from a compliance and reporting perspective. VRAM management on unclassified and classified networks (two security domains) Basic system knowledge including ability to upload scan data. Reports compliance for Cyber directives including IAVs, TASKORDs, FRAGORDs, etc. Create, implement and maintain system baselines. Conduct technical security test and evaluations of unclassified networks and/or systems to determine compliance with appropriate information assurance (IA) or cyber security controls and risk mitigation strategy. Provide detailed risk mitigation recommendations; conduct risk and vulnerability assessment of IT systems; conduct appropriate network scans utilizing ACAS and coordinate patching as required to gain/maintain accreditation. Prepare Certification and More ❯
Asset where possible in completing POA&M activities. Requirements Ensure the effective implementation of DOE and NNSA cybersecurity policies and procedures for designated information systems, ensuring alignment with organizational security standards and best practices. Lead the Assessment and Authorization (A&A) activities for designated systems, ensuring compliance with federal regulations and internal security requirements. Document security measures … in security plans and oversee access control provisioning for system users. Establish, maintain, and oversee configuration management of security documentation for assigned systems. Regularly review and update security artifacts to ensure they reflect current security configurations. Identify, assess, and document threats and risks to designated systems. Conduct thorough risk assessments to understand vulnerabilities and recommend mitigation … strategies to ensure system integrity. Lead and conduct cybersecurity tests and assessments, providing actionable results to the Information System Security Manager (ISSM). Address vulnerabilities and provide guidance for remediation. Evaluate the security impact of proposed changes to assigned information systems. Recommend and implement strategies for mitigating risks associated with significant security changes. Identify cybersecurity training needs More ❯
team and discover why we are a top veteran employer and Certified Great Place to Work ASRC Federal Facilities Logistics is seeking dynamic and well-rounded Special Access Program security personnel with PERSEC experience to support the Joint Staff's Special Access Program Control Office and other program offices located at the Pentagon. Directly supports SAP program management activities … operations and coordination with SAP activities across the organization. This includes the management and oversight of activities performed to support the established standards, criteria, and guidelines upon which personnel security eligibility determinations are based. Ensures that appropriate security safeguards are in place to protect against the release of critical information concerning Dept. of Defense missions and functions that … could cause any type of harm to national security. Duties include, but are not limited to: Electronically create, track, update, and provide trend analysis for PARs Perform Security Officer review of PARs and prioritize PARs when necessary Schedule and perform SAP indoctrination briefings with approved personnel Maintain Personnel files IAW current policy, DoDM 5205.07 Volume 2 and JADE SOP. More ❯
This position is contingent on contract award Description: Enable planning, coordination, and implementation of the organization's information security. Identify current organizational security infrastructure, define future program requirements, and design and implement security related IT systems. Ensure systems provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial … data used by TD systems. Design and develop systems that provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems. Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave Assist in maintaining appropriate operational security posture for an information system or program Provide support to the Government on all matters (technical and otherwise) involving the security of the information system Assist with the management of security aspects of the information system Assist in the development of the system security policy and ensure compliance with that policy Develop and update the system More ❯
This position is contingent on contract award Description: Enable planning, coordination, and implementation of the organization's information security. Identify current organizational security infrastructure, define future program requirements, and design and implement security related IT systems. Ensure systems provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial … data used by TD systems. Design and develop systems that provide a high level of data security and user compartmentalization due to the sensitive nature of business and financial data used by TD systems. Provide support to the ISSM for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave Assist in maintaining appropriate operational security posture for an information system or program Provide support to the Government on all matters (technical and otherwise) involving the security of the information system Assist with the management of security aspects of the information system Assist in the development of the system security policy and ensure compliance with that policy Develop and update the system More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
Cyber SecuritySpecialist Location: Havant Job Type: Full-time, Hybrid (3-4 days per week), 12-month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber SecuritySpecialist to lead the implementation of a new Information Security Management System (ISMS) and ensure compliance with security standards. This … role is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa 500 IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards … and frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify and assess security risks and vulnerabilities, developing mitigation strategies. * Support regular audits and assessments to ensure adherence to security policies. * Provide reporting on security incidents, compliance status, and risk assessments. * Collaborate More ❯
Information Security Risk & Compliance Specialist About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk … the Role: We are seeking a highly motivated and detail-oriented GRC Compliance Expert to join our Governance, Risk, and Compliance team. This role is pivotal in supporting customer security assessments during RFx processes, driving compliance initiatives including DORA , NIS2 , and other regulatory frameworks, and assisting with broader GRC activities across the organization. The ideal candidate is a self … located in our office in London. We ask to come to the office twice per week. Support the sales and legal teams during RFx processes by responding to customer security questionnaires, assessments, and due diligence requests. Coordinate and manage responses to customer security audits and assurance inquiries. Monitor regulatory changes and contribute to compliance initiatives such as DORA More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 Create & Maintain an information security management system (ISMS) capable of demonstrating compliance against internal security requirements and external commitments including certification and regulatory requirements. Provide subject matter expertise in the application of established … to any new or existing programme of work. Prepare and support internal and/or external compliance audit activities. Manage remediation of any audit (internal & External) non-conformities. Ensure security policies (on a risk-based approach) are produced, signed off by relevant stakeholders, published, and communicated. Also, ensure that policies are managed throughout their lifecycle and updated through yearly … or ad-hoc reviews. Produce relevant security standards documentation in consultation with Technical teams. Lead on providing information to Three UK Customers (B2B) regarding Three UK's security practices. Support proactive and effective oversight of technology and security risk management frameworks, methodologies, processes, assurance, remediation, and reporting activities across the company. Assist in designing, building, and implementing More ❯
Job Description What You Will Be Doing: Under broad direction, operating and managing all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation. Implementing and monitoring security measures for communication systems and networks and providing advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems. Developing … and executing security policies, plans, and procedures. Designing and implementing data network security measures. Operating Network Intrusion Detection and Forensics. Conducting performance analysis of Information Systems security incidents. Developing Continuity of Operations/Disaster Recovery plans and supporting certification of Information Systems and Networks. Supervising operation of Electronic Key Management System, other information security duties, and … Public Key Infrastructure. Operating Host Based Security System, firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, other point of presence security tools, Virtual Private Networks, and related security operations. More ❯
Job Description What You Will Be Doing: Under broad direction, operating and managing all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation. Implementing and monitoring security measures for communication systems and networks and providing advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems. Developing … and executing security policies, plans, and procedures. Designing and implementing data network security measures. Operating Network Intrusion Detection and Forensics. Conducting performance analysis of Information Systems security incidents. Developing Continuity of Operations/Disaster Recovery plans and supporting certification of Information Systems and Networks. Supervising operation of Electronic Key Management System, other information security duties, and … Public Key Infrastructure. Operating Host Based Security System, firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, other point of presence security tools, Virtual Private Networks, and related security operations. More ❯
service life. The organization also maintains inactive ships for future disposal, donation, or transfer, to include follow-on technical support to our partner navies. Duties include: The Information System SecuritySpecialist is responsible for supporting all aspects of a Program Information Assurance (IA) processes tailored to include minimum qualification standards, fundamental awareness and familiarity to demonstrated competency with … specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. The specialist should demonstrate a working knowledge of the Risk Management Framework (RMF) process and/or include prior experience with the Defense Information Assurance & Certification … Accreditation Process (DIACAP). Familiarity with security policies & guidance documents to assist with the preparation and maintenance of process artifacts, traceability documents purposed for compliance with Authority to Operate (ATO) requirements. The specialist is expected to evaluate security solutions to ensure they meet security requirements for processing up to classified information and supervise and/or More ❯
Overview CYBER SECURITYSPECIALIST (WSSA): Bowhead seeks a Cyber Security Specialsit to join our team at Hill AFB, UT to support the A-10 Weapon System Support, Analysis, Test, and Integration contract. The A-10 WSSATI contract is critical in supporting the A-10C weapon system (and any future Mission Design Series - MDS), and in facilitating the … fleet remains a viable part of the cohesive, ready, and agile fighting forces that the Air Force, the Combatant Commanders, and our National Defense Strategy require. The Cyber Security Engineer will provide guidance and leadership with the cyber security implementation of different avionics programs and updates. Responsibilities Demonstrate knowledge of current cyber security standards needs to be … maintained to provide proper guidance. Collaborate and coordinate with critical infrastructure and network engineering teams to provide technical security requirements. Perform systems/networking troubleshooting, problem resolution, maintaining, upgrading and deploying DCO tools (IDS both Host-based and Network-based and the supporting components, User Activity Monitoring/User Behavioral Activity, ACAS, and SIEM). Work with minimal direction More ❯
Certifications Required: CompTIA Security+ (required) About the Position We are seeking a Physical SecuritySpecialist to support the administration, maintenance, and operation of our organization's physical security infrastructure in Doral, Florida. This critical role ensures the ongoing integrity, functionality, and security of our access control systems, video surveillance, and alarm systems. As a key member … of the security team, you will collaborate with cross-functional departments to ensure seamless operations and implement best practices in physical security management. Your contributions will directly support the protection of personnel, facilities, and critical infrastructure. Key Responsibilities System Administration: Operate, maintain, and troubleshoot the Lenel OnGuard Access Control System, including user profiles, badge issuance, access levels, and … Surveillance: Administer and support video monitoring systems, including Pelco camera systems, ensuring full coverage and proper storage of surveillance footage. Technical Troubleshooting: Diagnose and resolve issues related to physical security software, hardware, servers, and network interfaces. Systems Maintenance: Perform scheduled maintenance, software updates, patch management, and database backups to ensure optimal system performance. Department Collaboration: Work closely with J6 More ❯
are inspired by making a positive impact through developing data driven solutions, FTI would appreciate the opportunity to learn more about you. We are seeking a highly qualified SAP SecuritySpecialist to support the B-2 System Program Office (SPO) at Wright-Patterson Air Force Base, OH. In this role, you will serve as the primary liaison between … the Chief of the Security-Facilities Branch, the Site Security Lead, internal staff, and external agencies. The role involves managing a complex and diverse security program in strict compliance with U.S. Government regulations, including Dept. of Defense (DoD), SCI, and SAP requirements across multiple programs of varying size and scope. You will be the key point of … contact for all matters related to information, industrial, and personnel security. You will also ensure that all security integration efforts are thoroughly coordinated with the Advanced Programs and Integrated Functional Capability Branches. Additional key responsibilities include implementing, updating, and overseeing security policies and procedures within the B-2 Division to ensure full compliance with all relevant federal securityMore ❯
you can thrive. Where you can find your next, right now. We've got what you're looking for. Job Description: Parsons is looking for an amazingly talented Senior SecuritySpecialist to join our team! In this role you will assist the Facility Security Officer in administering and managing the Parsons Huntsville Security Program, providing policies … plans, procedures, departmental instructions, and technical support of safeguards and security (S&S) programs to protect client security interests. What You'll Be Doing: Implement security policy and procedures and assist with the management of other security team daily functions. Assist the FSO and AFSO with day-to-day oversight of facility operations and administering industrial … security programs in accordance with the National Industrial Security Program Manual (NISPOM), applicable laws, regulations, and DoD contractual requirements. Manage the processing of security clearance paperwork, including collection and review of relevant documents and information for completeness, consistency, and accuracy. Maintain personnel security records and databases, including quality assurance and control of the fingerprinting process. Ensure More ❯
Security Compliance Specialist, Amazon Stores Security Are you interested in driving exceptional security for customers? Do you see information security as a business enabler? Amazon's Stores Security organization is seeking an experienced Security Compliance Specialist. As part of the Amazon Stores Security InfoSec Japan team, this role will build the bridges … between security, technology, and compliance by working across remote and local teams within Amazon Security organization, healthcare business teams, and related Amazon corporate teams. This candidate should be an innovative security/compliance professional who has the ability to dive deep into a variety of complex issues, understand IT processes, and drive compliance assessment to existing and … emerging Japan healthcare information security standards. The ideal candidate will have strong leadership and problem-solving skills, excellent communication skill, and effectively work with cross-functional Amazon teams to support service build-up, service launch and on-going service operation activities. Key job responsibilities This position will be responsible for: - Establish credibility and maintain strong working relationships with groups More ❯
Cyber Security Operations Specialist - CSOC (Tiers 1, 2, 3) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local Are you passionate about working with leading-edge technologies, on high-performing teams, and have a desire to learn … valuable skills and experiences that will propel your career? CACI's Transport & Cybersecurity Services (TCS) program is actively hiring TS/SCI cleared Cyber Security Operations Specialists to join our CSOC Tiered Services team! We are seeking mission-focused individuals to provide various levels of CSOC services (Tier 1, Tier 2, and Tier 3). These positions can be … support of national security. For additional information and a list of current openings, please visit our TCS Jobs page: What You'll Get to Do: Our team of Cyber Security Operations Specialists provides CSOC Tiered Services, which include 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. More More ❯
What You'll Be Working On: ️ Designing, implementing, and managing network security architectures to protect enterprise systems ️ Monitoring and analyzing network traffic to identify and mitigate potential threats and vulnerabilities ️ Configuring and managing firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and other network security tools ️ Conducting regular network security assessments and penetration testing to … ensure optimal security ️ Collaborating with IT and security teams to ensure proper network access controls, policies, and encryption standards are in place What We're Looking For: ️ Proven experience as a Network SecuritySpecialist or in a similar role within network security ️ Strong knowledge of networking protocols (e.g., TCP/IP, DNS, HTTP) and network … security tools (e.g., firewalls, IDS/IPS, SIEM) ️ Experience with security frameworks such as NIST, CIS, and ISO 27001 ️ Familiarity with cloud security and hybrid network environments is a plus ️ Relevant certifications such as CCNP Security, CISSP, or CompTIA Security+ are highly desirable More ❯
Join a established and growing organization in the industrial sector is seeking an experienced IT Security & Infrastructure Specialist . This role offers a great opportunity to contribute to both operational infrastructure and security initiatives, working with modern tools in a dynamic IT environment. In this role, you will implement and maintain IT security measures across infrastructure … conduct system audits and security assessments, and enhance risk management processes. You ll be responsible for creating and maintaining incident response plans, supporting external audits, and contributing to security governance. Additionally, you ll monitor systems using modern security tools and ensure compliance with relevant legal and regulatory standards. Requirements: Degree in Computer Science, Information Security, or … a related field, or equivalent practical experience Solid background in IT security and infrastructure operations Experience with security tools (e.g., SIEM, IDS/IPS, endpoint security) Familiarity with ISO 27001, GDPR, or other compliance framework. Security certifications (e.g., CISSP, Security+, CEH) are an advantage C1+German and good English proficiency Benefits Secure position in a well-established More ❯
Information Security Third-Party Risk Specialist Hybrid - Southampton - 60% Time on site £42,848 - £55,000 Please note for to apply for this role you must use the link included below. Job summary Are you passionate about information security and confident assessing and managing supply chain risks? Do you have experience working with third-party suppliers to … embed secure-by-design principles and improve an organisation's security posture? Would you like to play a key role in protecting national infrastructure and influencing how security is embedded across critical digital services? Job description As a Third-Party Information SecuritySpecialist, you will play a vital role within the Maritime and Coastguard Agency's … Information Security team, helping to protect our people, systems, and data across both internal operations and external suppliers. Your work will directly support MCA's broader Information Security strategy, helping to embed best practices and risk awareness throughout the organisation and its supply chain. You'll influence how security requirements are considered from the earliest design stages More ❯