only U.S. citizens are eligible for a security clearance Security Clearance: TS/SCI without Polygraph We have an exciting opportunity for a Principal Systems Engineer - Mission Management (MM) Product Manager where your experience managing complex product roadmaps, backlog grooming, and prioritization and leadership abilities will be … user feedback (working groups) and internal data. The work is on-site in Aurora, CO. What You Will Do Serve as a Product Manager within a SAFe Agile Release Train (ART) to ensure successful execution of program increments (PIs). Work closely with the Release Train Engineer (RTE …/Product Owner (PMPO) SAFe Agilist (SA) or equivalent Agile certifications Experience working in a software development environment and overseeing and/or leading Systems Engineering teams Knowledge of systems engineering lifecycle, roles and functions in one or more of the following areas: Concept of Operations (ConOps) development More ❯
Embedded Integrated Combat System Product Manager Supporting Office of Naval Research Status: Contingent International Systems Management Corp. (ISM) is seeking a qualified individual to provide product management support to Future Naval Capability (FNC) transition into the Integrated Combat Systems (ICS) program of record. Applicant must possess … a similar product management role. • Strong understanding of product development frameworks, including agile, Scrum, Kanban, or Scaled Agile Framework (SAFe). • Proven experience with Systems Engineering processes within an agile delivery model. • Strong understanding of service-based architecture principles and methods. • Excellent agile project management skills with the ability … and key milestones to stakeholders, ensuring transparency and alignment throughout the organization. Desired experience includes: • Familiarity with combat system development and integration. • Model Based Systems Engineering (MBSE) knowledge. • Familiarity with MBSE visualization tools; Cameo Modeler, Magic Drawm, SysML. • Experience with AEGIS C&D or USN Surface Force Level Architecture. More ❯
Job Description IT Security Manager Our Client is a large international organisation who are looking to recruit an IT Security Manager with at least 5 to 8 years proven expertise. Provide advice, support and guidance to all Company Corporate functions to assist them to maintain and More ❯
System Configuration Manager page is loaded System Configuration Manager Apply locations Home - UK- England time type Full time posted on Posted 2 Days Ago job requisition id R Who are we? Howden is a collective - a group of talented and passionate people all around the world. … career progression, sustainability, volunteering - you'll find like-minded people driving change at Howden. Role Overview Howden is seeking a skilled System Configuration Manager to join our Change Team, playing a key role in managing system configuration, and project-driven enhancements within the Acturis platform. They will work … understand future needs and ensure the applications we have are supported to allow the business to trade efficiently. Knowledge & Skills Strong knowledge of broking systems, particularly Acturis. Familiarity with Howden's operational landscape and the broader insurance sector. Expertise in Acturis configuration, including document templates and system integration projects. More ❯
Job Number: 59 Job Category: GovTech Job Title: SENIOR INFORMATION SYSTEM SECURITY MANAGER - VIRGINIA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: Remote Job Location: Arlington VA Salary: 250k - 300k Background Utilize expert knowledge and experience regarding risk management strategies in support of … and guidelines to ensure compliance with applicable laws, regulations, and industry best practices Conduct risk assessments and identify potential vulnerabilities and threats to information systems Develop and implement risk mitigation strategies and controls to minimize the impact of security incidents Collaborate with system administrators, network administrators, and other stakeholders … to plan and implement security measures for information systems. This includes establishing security controls and standards for information systems including Continuous monitoring Develop and implement incident response procedures to reconstitute system operations to address security incidents and breaches Ensure compliance with relevant security standards, regulations, and frameworks Conduct periodic More ❯
ISSM is responsible for ensuring all Information System Security policies, standards, and directives are enforced to support assessment, authorization and continued operation of information systems processing classified information. Position Responsibilities: Oversee the development and deployment of program information security for all program systems to meet the program and … information security policies, standards, guidelines and procedures that may reach across multiple stakeholder organizations Additional Position Responsibilities: Project Management Auditing Certification and qualification Cybersecurity systems threat and environment Emerging computing technology Government security regulations Hardware/software development Information assurance and protection Network systems and system security processes … Polygraph Preferred Qualifications (Desired Skills/Experience): Bachelor's degree or equivalent work or military experience 5+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include: NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS 5+ years of experience More ❯
assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment … to identify required tasks and their interrelationships Identify and map current security infrastructure as a foundation to define future programs Collaborate with engineers on systems integration efforts Plan and coordinate implementation of IT security programs and policies Analyze user needs to determine functional and cross-functional requirements Gather and … also includes risk assessment Enable Government planning, coordination, and oversight of organizational implementation of information security services Enable design and implementation of future IT systems and related security Assist Program Managers with administrative and technical oversight with specific programs within the portfolio Facilitate issue resolution through integrated product teams More ❯
System-Level R&D Project Manager Initial 6 month freelance contract + possibility of extensions Leuven, Belgium/Hybrid (3 days onsite in Leuven per week) 40 hours/week What you will do Your work is at the cross-roads of advanced R&D, project execution and More ❯
at Goldsmiths has an excellent student experience and provides services across the student and academic lifecycle from application to graduation. About the Role Student Systems and Data team, working within the Registry, is responsible for all the student-focused business critical systems and is pivotal in ensuring the … implementation of effective education administration across the College. The role is responsible for managing the team supporting student systems and integrations. The role holder will be expected to be a point of authority and will be responsible for ensuring the day-to-day continuity of system operations, as well More ❯
Associate SystemManager - GURU Because we strive to put people first. What's a career at Primark all about? The positive impact you're making, the experiences you're having and the people you're with. You're our inspiration. Embrace what sets you apart, own your career … develop in ways you never expected. Leave your mark. And do it your way. Reporting to the Head of Store Design, the Associate SystemManager will be responsible for the full management of the system, including the development of its ongoing structure, the design of its user interface More ❯
Matchtech are working with a key client to support the recruitment of a Systems Integration Lead/Manager to work on high profile railway projects in Toronto. This role will require the successful candidate to relocate to Canada. Key Responsibilities Functional/Technical Provides technical expertise and … in processes to identify and rectify points of failure and improvement initiatives necessary to enhance safety, reliability and operability of the asset base and systems improvements, utilizing analysis and outputs from Failure Mode Effects and Criticality Analysis (FMECA) and Root Cause Failure Analysis (RCFA) processes and, support the development … identification, and development of mitigation strategies for unplanned asset class operational disruptions. Proficient in the use of specialized software platforms required for the function. Systems Engineering Proficient in System engineering knowledge and functional duties to be able to support the representation of the discipline including understanding of ISO 15288. More ❯
Matchtech are working with a key client to support the recruitment of a Systems Integration Lead/Manager to work on high profile railway projects in Toronto. This role will require the successful candidate to relocate to Canada. Key Responsibilities Functional/Technical Provides technical expertise and … in processes to identify and rectify points of failure and improvement initiatives necessary to enhance safety, reliability and operability of the asset base and systems improvements, utilizing analysis and outputs from Failure Mode Effects and Criticality Analysis (FMECA) and Root Cause Failure Analysis (RCFA) processes and, support the development … identification, and development of mitigation strategies for unplanned asset class operational disruptions. Proficient in the use of specialized software platforms required for the function. Systems Engineering Proficient in System engineering knowledge and functional duties to be able to support the representation of the discipline including understanding of ISO 15288. More ❯
• In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware More ❯
• In-depth knowledge of the security authorization processes and procedures as defined in the RMF in NIST SP800-37 and familiarity with the ICD503, CNSSI1253, NIST SP800-53, etc. • Knowledge of commercial security tools and their uses. • Experience with hardware More ❯
will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO-C4I. The support will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service … Manager) or A-4C-1340 (KMI) (or DOD Service equivalent). Knowledge of the following data and communications link equipment and related systems: Communication Data Link System (CDLS) Network Tactical Common Data Link (NTCDL) Tactical Common Data Link (TCDL) Maritime Surface Terminal (MST) Intelligence Carry-On Program … ICOP) systems Naval Tactical Command Support System (NTCSS) Current or future Link related systems. Three to five years of specialized entry level experience in Specialty Area 72 (Information Systems Security Management). Salary More ❯
assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security software, hardware, and firmware. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include System Security Plans (SSPs), Risk Assessment … to identify required tasks and their interrelationships Identify and map current security infrastructure as a foundation to define future programs Collaborate with engineers on systems integration efforts Plan and coordinate implementation of IT security programs and policies Analyze user needs to determine functional and cross-functional requirements Gather and … also includes risk assessment Enable Government planning, coordination, and oversight of organizational implementation of information security services Enable design and implementation of future IT systems and related security Assist Program Managers with administrative and technical oversight with specific programs within the portfolio Facilitate issue resolution through integrated product teams More ❯
Ms), and other required artifacts. Provide cybersecurity oversight and consultation during architecture reviews, software releases, and configuration changes. Requirements Bachelor's Degree in Information Systems, Information Security, or a related field. A current recognized security certification: CISSP, CISM, or an equivalent DoD 8570-compliant certification. Minimum 5 years of … cybersecurity programs for Army web-based applications in multiple cloud environments. At least 2 years of experience specifically managing RMF cybersecurity programs for Army systems in the cloud. Demonstrated expertise in: RMF processes and control implementations ACAS, HBSS, eMASS, Akamai, AWS, Microsoft Operating Systems, and Veracode Experience working … troubleshooting interactions involving: DISA GCDS ARCYBER CSSPs Cloud Service Providers (CSPs)Desired Experience: Hands-on experience with one or more of the following Army systems: TAMIS SAAS-MOD GCSS-A/GCSS-MC OIS-MC Tactical FMSWeb AOS WebAmmoPlateau does not accept unsolicited resumes from third-party recruiters without More ❯
for software engineering methodologies, system/security engineering principles, secure design, and secure architecture principles for all components within the accreditation boundary including operating systems (OS) and network interconnects. Responsibilities Responsible for Incident Response, risk management, personnel security, account approvals, system interconnections, security engineering throughout the TAMIS software lifecycle … appropriate system components. Ensure secure configuration to include all pertinent patches and fixes by routinely reviewing vendor sites, bulletins, and notifications and proactively updating systems with fixes, patches, definitions, service packs, or implementation of vulnerability mitigation strategies Implement all technical, procedural, and documentation focused security controls IAW DoD and … TAMIS system is deployed using a Secure System Architecture in a highly available, scalable configuration in the cloud Qualifications Required: Bachelors Degree in Information Systems/Information Security certification or equivalent experience. Recognized security professional certification (Certified Information System Security Professional (CISSP II) certification, Certified information Security ManagerMore ❯
assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include SSPs, Risk Assessment Reports, C&A … to identify required tasks and their interrelationships Identify and map current security infrastructure as a foundation to define future programs Collaborate with engineers on systems integration efforts Plan and coordinate implementation of IT security programs and policies Analyze user needs to determine functional and cross-functional requirements Gather and … also includes risk assessment Enable Government planning, coordination, and oversight of organizational implementation of information security services Enable design and implementation of future IT systems and related security Assist Program Managers with administrative and technical oversight with specific program's within the portfolio Facilitate issue resolution through integrated product More ❯
Spring, MD. This position supports a successful, long standing program. Responsibilities: Responsible for implementing, maintaining, reviewing, and enforcing security policies on various classified information systems (IS). Serve adjacent to/support the Program Security Officer (PSO/CPSO) in the enforcement of DoD/Risk Management Framework (RMF … Required Qualifications: Bachelor's degree in Information Technology, Computer Science or comparable field and 5+ years of experience in Information Security and/or Systems Administration for Windows systems Active Top-Secret Clearance and U.S. Citizenship IAM Level III certification required as per DoD 8570 (eg. CISSP, CISM … SAP/SCI security requirements preferred Extensive direct Risk Management Framework (RMF) experience Experience in the successful execution of certification and accreditation for Information Systems Experience with classified intra-net connections desirable (eg: CNET, SIPRNET) Experience with scanning/auditing tools like SCC, Nessus Experience building, maintaining, and troubleshooting More ❯
assessment analysis to support security authorization. Provide management support to configuration management (CM) for information system security SW, HW, and FW. Manage changes to systems and assess the security impact of those changes. Manage the process and preparation of documentation reviews to include SSPs, Risk Assessment Reports, C&A … to identify required tasks and their interrelationships Identify and map current security infrastructure as a foundation to define future programs Collaborate with engineers on systems integration efforts Plan and coordinate implementation of IT security programs and policies Analyze user needs to determine functional and cross-functional requirements Gather and … also includes risk assessment Enable Government planning, coordination, and oversight of organizational implementation of information security services Enable design and implementation of future IT systems and related security Assist Program Managers with administrative and technical oversight with specific program's within the portfolio Facilitate issue resolution through integrated product More ❯
will support the Naval Information Warfare Center Pacific (NIWC PAC) and provide In-Service-Engineering-Activity (ISEA) functions for tactical data links and related systems sponsored by PEO-C4I. The support will include the following areas of expertise: Technical Assistance, Fleet In-Service Engineering Support, Maintenance Support, In-Service … training course: CIN J-3B-0440 (IP BASIC) (or DOD Service equivalent). Knowledge of the following data and communications link equipment and related systems: Communication Data Link System (CDLS) Network Tactical Common Data Link (NTCDL) Tactical Common Data Link (TCDL) Maritime Surface Terminal (MST) Intelligence Carry-On Program … ICOP) systems Naval Tactical Command Support System (NTCSS) Current or future Link related systems. Three to five years of specialized entry level experience in Specialty Area 72 (Information Systems Security Management). Salary More ❯
A growing Defence client of ours based in Romsey, Hampshire is currently in the market for a SCCM to join their team. In the role you will be responsible for the proactive package, test and deployment of software, OS, security More ❯
A growing Defence client of ours based in Romsey, Hampshire is currently in the market for a SCCM to join their team. In the role you will be responsible for the proactive package, test and deployment of software, OS, security More ❯
Overview Abacus Technology is seeking an Information System Security Manager (ISSM) to provide cyber and RMF support for the Air Education and Training Command (AETC) at Randolph AFB. This is a full-time position. Responsibilities Develop and maintain Risk Management Framework (RMF) lifecycle documentation, artifacts, and Authorization to … Operate (ATO) package. Assist the investment/system Program Manager (PM) with managing and updating all information security process related documentation. Utilize available/directed RMF templates to create/document/update required artifacts that include Access Control Plans, Configuration Management Plans, Contingency Plans, Continuity of Operations More ❯