include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You Were looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a senior … level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level visibility More ❯
include: Defining and delivering a comprehensive cyber security strategy aligned with business goals and regulations Leading and developing the cyber security operations team Overseeing threat monitoring, incident response, and vulnerabilitymanagement Managing compliance with frameworks such as Cyber Essentials, NIST, ISO27001, GDPR, and GovAssure Acting as the primary point of contact for cyber matters internally and externally, including … regulators and industry forums Representing Cyber Security at board committees and senior management meetings Supporting bid and tender processes, providing risk-based advice and competitive responses About You We’re looking for an experienced cyber security leader with a blend of strategic vision and operational expertise. You should bring: Proven experience defining and executing cyber security strategy at a … senior level Strong knowledge of governance, risk, compliance, and regulatory frameworks Leadership experience managing cyber security operations teams Excellent stakeholder management skills, including board-level engagement The ability to represent the organisation externally with authority and credibility Benefits Competitive salary and benefits package Hybrid/flexible working arrangements Generous annual leave and pension Inclusive, collaborative culture with senior-level More ❯
s overall cybersecurity posture and ensuring resilience against evolving threats. We are actively speaking with applicants that have a minimum of: 2-5 years of experience in cybersecurity operations, vulnerabilitymanagement, or SOC analyst roles. Ability to monitor enterprise networks and systems, analyze SIEM/EDR alerts, perform triage, and support containment/recovery during incidents. (Core day … to-day responsibility of the role.) Skilled at analyzing vulnerability scans (Tenable, Nessus, Qualys, OpenVAS), prioritizing remediation efforts with IT teams, and aligning with compliance frameworks (NIST 800-171, CMMC, ISO 27001). Strong understanding of MITRE ATT&CK, NIST frameworks, and cyber threat landscapes, enabling the candidate to detect, assess, and mitigate risks proactively. Bachelor's degree in More ❯
metrics across the organization by account Provide detailed progress reports, identify challenges, and deliver actionable insights to healthcare clients and internal leadership Requirements 5+ years of program/project management experience, ideally in cybersecurity or healthcare IT environments Knowledge of healthcare-specific cybersecurity challenges, including vulnerabilitymanagement, GRC tools, IAM in regulated environments, and securing networked medical … verbal and written communication skills to bridge technical and non-technical healthcare stakeholders effectively Preferred PMP, CISSP, CISM, or equivalent certifications with healthcare cybersecurity relevance Background in technical project management to address the intricacies of healthcare IT systems More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
Bedford, Massachusetts, United States Hybrid / WFH Options
SkyBridge Aviation
a highly skilled Security Control Assessor to support a U.S. Air Force cyber and electronic warfare contract. The ideal candidate will have extensive experience with cybersecurity assessments and Risk Management Framework (RMF) processes and hold an active Top Secret clearance. This position requires a strong understanding of DoD cybersecurity requirements and the ability to support mission-critical systems in … Air Force systems. • Develop and maintain cybersecurity documentation including System Security Plans (SSPs), POA&Ms, and Security Assessment Reports (SARs). • Perform control validation, security control testing, and system vulnerability assessments. • Support the Authorization and Accreditation (A&A) process in compliance with DoDI 8510.01 and NIST SP 800-53. • Collaborate with system engineers, ISSMs, and other stakeholders to … 8570.01-M IAT Level III certification (e.g., CASP+, CISSP, or equivalent) • 7+ years of cybersecurity experience, including RMF and control assessments • Experience with DoD cybersecurity policies, NIST standards, and vulnerabilitymanagement tools • Three (3) years of experience in a Certification and Accreditation/A&A role • Demonstrated experience with STIGs, SRGs, POA&Ms and cybersecurity best practices, as More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerabilitymanagement and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
ensuring mitigation plans are in place. Support the development and maintenance of security policies and standards. Assist with third-party security reviews and supplier risk management. Provide oversight of vulnerability assessments. Conduct architecture reviews for new systems and services. Evaluate technical controls and recommend improvements. Support the rollout of new security tools and technologies. Provide input into incident management and security metrics reporting. About You: 2+ years' experience in an security role. Strong understanding of risk assessment methodologies. Knowledge of frameworks such as ISO 27001. Experience with vulnerabilitymanagement and technical controls. Excellent problem-solving skills with strong attention to detail. Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
ensuring mitigation plans are in place.· Support the development and maintenance of security policies and standards.· Assist with third-party security reviews and supplier risk management.· Provide oversight of vulnerability assessments.· Conduct architecture reviews for new systems and services.· Evaluate technical controls and recommend improvements.· Support the rollout of new security tools and technologies.· Provide input into incident management and security metrics reporting. About You: · 2+ years' experience in an security role.· Strong understanding of risk assessment methodologies.· Knowledge of frameworks such as ISO 27001.· Experience with vulnerabilitymanagement and technical controls.· Excellent problem-solving skills with strong attention to detail.· Confident communicator with the ability to explain security concepts to non-technical stakeholders. This is More ❯
hardware/software and optimize performance. Provide Tier 1-3 support, troubleshoot incidents, and maintain operational resilience via regular backups and recovery plans. Load PKI certificates and maintain change management documentation and incident logs.Cybersecurity Operations Serve as the Information System Security Manager (ISSM) for all assigned systems. Monitor networks for real-time threat indicators; investigate and respond to security … events. Implement and operate cybersecurity tools such as ACAS, NESSUS, SCAP, and STIG Checklists. Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. Manage POA&Ms, deviation lists, and ensure systems maintain Authority to Operate (ATO). Provide FRCS cybersecurity engineering support and continuous monitoring in accordance with DoD and Army standards. Perform penetration testing, threat analysis … to complete the DoD RMF assessment and authorization process. • Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information Technology (IT) and Operational Technology (OT) systems. • Conduct vulnerability scanning and document system vulnerabilities. • Work in a team environment alongside other cybersecurity engineers and Risk Management Framework (RMF) analysts. Required Education & Experience: Active TS/SCI w More ❯
implement RMF system accreditation processes Assess use case and operational risk of integrated open source, and GOTS/COTS software components Provide security planning, assessment, risk analysis, and risk management support Recommend system-level solutions to resolve security requirements and guide the development team in meeting the security posture requirements Support the enforcement of the design and implementation of … with Masters in related field Working knowledge of TCP/IP suite of protocols and services, computer architectures, and network topologies is required xperience with DISA STIGs and SRGs, vulnerabilitymanagement systems, mitigation and compliance processes, and reviewing results from automated security scanning tools Ability to work independently and as part of a team is needed Flexibility is More ❯
Matter Expert supporting a Federal Agency in a contract role. The Data Security/Cybersecurity Risk Subject Matter Expert (SME) will serve as the data security, readiness, risk, and vulnerability subject matter expert. In the role, the Data Security SME will: • Assess and analyze data security, readiness, risk, and vulnerability for companies that are subject to the CFIUS …/or export controls; • Experience in producing case summaries and talking points, in-depth knowledge on telecommunication systems, securing telecom applications, and security tools; • Experience with security risk assessments, vulnerabilitymanagement, and incident response Dorrean provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to any More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
Administer and optimize cloud environments (AWS), ensuring scalability and high availability. Manage containerized applications with Docker, Kubernetes, and EKS. Develop and maintain automation scripts and tools using Python. Perform vulnerabilitymanagement, security assessments, and incident response. Collaborate with software engineering teams to integrate security throughout the SDLC. Conduct compliance reviews, audits, and continuous monitoring. Provide technical guidance and More ❯
Console. • Experience with Windows Server 2019, SQL Server 2019, and VMWare vSphere. • Must have experience with STIGs. • Working knowledge of IT Systems Maintenance Compliance processes to include information assurance vulnerabilitymanagement (IAVM). • Experience creating, reviewing, and revising security documentation and artifacts. • Strong knowledge of Microsoft Windows technologies, including Active Directory, Windows Administration, PowerShell, SharePoint, scripting, and Windows More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) PLATFORM/TOOL EXPERTISE ServiceNow GRC & SecOps More ❯
for deployment. Ability to demonstrate any IRM solution and SecOps solutions as and when needed. Knowledge of various modules like Policy Mgmt. Compliance & Audit Mgmt., Vendor Mgmt., Business Continuity Management, Vulnerability Response, Incident Response, Security Dashboard on ServiceNow IRM platform Assess as-is IRM processes for maturity and automation on ServiceNow platform Knowledge of Advance risk management … SecOps administrator/consultant (this is mandatory) Must have concluded at least 1 lifecycle of ServiceNow IRM/SecOps implementation. Experience in JavaScript, API, Web Services Working knowledge of Vulnerability Mgmt. process & tools ISO/CISA/CISM/CISSP/CRICS (preferred) PLATFORM/TOOL EXPERTISE ServiceNow GRC & SecOps More ❯
s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT Risk Assessment/Assurance and OT VulnerabilityManagement Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills Enthusiastic about working in a team environment while developing individual capabilities 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system - exciting opportunity to choose your own benefits Pension - matching More ❯
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
implementation, and maintenance of IAM solutions, including integration with other systems and applications. Support the development and enforcement of IAM policies and procedures. Participate in access control and identity management activities. Supporting the monitoring and analysis of access management systems, including investigation and resolution of issues. Participating in IAM-related audits and compliance activities. Supporting the documentation of … looking for team members who are at the early stages of their career who also want to grow and learn more. We will provide further training in Cloud Security, VulnerabilityManagement, Agile Security methodology and more, so you gain hands-on experience in areas you are not yet experienced in in a safe environment with empathetic and supportive More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Holland & Barrett International Limited
experience in cloud security, particularly with AWS, and at least 2+ years in software development. Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, API gateways, and API Security (authentication and authorization). Proficiency in programming languages such as Python, JavaScript … GoLang, Terraform, CloudFormation (AWS), and AWS CDK. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Desired: Ability to work independently, take initiative, and maintain a keen attention to detail, ensuring high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. Why More ❯
Information System Security Officer for a multitude of information systems. Performs technical audits of assigned information systems as well as periodic monitoring of compliance with established standards. Uses SIEM, vulnerabilitymanagement, and other tools to actively correlate data and hunt threats. Ensures system is configured in accordance with required standards. Evaluates and creates artifacts which demonstrate system configuration … substitute additional experience for education). • Has or able to obtain required DODM 8570.01-M baseline certification (e.g. CISSP) within 6 months of hire. Preferred Qualifications: • Experience using common vulnerability scanning and SIEM tools. • Previous experience as an ISSO or ISSE in a classified environment. • Previous experience implementing the requirements of the DCSA Assessment and Authorization Process Manual. Security More ❯
Epsom, Surrey, United Kingdom Hybrid / WFH Options
Lloyd Recruitment - Epsom
the business. Key Responsibilities: Log, prioritise, and resolve technical issues and requests Deliver excellent customer service across multiple channels Escalate and manage major incidents appropriately Support change and problem management processes Assist with projects and improve internal tools like Power Apps Maintain accurate documentation and asset records Participate in shift patterns, including some weekend/on-call work What … focus Ability to manage competing priorities in a fast-paced environment ITIL knowledge and experience working to SLAs Nice to Have: Experience in the financial services sector Familiarity with vulnerabilitymanagement tools (e.g., Qualys) Knowledge of remote support tools and collaboration platforms Experience with Power Apps and automating service processes Refer a friend and earn a retail voucher More ❯
on Windows Administrator technology and market capabilities/trends. Manage objects stored in Active Directory as delegated by Active Directory administrators. Perform Active Directory user account, and member server management tasks in assigned OUs. Provide daily administration of the Windows based Virtual Machines and AECC services. Harden the Windows based services per commercial best practices and the required government … skills. Strong troubleshooting skills across the entire technology stack - network, storage, server, and applications. Desired Skills: Working knowledge of DoD Security Technical Implementation Guides (STIG) and the Information Assurance VulnerabilityManagement (IAVM) process. Required Certifications: Security+ or equivalent DoD 8570.01-M IA Tech Level II certification Must have (or obtain within 6 months of hire) Windows administrator related More ❯