- Lockheed Martin (Hanover, MD)
- …include but not limited to Routing protocols, Encapsulation, Tunneling and encryption , legacy protocols \(i\.e\. SONET\) **Clearance Level:** TS/SCI w/Poly SP ... **Other Important Information You Should Know** **Expression of Interest:** By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified… more
- ManpowerGroup (Rockville, MD)
- …development teams. + Architect security solutions for authentication, authorization, encryption , and secure communication channels. **What's Needed?** + Bachelor's ... degree in Computer Science, Information Security, or related technical field required. + 5+ years of experience in application security, with at least 2 years in security architecture roles. + Deep knowledge of secure design principles, threat modeling… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …be expected to utilize experience in the cybersecurity, electronic warfare, encryption , radar, and/or satellite communications domains to provide perspective on ... design verification approaches. Full-Scope Poly required at the time of application *This position is contingent upon contract award. Essential Job Responsibilities + Candidates will develop models, transactors, stimuli, monitors, and test benches for… more
- Eliassen Group (Belcamp, MD)
- …including joint programs. Technical subject areas include encryption technologies, communications security/transmission security, satellite network security, ... cellular, radio and Tactical Internet security and cross-domain solutions. Information Management Support: + Provide desktop hardware and software support, to include inter-operable and integrated standard office automation desktop software support. + Areas of… more
- Cardinal Health (Annapolis, MD)
- …Certificates + System Copy and Refreshes + ABAP and Java performance Tuning + SNC Encryption /Cryptography + SAP SSO and SAML setup, SAP-MDG S/4 Admin, SAP LaMa 3.0 + ... HANA Architecture knowledge, Install, Upgrade & Performance Tuning + HANA Replication Setup + HANA HA/DR Setup, Hana DB sizing strategy and performance analysis + SUSE and RHEL Cluster Setup with SAP + AWS or GCP Cloud knowledge **Anticipated salary range:**… more
- Perdue Farms, Inc. (Salisbury, MD)
- …data security, privacy, and compliance with relevant regulations. Implementing data encryption , masking, and auditing techniques + Relevant experience working cross ... functionally with IT, supply chain, finance, sales, and marketing to align data strategies with business goals + Demonstrated ability to balance long-term data architecture planning with the agility to support evolving business needs + Proven experience… more
- STG International (Bethesda, MD)
- …Microsoft Outlook, Microsoft Excel, and HIPAA-compliant encryption software. Required Experience Minimum Education Requirements/Certification/Licensure/Experience: ... + Licensed physician (MD or DO) with board-certification in Preventive Medicine/.Occupational or a primary care specialty (eg Internal Medicine or Family Medicine) + Minimum of two (2) years of experience in an occupational clinic setting; + Must possess… more
- Amentum (Fort Meade, MD)
- …security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security ... products, security authorization techniques, security incident management, and PKI and authorization services. **Clearance Required:** + Active TS/SCI and a current polygraph **Must be able to:** + Perform requirements gathering and analysis of said… more
- S&P Global (MD)
- …Groups. + Implement access solutions using AWS secret manager. + Create and Maintain Encryption Keys + Review and Respond to Security Audits related to Access and ... Identity Management + Develop and Lead governance tasks for Access and Identity Management + Engineer and implement solutions to integrate cloud native services with centralized IDPs like Azure AD and Okta + Troubleshooting issues with IAM tools and processes… more
- Jensen Hughes Inc. (Columbia, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more