• Information Systems Security Manager - Level 2

    CACI International (Annapolis Junction, MD)
    …security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security ... products, security authorization techniques, security incident management, and PKI and authorization services. + Bachelor's degree in Computer Science or a related field (eg, General Engineering, Computer Engineering, Electrical Engineering, Systems… more
    CACI International (06/05/25)
    - Related Jobs
  • VP / Director - Data Operations

    OneMain Financial (Baltimore, MD)
    …industry regulations (eg, SOX, PCI DSS, etc.), ensuring proper data access controls, encryption , and auditing measures are in place for all database environments. + ... Ensure databases are monitored with appropriate alerting to proactively identify and resolve issues. + Plan and implement strategies for database capacity management, ensuring the scalability of systems to meet future growth. + Maintain clear, up-to-date… more
    OneMain Financial (06/03/25)
    - Related Jobs
  • Information Systems Security Officer III…

    COMSO, Inc (Fort Meade, MD)
    …security tools; + Hardware/software security implementation + Communication protocols + Encryption techniques/tools Job Description: + Provide support for a program, ... organization, system, or enclave's information assurance program. + Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. + Maintain operational security posture for an… more
    COMSO, Inc (06/03/25)
    - Related Jobs
  • Sr Engineer Software Engineering - US Based Remote

    Anywhere Real Estate (Baltimore, MD)
    …of networking and security concepts like DNS, Load Balancers, Firewalls, Encryption , etc. . Experience developing cloud-native applications using AWS Lambda, ECS, ... API Gateway, SQS, Kafka, etc. . Experience with orchestration using AWS CloudFormation/ AWS CDK/ Terraform . Experience with scripting CI/CD pipelines and DevOps Preferred Experience: . Experience with Canva templates and APIs . Experience with DB design and… more
    Anywhere Real Estate (06/03/25)
    - Related Jobs
  • Business Development Specialist - Mid Atlantic

    Jensen Hughes Inc. (Columbia, MD)
    …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
    Jensen Hughes Inc. (05/30/25)
    - Related Jobs
  • Sr. Staff Security Architect, Cloud Security

    ThermoFisher Scientific (Frederick, MD)
    …such as Azure, AWS and Google Cloud. + Experience with data protection, encryption and application integration and an ability to understand various types of data ... flows. + Understanding of the underlaying technologies used by public cloud providers and using similar principles in on-premises environments. + Ability to translate cybersecurity risks into solutions and to explain complex solutions to IT and business… more
    ThermoFisher Scientific (05/30/25)
    - Related Jobs
  • FLEX Assurance Analyst

    Marriott (Bethesda, MD)
    …research . Basic understanding of cryptography concepts: hashing, signing, encryption , decryption, tokenization . Basic understanding of common application security ... controls such as WAF, RASP, Intercepting Proxies . Experience with some of the following tools and technologies: GitHub Advanced Security, Postman, Fortify SCA, Jenkins, Artifactory, SonarQube, Docker, JIRA, Confluence, Aqua CSP, Nessus Pro or Tenable.io .… more
    Marriott (05/29/25)
    - Related Jobs
  • Fire Alarm Design Consultant

    Jensen Hughes Inc. (Baltimore, MD)
    …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
    Jensen Hughes Inc. (05/24/25)
    - Related Jobs
  • Information Systems Security Officer Level 2

    General Dynamics Information Technology (Annapolis Junction, MD)
    …security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. + Bachelor's degree in Computer Science or ... related discipline from an + accredited college or university is required. + DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's… more
    General Dynamics Information Technology (05/22/25)
    - Related Jobs
  • Security Content Engineer

    BlueVoyant (College Park, MD)
    …systems + Atlassian Suite (Jira, Confluence) + Email security, DLP, encryption , and vulnerability management Preferred Qualifications + Background in intrusion ... analysis, detection engineering, or penetration testing + 5+ years of experience in IT or cybersecurity, with a focus on SIEM and detection content + Relevant certifications such as Microsoft 365 Certified: Security Administrator Associate, GCFA, GCFE, or OSCP… more
    BlueVoyant (05/21/25)
    - Related Jobs