- CACI International (Annapolis Junction, MD)
- …security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security ... products, security authorization techniques, security incident management, and PKI and authorization services. + Bachelor's degree in Computer Science or a related field (eg, General Engineering, Computer Engineering, Electrical Engineering, Systems… more
- OneMain Financial (Baltimore, MD)
- …industry regulations (eg, SOX, PCI DSS, etc.), ensuring proper data access controls, encryption , and auditing measures are in place for all database environments. + ... Ensure databases are monitored with appropriate alerting to proactively identify and resolve issues. + Plan and implement strategies for database capacity management, ensuring the scalability of systems to meet future growth. + Maintain clear, up-to-date… more
- COMSO, Inc (Fort Meade, MD)
- …security tools; + Hardware/software security implementation + Communication protocols + Encryption techniques/tools Job Description: + Provide support for a program, ... organization, system, or enclave's information assurance program. + Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. + Maintain operational security posture for an… more
- Anywhere Real Estate (Baltimore, MD)
- …of networking and security concepts like DNS, Load Balancers, Firewalls, Encryption , etc. . Experience developing cloud-native applications using AWS Lambda, ECS, ... API Gateway, SQS, Kafka, etc. . Experience with orchestration using AWS CloudFormation/ AWS CDK/ Terraform . Experience with scripting CI/CD pipelines and DevOps Preferred Experience: . Experience with Canva templates and APIs . Experience with DB design and… more
- Jensen Hughes Inc. (Columbia, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- ThermoFisher Scientific (Frederick, MD)
- …such as Azure, AWS and Google Cloud. + Experience with data protection, encryption and application integration and an ability to understand various types of data ... flows. + Understanding of the underlaying technologies used by public cloud providers and using similar principles in on-premises environments. + Ability to translate cybersecurity risks into solutions and to explain complex solutions to IT and business… more
- Marriott (Bethesda, MD)
- …research . Basic understanding of cryptography concepts: hashing, signing, encryption , decryption, tokenization . Basic understanding of common application security ... controls such as WAF, RASP, Intercepting Proxies . Experience with some of the following tools and technologies: GitHub Advanced Security, Postman, Fortify SCA, Jenkins, Artifactory, SonarQube, Docker, JIRA, Confluence, Aqua CSP, Nessus Pro or Tenable.io .… more
- Jensen Hughes Inc. (Baltimore, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. + Bachelor's degree in Computer Science or ... related discipline from an + accredited college or university is required. + DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's… more
- BlueVoyant (College Park, MD)
- …systems + Atlassian Suite (Jira, Confluence) + Email security, DLP, encryption , and vulnerability management Preferred Qualifications + Background in intrusion ... analysis, detection engineering, or penetration testing + 5+ years of experience in IT or cybersecurity, with a focus on SIEM and detection content + Relevant certifications such as Microsoft 365 Certified: Security Administrator Associate, GCFA, GCFE, or OSCP… more