- Jensen Hughes Inc. (Baltimore, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …security tools, hardware/software security implementation; communication protocols; and encryption techniques/tools. + Bachelor's degree in Computer Science or ... related discipline from an + accredited college or university is required. + DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required. Four (4) years of additional experience as an ISSO may be substituted for a bachelor's… more
- BlueVoyant (College Park, MD)
- …systems + Atlassian Suite (Jira, Confluence) + Email security, DLP, encryption , and vulnerability management Preferred Qualifications + Background in intrusion ... analysis, detection engineering, or penetration testing + 5+ years of experience in IT or cybersecurity, with a focus on SIEM and detection content + Relevant certifications such as Microsoft 365 Certified: Security Administrator Associate, GCFA, GCFE, or OSCP… more
- Jensen Hughes Inc. (Baltimore, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Synergy ECP (Columbia, MD)
- …tools and trends in computer and network vulnerabilities, data hiding, and encryption . + Perform binary reverse engineering on various platforms to include Windows, ... Linux and Mobile platforms, using in-depth knowledge of Windows Operating System internals and API, strong knowledge of C/C++ and assembly code, and proficiency with virtual machines. + Develop, test and modify basic and complex high-confidence… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …process * Have experience with binary patching * Have experience bypassing encryption schemes (power glitching, side channel attacks, etc.) * Have published research ... regarding cybersecurity, software exploitation, or reverse engineering Physical Requirements Adequate visual acuity and manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …process * Have experience with binary patching * Have experience bypassing encryption schemes (power glitching, side channel attacks, etc.) * Have published research ... regarding cybersecurity, software exploitation, or reverse engineering Physical Requirements Adequate visual acuity and manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …systems-on-chip, and decoders. Experience in the cybersecurity, electronic warfare, encryption , radar, and/or satellite communications domains is a plus. Full-Scope ... Poly required at the time of application *This position is upon contract award Essential Job Responsibilities Candidates will develop models, transactors, stimuli, monitors, and test benches for simulating and uncovering hidden behaviors in gate-level digital… more
- Jensen Hughes Inc. (Baltimore, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Verint Systems, Inc. (Annapolis, MD)
- …software + Deploy and support CI/CD pipeline, image scanning, and handle encryption requirement + Develop orchestration with core Java to pull image remotely ... in cloud/on prem hybrid environment + Build images, deploy images for supporting application teams + Recommend processes, technologies and other improvements intended to benefit productivity, efficiency and/or quality of Verint's solutions + Develop automation… more