- Huntington Ingalls Industries (Fort Meade, MD)
- …across a variety of domains such as cybersecurity, electronic warfare, encryption , radar, and satellite communications. Full-Scope Poly required at the time ... hardware to perform non-intended tasks * Have experience bypassing encryption schemes (power glitching, side-channel attacks, etc.) Physical Requirements May… more
- TEKsystems (Columbia, MD)
- …(PAM), and MFA technologies. * Expertise in Data Security (Cryptography and Encryption ). * Knowledge of advanced Auditing and Log Management tools. * Experience ... with security vulnerabilities scanning tools. * Understanding of Cloud Access Broker Services (CASB) and configuration best practices. * Proficiency in using Data Loss Prevention (DLP) tools and applying best practices. * Familiarity with user behavior… more
- Link Solutions Inc (Adelphi, MD)
- …management policies, including configuration profiles, security baselines, and device encryption . + Perform macOS patching, system updates, and automation using ... Bash or AppleScript. + Manage user authentication and access controls in coordination with directory services. + Monitor performance and ensure security hardening using DoD-mandated configurations. + Coordinate data backups and recovery processes using… more
- SAIC (Bethesda, MD)
- …with network security practices, including firewalls, intrusion detection systems, and encryption + 3+ years' experience with automation tools and scripting ... languages to streamline network operations + Strong analytical and problem-solving abilities, able to address complex networking challenges + Excellent written and verbal communication skills **Desired Skills:** + Familiarity with data center infrastructure… more
- Link Solutions Inc (Aberdeen Proving Ground, MD)
- …and maintain Layer 2/3 switches, routers, wireless access points, firewalls, encryption devices, and telecommunication systems. + Troubleshoot complex network issues ... across a variety of devices and configurations. + Implement and enforce information security procedures in compliance with organizational policies. + Configure routing protocols, including OSPF and BGP, and manage both IPv4/IPv6 based networks. + Set up and… more
- Link Solutions Inc (Adelphi, MD)
- …the configuration and troubleshooting of Layer 2/3 switches, routers, firewalls, encryption devices, wireless access points, and associated networking gear. + ... Oversee network control center operations to ensure 24/7 availability and proactive incident management. + Design, install, configure, and maintain enterprise LAN/WAN/MAN infrastructures, including IPV4/IPV6, IPSec VPN, and voice/video systems. + Guide network… more
- Leidos (Columbia, MD)
- …IT products and concepts serve in information security (eg, full disk encryption , mobile device management, remote access/VPN, etc.) + Experience with software ... development lifecycle methods (eg, agile) and tools (eg, Subversion, GitLab, Confluence, JIRA) + Strong applied knowledge of network, transport, and application layer communications and security (eg, TCP/IP, TLS, IPsec, SSH, LDAP) + Working knowledge of… more
- Ricoh Americas Corporation (Baltimore, MD)
- …and archiving old documents. + Perform scanning, file conversion, file naming, and encryption tasks. + Perform FTP (File Transfer Protocol) for printing and manage ... Table of Contents for electronic files. + Perform Optical Character Recognition (OCR) tasks and file formatting for printing in Microsoft Office Suite and Adobe Acrobat Pro. + Conduct daily quality checks on convenience copiers and respond to errors or… more
- Nelnet (Annapolis, MD)
- …with SIEM/XDR platforms. . Participate in the design of model access controls, encryption , and governance enforcement. . Assist in the development and enforcement of ... AI-related security policies and procedures. **Innovation** . Challenge legacy assumptions and recommend innovative, AI-native security approaches. . Identify short- and long-term strategies for securing AI assets that drive business value. . Develop security… more
- Jensen Hughes Inc. (Baltimore, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more