• Executive Security Advisor, AWS Security Assurance…

    Amazon (Herndon, VA)
    …Demonstrated breadth of security expertise in various sub domains such as encryption , identity, incident response, etc. - Hands-on technical expertise in technology ... automation, implementation, integration, and/or deployment - Experience with risk assessment methodologies and risk reporting for executive leadership - Proven background in clearly writing complex technical documents that can be presented across a varied… more
    Amazon (07/29/25)
    - Related Jobs
  • Fire Protection Engineer

    Jensen Hughes Inc. (Blacksburg, VA)
    …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
    Jensen Hughes Inc. (07/29/25)
    - Related Jobs
  • Senior Cybersecurity Incident Response…

    TekSynap (Radford, VA)
    …+ Strong working knowledge of PKI infrastructure, digital certificates, and encryption protocols. + Familiarity with reviewing and responding to Army Cyber ... Tasking Orders (CTOs) and collaborating with Cybersecurity Service Providers (CSSPs). + Experience with DoD/Army cybersecurity compliance standards and the Risk Management Framework (RMF). + Hands-on involvement in application security, SW assurance, and… more
    TekSynap (07/26/25)
    - Related Jobs
  • Senior Network Administrator

    BAE Systems (Quantico, VA)
    …designing, building, and maintaining physical and virtual networking devices, encryption (experience with Taclanes preferred), Firewall devices and rules, and ... networking Layer 2 and 3 devices and configurations + Expertise researching, evaluating, testing, recommending, integrating deploying, and installing network equipment and solutions to meet objectives and requirements to include new technologies. + Ability to… more
    BAE Systems (07/26/25)
    - Related Jobs
  • Security Administrator

    CACI International (Hampton, VA)
    …root cause analysis, and propose effective solutions. + Knowledge of encryption technologies, access controls, and identity and access management (IAM) principles. ... + Excellent communication and problem-solving skills to collaborate effectively with cross-functional teams. + Required DoD 8140 compliant certification such as CompTIA Security+ Other relevant cybersecurity certifications like Certified Information Systems… more
    CACI International (07/26/25)
    - Related Jobs
  • Sr. Systems Engineer/Architect, AWS Bespoke…

    Amazon (Arlington, VA)
    …code. You will guide system architecture development and trade studies for encryption devices, key management systems, FPGAs, and ASICs. You will generate artifacts ... for design reviews (SRR, PDR, CDR, TRR) as part of the government certification processes. You will work with various teams to establish requirements, develop verification methods, and ensure system specifications are met. You will use tools such as… more
    Amazon (07/26/25)
    - Related Jobs
  • Senior Manager, Technical Program Management…

    Capital One (Richmond, VA)
    …with core data security and privacy principles, including data classification, encryption (at-rest and in-transit), access control, and secure data lifecycle ... management. + 3+ years experience delivering large and complex programs - where you own the business or technical vision, collaborate with large cross-functional teams, secure commitments on deliverables, and unblock teams to land business impact + Experience… more
    Capital One (07/26/25)
    - Related Jobs
  • Penetration Testing Manager

    Centene Corporation (Richmond, VA)
    …of routing, remote access, proxies, firewalls, TCP/IP, email gateways/filters, encryption , network scanning, packet sniffing and injection, advanced network ... reconnaissance, persistence techniques, and wireless network exploitation concepts; remote and local exploitation techniques; security evasion techniques; social engineering techniques, proficiency in programming languages (python, go, ruby, etc.), native… more
    Centene Corporation (07/25/25)
    - Related Jobs
  • Engineer Software 2

    Huntington Ingalls Industries (Roanoke, VA)
    …process * Have experience with binary patching * Have experience bypassing encryption schemes (power glitching, side channel attacks, etc.) * Have published research ... regarding cybersecurity, software exploitation, or reverse engineering Physical Requirements Adequate visual acuity and manual dexterity for meeting the requirements Software Engineer family. The listed salary range for this role is intended as a good faith… more
    Huntington Ingalls Industries (07/25/25)
    - Related Jobs
  • M365 & Intune Policy Administrator - Lead

    Deloitte (Richmond, VA)
    …+ Proficiency with scripting languages, preferably PowerShell. + Understanding of encryption , data protection, and secure access methodologies. + Experience with ... configuring and managing security tools and policies in Microsoft 365 and Group Policy for Domain environments. + Experience with VPNs, firewalls, secure network access, along with secure access policies. + Experience with managing Exchange Online, Microsoft… more
    Deloitte (07/25/25)
    - Related Jobs