- Jensen Hughes Inc. (Columbia, MD)
- …misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies and procedures, ... United States; Rockville, Maryland, United States **Company Overview** Throughout our worldwide network of experts, clients and communities, we are renowned for our… more
- Leidos (Bethesda, MD)
- …and accreditation process; principles of IA (confidentiality, integrity, non-repudiation, availability, and access control ); and security testing + Possesses ... metrics where applicable. + Responsible for technical planning, system hardware-software- network design, development and integration, verification and validation, and… more
- St. George Tanaq Corporation (Suitland, MD)
- …for cloud and on-premises systems. + Knowledge of USCB's identity management policies, access control standards, and risk management practices. + Knowledge of ... Domain Services (IMDS) critical services that enable the customer's network to function. This position reports to head of...ideal candidate will have experience with cloud identity and access management (IAM), cloud security , modernization and… more
- Amentum (Fort Meade, MD)
- …and accreditation process + principles of IA (confidentiality, integrity, non-repudiation, availability, and access control ) + security testing + Support ... in using your skills to help shape the Cyber, Security , & Intel space? If so, look no further....risk analysis, and risk management + Perform system or network designs that encompass multiple enclaves, to include those… more
- M. C. Dean (Annapolis Junction, MD)
- …+ Experience engineering and implementing platforms and services in a software-defined network environment. + Experience with DoD IT security requirements ... With over 7,000 employees, our capabilities span electrical, electronic security , telecommunications, life safety, automation and controls, audiovisual, and IT… more
- Themis Insight (Fort Meade, MD)
- … Security Authorizations + Ensure IT Assets remain compliant with Identity & Access Control Management (ICAM) policy. + Provide Tier 2 (Escalation) problem ... the client/server/storage/ network devices, mobile devices, etc. + Implement IAVA security patches and insure patch status is recorded in appropriate systems of… more
- Themis Insight (Fort Meade, MD)
- … Security Authorizations + Ensure IT Assets remain compliant with Identity & Access Control Management (ICAM) policy. + Provide Tier 2 (Escalation) problem ... the client/server/storage/ network devices, mobile devices, etc. + Implement IAVA security patches and insure patch status is recorded in appropriate systems of… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- … Security Authorizations + Ensure IT Assets remain compliant with Identity & Access Control Management (ICAM) policy. + Provide Tier 2 (Escalation) problem ... the client/server/storage/ network devices, mobile devices, etc. + Implement IAVA security patches and insure patch status is recorded in appropriate systems of… more
- Synergy ECP (Columbia, MD)
- … Security Authorizations + Ensure IT Assets remain compliant with Identity & Access Control Management (ICAM) policy. + Provide Tier 2 (Escalation) problem ... the client/server/storage/ network devices, mobile devices, etc. + Implement IAVA security patches and insure patch status is recorded in appropriate systems of… more
- COMSO, Inc (Fort Meade, MD)
- … Security Authorizations + Ensure IT Assets remain compliant with Identity & Access Control Management (ICAM) policy. + Provide Tier 2 (Escalation) problem ... seven years running by the Baltimore Sun Media Group. ** SECURITY CLEARANCE IS REQUIRED: TS/SCI w/ POLYGRAPH BEFORE CONSIDERATION**...network devices, mobile devices, etc. + Implement IAVA security patches and insure patch status is recorded in… more