- Grant Thornton (New York, NY)
- …Information Technology, Computer Science, or a related field is required + CISSP, CISM, Cloud Security Certs such as (eg, AZ-500, SC-200, SC-300, SC-400) or ... Experience in designing and implementing Conditional Access policies, identity protection, and data encryption standards. + Solution Design and Architecture: +… more
- Broadridge Financial Solutions (Andover, MA)
- …Midrange, Database, Network, Cloud : Configuration Management, Infrastructure Resiliency, Data Encryption IT Operations: Performance and Capacity Monitoring, ... Workstations, Email and Messaging Platforms, Collaboration Tools and Mobile Technologies Data Center Engineering: Environmental and Physical Security Controls… more
- IBM (Chantilly, VA)
- …managing security reporting ensuring systems are compliant * Defining and validating data encryption methods and security requirements * Perform systems ... with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and...tasks being MVS systems programming activities such as system security compliance to Federal government Security Technical… more
- Link Solutions Inc (Sierra Vista, AZ)
- …the performance and security of PKI systems. + Knowledge of the security principles for protecting customer data and PKI systems. + Experience with ... a broad range of Infrastructure Operations, Application Development, Cybersecurity, Virtualization, Cloud and Mobility services. If you're looking for a technology… more
- Leidos (Lorton, VA)
- …knowledge of security tools and techniques for account protection (eg, encryption , MFA, SSO). + Experience with auditing and compliance requirements related to ... for each account type. + Manage password policies and ensure compliance with security standards for all user accounts. + Perform routine audits of user accounts… more
- CACI International (Columbia, MD)
- …Camel, Spring Framework: used extensively to standardize/simplify configuration logic control, data access, security , Web-tier, etc. Candidates will: o Analyze ... processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real-time systems, and business management information systems)… more
- Carrier (Indianapolis, IN)
- …and protocols (UART, RS232/485, I2C, SPI). + Understanding of cyber security technologies and best practices ( encryption , key management, certificates/exchanges, ... solutions that drive the Carrier HVAC equipment controls and smart, cloud -connected thermostats. The ideal candidate is excited by embedded products development,… more
- Zions Bancorporation (Midvale, UT)
- …and experiences as the right candidate will lead the bank transformation from on-premise data center operations into a hybrid- cloud setup via a platform refresh. ... Documentation + Solid hands-on working knowledge of load balancing technologies, encryption methodologies and security principles within F5 Technologies; Local… more
- TQI Solutions, Inc. (Chesapeake, VA)
- …operation of all systems and data . * Implement and test network security measures, such as firewalls and encryption , to safeguard systems and information ... protocols, and security standards. * Proficiency in Office365 applications and cloud services is a plus. * Ability to troubleshoot and resolve technical issues… more
- General Dynamics Information Technology (Livermore, CA)
- …developing helpdesk and IT operations best practices; including expert knowledge of security , storage, data protection, and disaster recovery protocols + ... Administration **Skills:** Linux,Microsoft Server Operating Systems,Microsoft Windows Environment **Certifications:** Security +, CE - Sec+ CE - CompTIA **Experience:** 8… more