- L3Harris (Palm Bay, FL)
- …deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Information Security ... of system, works closely with customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate fidelity… more
- USAA (San Antonio, TX)
- …and Network architecture and security (eg, network segmentation, firewalls, proxies, encryption protocols, endpoint protection ). **What sets you apart:** + ... Opportunity** As a dedicated **Staff Auditor** you'll perform technology and information/ cyber security (IT/IS) audit assignments. This role identifies problems for… more
- Leidos (Aurora, CO)
- …SOC2). + Define and enforce security policies to mitigate risks and ensure data protection in production environments. + Secure cloud environments (AWS, Azure, ... by applying infrastructure-as-code security best practices. + Implement robust access control, encryption , and monitoring solutions to protect sensitive data and… more
- USAA (Charlotte, NC)
- …Network architecture and security (eg, network segmentation, firewalls, proxies, encryption protocols, endpoint protection ). + Knowledge of internal ... dedicated **Audit Manager** you'll lead and execute complex technology and information/ cyber security (IT/IS) audit engagements throughout the audit lifecycle, to… more
- SAIC (Reston, VA)
- …+ Demonstrated experience with cyber security concepts to include encryption services, access control, information protection , network security + Hands ... Service, Software as a Service + Computer Networking experience (eg, TCP/IP, packet capture data structures, TLS and related data ) **Clearance:** + Must be a US… more
- L3Harris (Fort Wayne, IN)
- …deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Information Security ... Works closely with Government customers to ensure that the security protection needs, concerns and requirements are defined and implemented with appropriate… more
- Snap Inc. (Los Angeles, CA)
- …processing globally complies with all applicable privacy laws, including the EU General Data Protection Regulation (GDPR) and state and federal consumer ... the development of new products and technologies, including privacy, data security, and encryption + Help continue...regulations and executive orders, including EU NIS 2, EU Cyber Resilience Act, CIRCIA, Executive Order 14117, and the… more
- Palo Alto Networks (Santa Clara, CA)
- …Palo Alto Networks protects tens of thousands of people every day from Cyber bad-actors, but who protects Palo Alto Networks? The Palo Alto Networks Enterprise ... risk and compliance (GRC) teams to ensure adherence to Identity protection regulations + Evaluate ongoing practices and procedures, technical documentation, and… more
- Epsilon, Inc (Falls Church, VA)
- …improvement + Support the integration of security measures into existing systems, ensuring data protection and compliance + Participate in the implementation of ... data loss in the event of failures or cyber incidents. + Contribute to System Performance Optimization -...issues. + Understanding of core security concepts-like user authentication, data encryption , and access controls-to help maintain… more
- Koniag Government Services (Durham, NC)
- …mission-critical, business applications provide the required services to customers. Ensure data protection against accidental loss, intentional damage, or ... virtual tape storage infrastructure and processes, including onboard intelligence for encryption , data -deduplication, compression, etc. + Design, build, and test… more