- CACI International (Tampa, FL)
- …"hands-on-keyboard" implementer responsible for configuring, deploying, and tuning the encryption and labeling technologies that protect the Command's most sensitive ... CUI and PII in SharePoint, OneDrive, and Exchange. + **DRM & Encryption Configuration (SIPR/Top Secret):** + Implement and manage enterprise Digital Rights… more
- Capgemini (Atlanta, GA)
- …for securing the data through techniques including but not limited to encryption , tokenization, RBAC, data masking, DLP, etc. **Roles & Responsibilities** + Work ... for security policies + Identifying appropriate security techniques such as Encryption (FPE, AES, Transparent) and Tokenization (SST, Vaultless, Vault based), etc.… more
- Wells Fargo (Columbus, OH)
- …to join an exciting, fast paced team working on cutting edge encryption , tokenization and key management technologies that are leveraged to protect information ... and onboarding. This role reports directly to the Senior Manager for the Encryption , Tokenization and Key Management team. **In this role, you will:** + Drive… more
- BEAT LLC (San Antonio, TX)
- …and resilience across DHA's enterprise IT systems. By leading enterprise encryption , monitoring, and disaster recovery readiness, this role enables secure, ... and sustain enterprise solutions including mJAD, Exchange Online, MED365, encryption services, and eDiscovery environments. Develop and maintain disaster recovery… more
- BEAT LLC (San Antonio, TX)
- …Administer and maintain enterprise services including mJAD, Exchange Online, encryption services, eDiscovery, and MED365 tenant operations. Develop, validate, and ... systems remain resilient and recoverable. . Enforce and validate data encryption on desktops, laptops, and end-user devices, ensuring compliance with DoD/DHA… more
- System One (Herndon, VA)
- …tools: AWS Security Hub, Guard Duty, Config and Config rules, KMS encryption keys, VPC Security (NACLs, subnets) * Strong understanding of IAM Roles/Policies ... and Identity Federation, Encryption , KMS, secrets management * Work with DevOps teams...and infrastructure as code * Enforce controls for logging, encryption , network segmentation, patching, vulnerability management * Drive security… more
- NTT DATA North America (Austin, TX)
- …+ Ensure adherence to security best practices, including least-privilege access, encryption , and network segmentation. + Implement and manage identity and access ... OCI). + Familiarity with cloud-native security best practices (IAM, network security, data encryption , etc.) + Expert in ServiceNow ITSM + Expert in Cloud Cost… more
- Excellus BlueCross BlueShield (Rochester, NY)
- …for authentication and authorization, applied cryptography, data masking, encryption , security vulnerabilities, and remediation. * Basic understanding of ... capabilities for authentication and authorization, applied cryptography, data masking, encryption , security vulnerabilities, and remediation. * Intermediate understanding of… more
- Charles Schwab (Southlake, TX)
- …by developing and applying complex algorithms, mathematical models, and encryption techniques to protect sensitive data from unauthorized access, ensuring ... to: + Design, analyze, and implement various cryptographic algorithms like symmetric encryption (AES), asymmetric encryption (RSA), digital signatures, and key… more
- Silvus Technologies (Irvine, CA)
- …of the system including device drivers, networking functions and services, encryption , and security features. The **_Principal Embedded Software Engineer_** will be ... interface implementation. + Implementation of different security protocols and encryption algorithms. + Audio streaming and push-to-talk voice application… more