- Guidehouse (New York, NY)
- …planning. + Secure data flows across AWS, Azure, and on-prem environments using encryption , IAM, and network segmentation. + Develop and enforce RBAC, ABAC, MFA, and ... in securing data flows across AWS, Azure, and on-prem environments with encryption , IAM, and network segmentation. + Specific working experience related to any… more
- Robert Half Technology (Sugar Land, TX)
- …and cloud environments. * Implement advanced security protocols such as encryption , access controls, and auditing to safeguard database environments. * Perform ... for automation and security hardening. * Proven track record of implementing encryption and compliance measures in database environments. * Strong communication and… more
- Dell Technologies (Hopkinton, MA)
- …of new or re-engineered cryptography security-related software/services + Implement modern encryption / decryption algorithms, crypto key management system and work ... Familiarity with Transport Layer Security (TLS), Key Management/Data At Rest Encryption (DARE) **Compensation** Dell is committed to fair and equitable compensation… more
- Zscaler (Mclean, VA)
- …Operate the SIEM/SOAR platform for a 24/7 environment and ensure configurations, retention, encryption , and RBAC align with FedRAMP, DoD CC SRG, and DISA STIGs **Who ... across GovCloud/Secret regions + Skilled at configuring data retention, encryption , and indexer/search head clustering for resilient, compliant log management… more
- ASM Research, An Accenture Federal Services Company (Frankfort, KY)
- …with web system security concepts, including authentication, authorization (RBAC), encryption /hashing, SAML, and LDAP. + Advanced knowledge of web application ... OWASP Top 10, and other attack vectors. + Hands-on experience with encryption , hashing, secure random number generation, key derivation, digital signatures, etc. +… more
- L3Harris (Camden, NJ)
- …metro area, where you'll dive into the thrilling world of high-assurance encryption products and programs that are pivotal to national defense. Our rapidly ... exploding with opportunities for innovation and impact in network and tactical encryption products and systems. Imagine working on the front lines of technology,… more
- TEKsystems (Phoenix, AZ)
- …installation and functionality. + Manage tasks related to patch management, encryption , antivirus tools, and device security. + Document service activities clearly ... and MS Teams + Virtual Desktop Infrastructure (VDI) + Patch management, encryption technologies, and antivirus platforms + Experience with incident and request… more
- General Dynamics Information Technology (Washington, DC)
- …into automation designs, SOPs, and controls, including identifiers, tokens, encryption , de‑identification, and audit trails. + Own dashboards and metrics ... multiple stakeholders and workstreams. + Experience leading PPRL, POI, tokenization/ encryption ‑based matching, or other privacy‑preserving analytics programs. + Technical… more
- Google (Sunnyvale, CA)
- …access transparency and access sovereignty, data protection, customer managed encryption keys (CMEK), secure Spanner, insider risk reduction, unilateral access ... designs for complex scenarios, including cross-realm security and customer managed encryption keys (CMEK). + Partner with sub-teams, customers, and Spanner leads… more
- JPMorgan Chase (Seattle, WA)
- …goals and integrated seamlessly. + Apply advanced security principles, including encryption , data security, and risk management, to all IAM solutions and ... in threat modeling and risk assessment methodologies. + Deep understanding of encryption , data security, and risk management. + Expertise in IAM principles: RBAC,… more