- Cambridge International Systems Inc (Norfolk, VA)
- …validation. + Knowledge of network architecture, PKI, firewall and encryption methods, and multilevel/cross-domain security solutions. + Ability to translate ... technical requirements into secure designs that meet mission and compliance objectives. + Knowledge of PII data security, program protection planning, and enterprise security architecture frameworks. + Proficiency in system hardening, vulnerability… more
- GuideOne Insurance (Raleigh, NC)
- …Vendor/SOW management; familiarity with DevOps/CI/CD, DataOps, security/privacy (eg, encryption , tokenization, role-based access), and regulated environments. + ... Bachelor's in a technical or business field (or equivalent). PMP, PMI-ACP, SAFe, or PgMP are a plus. Compensation: + $140,000 - $170,000 commensurate with experience, plus bonus eligibility Benefits: We are proud to offer a robust benefits suite that includes:… more
- Walmart (Bentonville, AR)
- …and best practices for IoT/OT systems and devices, such as encryption , authentication, authorization, logging, patching, etc. + Collaborate with vulnerability ... assessment and penetration testing teams to identify risks, findings, and remediations across the IoT/OT landscape. + Collaborate with other teams and stakeholders to ensure the security and compliance of IoT/OT systems/devices, and provide training and… more
- Lockheed Martin (Littleton, CO)
- …Monitoring, etc\.\) * Knowledge of network support in a classified environment \( encryption , etc\.\) * Current Security \+ or CISSP certification * Current working ... knowledge of National Industrial Security Program Operating Manual \(NISPOM\) and Risk Management Framework \(RMF\) requirements * SQL experience * Familiarization and knowledge related to Virtualization \(VMware or HyperV\) * Knowledge of Disaster Recovery… more
- Oracle (Redwood City, CA)
- …products related to data access control, database privileges control, data encryption , and database authentication. **Additional Details** - MS/PhD degree in CS ... - 10+ years of experience in software engineering, preferably in security products development. - Strong development experience with C or C++ is required - Familiarity with information security concepts like authentication, OAuth2, IAM - Knowledge of the… more
- Robert Half Technology (New York, NY)
- …and associated security tools. * Strong understanding of security protocols, encryption methods, and authentication technologies. * Hands-on experience with security ... monitoring tools like SIEM, Zscaler, CrowdStrike, and Rapid7. * Familiarity with compliance standards like ISO 27001 and SOC 2. * Relevant certifications such as CISSP, CCSP, or CEH are highly desirable. * Exceptional communication skills, with the ability to… more
- CACI International (Annapolis Junction, MD)
- …security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security ... products, security authorization techniques, security incident management, and PKI and authorization services. + Bachelor's degree in Computer Science or a related field (eg, General Engineering, Computer Engineering, Electrical Engineering, Systems… more
- Jensen Hughes Inc. (Cleveland, OH)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Lockheed Martin (Chelmsford, MA)
- …Designing, coding, and verifying complex FPGA architectures that embed DSP, encryption , networking, and microwave circuit control\. * Developing RTL logic, register ... transfer level \(RTL\) code, and supporting circuitry for multi function modules\. * Creating and maintaining firmware and design requirement documents that define system architecture and performance targets\. * Performing hardware and firmware debugging in… more
- Leidos (Chantilly, VA)
- …technical issues in deployed systems, including RF interference and encryption challenges. + Collaborate with multidisciplinary teams, including government and ... contractor personnel, to ensure mission success. + Prepare and maintain technical documentation, system architectures, and compliance records. + Support field testing, validation, and operational deployment of satellite communications hardware and software. +… more