- Arena Technical Resources, LLC (Washington, DC)
- …networking protocols and understanding of security related technologies including encryption , IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic email ... and access-list - Excellent communication skills - Experience working in Agile software development teams - Experience with secure development, coding and engineering practices - Experience with Cybersecurity, Information Security, and Information Technology… more
- TekSynap (Glynco, GA)
- …and enforce data security measures, including access controls, encryption , and authentication, to safeguard sensitive information andmaintaincompliance with ... relevant regulations + Create andmaintaindata models that accurately represent the organization's data structure and relationships, helping to guide database design decisions. + Document database architecture, configurations, and processes to ensure that… more
- Steampunk (Mclean, VA)
- …and testing + Ensure effective design and implementation of data protection and encryption mechanisms for data at rest and in transit + Document as-is state ... of the environment, perform a gap analysis, and produce artifacts that articulate options and recommendations + Identify, analyze, and resolve infrastructure vulnerabilities and application deployment issues + Act as an individual contributor and mentor more… more
- RTX Corporation (Aurora, CO)
- …Integrate security and compliance into the platform with services such as encryption and access management + Provide operational support for the platform ... **Qualifications You Must Have** + Typically requires BS/BA Degree in Science, Technology Engineering Math (STEM) in Computer Science, Computer Engineering, Information Technology or Physics and a minimum of 5 years of related work experience + Experience… more
- Union Hospital Health Group (Terre Haute, IN)
- …switch port configurations + Implement security best practices, including access controls, encryption , and incident response + Conduct regular audits to identify and ... mitigate vulnerabilities. + Work closely with other IT functional groups and IT leadership + Document infrastructure designs, procedures, and troubleshooting guides + Install and support patient video delivery system headend and patient room TVs + Manage and… more
- Hawaiian Electric (Honolulu, HI)
- …technology (IT) security principles and methods (eg, firewalls, demilitarized zones, encryption ). + Specific operational impacts of cybersecurity lapses. + Cyber ... threats and vulnerabilities and cybersecurity principles. + Personally Identifiable Information (PII) data security standards and concepts. + Network security architecture concepts including topology, protocols, components, and principles (eg, application of… more
- GE HealthCare (Bellevue, WA)
- …service performance. + Implement secure coding practices, integrate with IAM and encryption services, and design for fault tolerance and disaster recovery. + ... AI-Driven DevelopmentLeverage Generative AI tools to accelerate development cycles, improve code quality, and enhance developer productivity. **Required Qualifications:** + Bachelor' s Degree in Computer Science or "STEM" Majors (Science, Technology,… more
- CACI International (Chantilly, VA)
- …Vault, Microsoft Defender for Cloud, Microsoft Sentinel., and end to end encryption . + Networking: Strong experience with design and maintenance of Expressroutes, ... VNets, VPN, firewalls, NSGs, route tables, private endpoints, load balancers, Private DNS zones, and Network Watcher. Compute and Storage: Hands-on experience designing and maintaining Azure compute and storage services. Including dedicated hosts, virtual… more
- Georgia Transmission (Tucker, GA)
- …NERC-CIP, SOX, Cybersecurity Maturity Model. Data security management including data encryption , data governance, data loss prevention. Knowledge of and ability to ... operate within an electronic document management system and electronic office environment is required. more
- Jensen Hughes Inc. (Rockville, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
Recent Jobs
-
Electrical Engineer & Electronics Controller Integrator Manager
- Safran (Rockford, IL)
-
Software Developer 3
- Oracle (Bismarck, ND)
-
Nursing Assistant / Home Health Aide - Assisted Living & Memory Care
- Presbyterian Homes and Services (Prior Lake, MN)
-
Saturday Academy Associate ELA Instructor (Spring 2026)
- Sponsors for Educational Opportunity (SEO) (New York, NY)