- Middlesex Savings (Westborough, MA)
- …of common security technologies and functions (Endpoint AV, Patch Management, Encryption , Vulnerability Scanning, etc.) + Working knowledge of common operating ... systems (Windows, Linux, etc.) and basic endpoint security principles + Passion and enthusiasm for Cyber Security + Demonstrates excellent communication, facilitation, efficient decision making and problem solving skills Licenses and Certifications + Certified… more
- NANA Regional Corporation (Albuquerque, NM)
- …risk mitigation strategies. + Develop and enforce access control measures, encryption policies, and system hardening techniques. + Maintain documentation of security ... configurations, system changes, and incident responses. + Team Leadership & Training + Lead and mentor system administrator team, fostering a culture of technical excellence and collaboration. + Provide training on server administration, security best… more
- Jensen Hughes Inc. (Anaheim, CA)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Insight Global (Plano, TX)
- …Security & Compliance: Ensure database security through role-based access control, encryption , and audit logging. Maintain compliance with internal and external data ... governance policies. Automation & Integration: Automate operational tasks using Astra APIs and CI/CD pipelines. Integrate Astra DB with AI platforms (eg, OpenAI, Vertex AI) and developer tools (eg, GitHub, Vercel). Support & Troubleshooting: Provide production… more
- TECO Energy (Ybor City, FL)
- …of security control frameworks and their implementation, including access controls, encryption , and incident response. + Knowledge of advanced cybersecurity tools ... and platforms, such as SIEM, IDS/IPS, endpoint protection, and threat intelligence solutions, for effective risk analysis and mitigation. + Ability to conduct comprehensive risk assessments, identifying and analyzing security risks to information systems. +… more
- Ross Stores, Inc. (Dublin, CA)
- …Office 365, W365\)\. * Understanding of endpoint security principles, including encryption and vulnerability management * Strong project delivery skills, delivering ... projects on time and within budget\. * Excellent problem\-solving, analytical, and troubleshooting skills\. * Strong communication and interpersonal skills, with the ability to collaborate effectively across teams and levels of the organization, including IT… more
- Mount Sinai Health System (New York, NY)
- …+ Implement best practices for data security, including but not limited to encryption (at rest, in transit, and in use), audit logging, access control, ... authentication control, configuration managements, secure enclaves, and confidential computing. + Perform full-spectrum HPC system administration: installation, monitoring, maintenance, usage reporting, troubleshooting, backup and performance tuning across HPC… more
- RTX Corporation (Springfield, VA)
- …SBC, Cisco voice products, VoIP solutions and Call Managers. + Familiar with encryption devices including but not limited to KIV-7M, KG-175(x) and ECTOCRYP. + Hold ... NIST Cybersecurity Framework (NCSF) Practitioner Certification, or other similar certification that demonstrates knowledge of the NIST Risk Management Framework (RMF) process, and other cybersecurity frameworks, including NIST Cybersecurity Framework (CSF),… more
- Amazon (Sunnyvale, CA)
- …scalable backbone to the network and support functionalities like authentication, encryption , message routing, and device life-cycle management. As an Amazon ... company, we combine the best of startup culture with the resources and stability of one of the world's leading technology companies. Do you have the business savvy, executive relationships, and technical background necessary to help establish Amazon as a key… more
- RTX Corporation (El Segundo, CA)
- …to lead cutting-edge work in cryptographic software-including quantum-resistant encryption -alongside top engineers in software, hardware, FPGA, and systems ... design. As a Cryptographic Solutions Software Engineering Lead, you'll guide a high-performing team responsible for developing secure embedded software that will be reviewed and validated by the NSA. You'll have a critical voice from the initial pursuit phase… more
Recent Jobs
-
Property Administrator, Secret Government Security Clearance Required
- General Dynamics Information Technology (Sterling, VA)
-
Junior Copywriter
- Robert Half The Creative Group (Atlanta, GA)
-
Project Foreman - Pipe
- RK Mechanical (Cheyenne, WY)
-
Mill Application Programmer Analyst - IT
- Sylvamo (Ticonderoga, NY)