- JPMorgan Chase (Seattle, WA)
- …security concepts such as identity and access management, network security, encryption , and data protection. + Strong analytical and problem-solving skills, with ... the ability to proactively identify, assess, and mitigate security risks in complex, multi-cloud environments. + Experience with the full Software Development Life Cycle (SDLC), including agile methodologies, CI/CD pipelines, application resiliency, and secure… more
- RTX Corporation (Richardson, TX)
- …knowledge of security controls for classified and air-gapped environments ( encryption , network segmentation, secure communications). + In-depth experience with ... cybersecurity frameworks and standards (eg, NISPOM, DAAPM, NIST, NIAP, CNSSI 1253, JSIG). + Experience in Requirements Decomposition, Model-Based Systems Engineering, and ITIL Lifecycle. + Ability to translate business requirements into technical solutions and… more
- L3Harris (Broomfield, CO)
- …systems, networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration ... of multiple methods into a cohesive system security perimeter and environment and the policies and procedures necessary to monitor and maintain such an environment. Will prepare Certification and Accreditation documentation, using multiple standards, to… more
- Lockheed Martin (Colorado Springs, CO)
- …environments \(dev, test, staging, production\) with consistent network segmentation, encryption , and tagging\. Create reusable GitOps workflows \(ArgoCD, Flux\) to ... keep environments in sync with source‑of‑truth definitions\. **\- Collaboration & Enablement** - Work closely with the AWS Infrastructure Architect to align security controls with the overall cloud architecture\. Partner with the Lead Software Engineer, AI/ML… more
- Amentum (Norfolk, VA)
- …methodologies for active defense and system hardening. + Knowledge of encryption algorithms and cyber capabilities/tools (eg, Transport Layer Security, Pretty Good ... Privacy). + Knowledge of evasion strategies and techniques. + Knowledge of forensic implications of operating system structure and operations. + Knowledge of host-based security products and how they affect exploitation and vulnerability. + Knowledge of… more
- Allegion (Golden, CO)
- …of experience required) + Familiarity with secure communication protocols, encryption , and authentication methods. + **Wireless Communication** : Experience with ... wireless protocols such as Wi-Fi, Bluetooth Low Energy (BLE), and Thread. + **RFID Expertise** : Familiarity with Radio Frequency Identification (RFID) technologies and relevant standards. + **Networking Knowledge** : Experience with TCP/IP networking is… more
- Amentum (Fort Meade, MD)
- …security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. Familiarity with commercial security ... products, security authorization techniques, security incident management, and PKI and authorization services. * US Citizen with an active TS/SCI with Poly **Other Requirements:** * Perform requirements gathering and analysis of said requirements * Perform… more
- Amazon (Sunnyvale, CA)
- …but not limited to: o Network segmentation and access control o Data encryption and protection mechanisms o Endpoint and server security o Secure software ... provisioning and storage o Incident response and monitoring practices o Physical and environmental security controls Document findings, develop risk ratings, and provide actionable remediation guidance to suppliers. Partner with internal security, compliance,… more
- Northrop Grumman (Melbourne, FL)
- …like a CCNA/CCNP/CCIE or equivalent. + Experience with authentication and data encryption methods, to include securing communications at either the datalink or ... network layer + Experience with embedded systems, Unix and Linux operating systems, non-Cisco routing environments, single board computers, servers and Network Attached Storage (NAS) solutions + Working knowledge of cyber security and Risk Managed Framework… more
- Acuity Inc. (Fort Wayne, IN)
- …UDP, IGMP, HTTP + USB Communication Protocols: UVC, UAC, HID + Encryption and Computer Security experience + Vulnerability assessment methodologies + Streaming media ... protocols: RTSP, RTP, RTCP, SIP, AES67, Dante, SMPTE 2022 + Experience with Teams, Zoom, and Bring Your Own Meeting/Device environments + Real-time embedded systems + High performance, distributed, or high availability systems + Unit testing (Python and Google… more
Recent Jobs
-
Manager Electrical Engineering 1
- Northrop Grumman (Chantilly, VA)
-
Principal, Software Engineer - Tech
- Walmart (Bentonville, AR)
-
Assistant or Associate Dean in Oral Health Equity and Community Dentistry (CE or Tenure Track)
- University of Pennsylvania (Philadelphia, PA)
-
Sales Account Manager, Automotive , Amazon Advertising
- Amazon (Santa Monica, CA)