- eVisit (Mesa, AZ)
- …security best practices across infrastructure, including network segmentation, encryption , access controls, and vulnerability management. + Collaborate with ... the security and compliance team to ensure adherence to regulations like HIPAA, GDPR, and other relevant standards in healthcare. + Create comprehensive documentation for infrastructure architecture, operational procedures, and incident response plans. Share… more
- BAE Systems (Boulder, CO)
- …etc). + Certifications (CCNA, CCNP). + Network security fundamentals (authentication, encryption , etc). **Pay Information** Full-Time Salary Range: $132962 - $226035 ... Please note: This range is based on our market pay structures. However, individual salaries are determined by a variety of factors including, but not limited to: business considerations, local market conditions, and internal equity, as well as candidate… more
- Google (Mountain View, CA)
- …hardware & software security features of embedded systems and embedded computing devices ( encryption , Secure Boot ). + Familiarity with the security challenges of AI ... and agentic systems. + Experience with machine learning and AI systems. At Google DeepMind, we value diversity of experience, knowledge, backgrounds and perspectives and harness these qualities to create extraordinary impact. We are committed to equal… more
- Arena Technical Resources, LLC (Washington, DC)
- …when configuring OS images and network settings . Ensure data protections such as encryption at rest/in transit (using Azure Key Vault and SSL/TLS) are in place . ... Plan and implement network connectivity (ExpressRoute or VPN) and cross-domain solutions if needed . Link Azure Secret or on-premises environment, carefully managing data flows to maintain compliance with classified network policies . Lead technical… more
- Panasonic Avionics Corporation (Beaverton, OR)
- …images (eg, Talos, CoreOS, Yocto) + Understanding of secure boot flows, disk encryption (eg, LUKS), TPM provisioning + Knowledge of disk cloning, partitioning tools, ... and custom OS deployment pipelines **Programming Skills & System Design** + Proficiency in at least one modern programming language: + GO for high-performance services + Python (FastAPI, Django, Flask) + Strong understanding of object-oriented programming and… more
- JobNimbus (Lehi, UT)
- …(Unit, Integration, and E2E tests) + API and general Security Principles for encryption , input validation, rate limiting + Exposure to Domain Driven Design (DDD) + ... Experience migrating from monolithic to micro frontend architectures + Background in platform engineering or building internal tools/services used across multiple product teams + A passion for building core platform services that power the rest of the… more
- Nanobiosym, Inc. (Cambridge, MA)
- …and operating AWS environments, including VPC design, IAM roles, encryption , and monitoring (CloudWatch, GuardDuty). + Familiarity with infrastructure automation ... tools such as PowerShell, Bash, Terraform, or Ansible. + Experience with SIEM platforms, EDR tools, and log aggregation for detection and response (eg Splunk, Logz.io, SentinelOne, etc.). + Solid grasp of cybersecurity frameworks and compliance standards such… more
- V2X (Tallahassee, FL)
- …computers and ancillary equipment, COMSEC equipment to include data and voice encryption devices, multiplexers and modems. + Active Top Secret Security Clearance ... with SCI eligibility. + Current US Passport with 3 x blank pages **Other Requirements:** This position is Full-Time/at-sea on a forward deployed vessel. Candidates must not be hindered by motion sickness and must pass/maintain Maritime Medical Exam IAW CENTCOM… more
- Koniag Government Services (San Antonio, TX)
- …and response (EDR), advanced threat protection, data loss prevention (DLP), and encryption technologies. + Ensures that all endpoints maintain a strong security ... posture against evolving cyber threats. + Leads initiatives to standardize and optimize endpoint configurations across the DHA network, developing and maintaining secure baseline configurations for various device types and use cases. Implements automated… more
- Jensen Hughes Inc. (Phoenix, AZ)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
Recent Jobs
-
Cloud Architect - VP
- MUFG (New York, NY)
-
National Account Manager - Pet Brands
- Perdue Farms, Inc. (Salisbury, MD)