- Talen Energy (Allentown, PA)
- …Compliance** + Implement data platforms using security best practices, including encryption , network segmentation, logical access, and compliance controls. + Assist ... in configuration of IAM roles and policies. + Participate in audit and compliance activities, ensuring adherence to regulatory and internal standards and controls (Including Nuclear industry requirements, SOX, NERC-CIP). **Collaboration and Mentoring** +… more
- Google (Seattle, WA)
- …or online commerce domain. + Understanding of technical privacy issues (cookie management, encryption ). **About the job** The Ads Privacy team is tasked with making ... sure that the ads business continues to operate smoothly and sustainably by putting user privacy first. Our team provides infrastructure for accessing user data safely and to confirm auditability. In this role, you will review every launch to ensure we keep… more
- The City of Houston (Houston, TX)
- …and tuning. + Implement robust security measures, including identity management, encryption , and compliance controls. + Monitor and address architectural risks to ... ensure system reliability and resilience. TECHNICAL EXPERTISE + Strong proficiency in enterprise architecture frameworks (TOGAF, Zachman, etc.). + Advanced knowledge of application development technologies (.NET, Java, microservices). + Notable expertise in… more
- General Dynamics Information Technology (Washington, DC)
- …+ **Knowledge and practical experience** in privacy-preserving record linkage, data encryption , and compliance with Government health agencies, HIPAA, CMS, PII/PHI, ... and human subject's protections + **Security Clearance:** Able to obtain and maintain a Government T4 Public Trust or higher. Must be authorized to work in the United States + **Location:** Hybrid / Washington DC metropolitan area preferred **PREFERRED:** +… more
- Capgemini (New York, NY)
- …and managing security configurations, including access control, authentication, and encryption . * Monitoring and Alerting: Setting up and maintaining monitoring ... and alerting systems to proactively identify and address issues. * Troubleshooting: Diagnosing and resolving issues within the Kafka ecosystem, including performance problems, connectivity issues, and data-related problems. * Integration: Collaborating with… more
- ISYS Technologies (Washington, DC)
- …integration, S3 bucket policies, cross-account access patterns, and KMS encryption key management. Experience administering Databricks serverless compute, Workspace ... Git integrations (GitLab), Databricks Asset Bundles (DABs) for deployment automation, and modern workspace features supporting DevOps workflows. + SLA/SLO management and stakeholder communication skills; ability to define platform service levels, produce… more
- Jensen Hughes Inc. (Allen, TX)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Sandia National Laboratories (Albuquerque, NM)
- …of identity and access management principles and practices. + Advanced knowledge of encryption algorithms and security protocols (RSA, SSL, TLS), as well as security ... vulnerability, ForgeRock, ADFS, Ping Federate, and other On Prem IDP Stacks. + Knowledge in HTTP, XML, AJAX, REST, SCIM. + Experience in web-based application development using HTML5, JavaScript, and frameworks like Angular or React. + Experience working with… more
- Penske (Reading, PA)
- …and compliance understanding including data privacy regulations (GDPR, CCPA, HIPAA), encryption , and access control design - Exceptional executive communication with ... ability to present to C-suite, translate technical concepts to business value, and influence stakeholders across IT and business units - Strategic leadership with high autonomy; sets architectural direction, proactively identifies risks, and drives alignment… more
- Leidos (Fayetteville, NC)
- …and VoIP Call Managers + Configure military tactical fly away kits and encryption devices. + Configure 802.1x port security, DHCP, Identity services Engine (ISE), ... and monitor SolarWinds. + Verify equipment is operating as intended, test configurations, and react to alerts as necessary. + Apply network device updates, security configurations, and report compliance. + Provide technical support for the design,… more