- Palo Alto Networks (Santa Clara, CA)
- …implementing core security controls (eg, authentication/authorization, secrets management, data encryption ) in a cloud-native context. + Communication: Ability to ... articulate technical strategy to both technical and non-technical audiences. **Preferred Qualifications** + Master's or PhD in Computer Science, Engineering, or a related field. + Deep expertise and hands-on experience with Google Cloud Platform (GCP). +… more
- Leidos (Ashburn, VA)
- …ECSS - EC-Council Certified Security Specialist + ECES - EC-Council Certified Encryption Specialist **Preferred Qualifications:** + A minimum of7 years of hands-on ... experience with experience in the last 2 years that includes host-based and network-based security monitoring using cybersecurity capabilities. + PreviousDOD, IC or Law Enforcement Intelligence or Counterintelligence Training/Experience + Demonstrated… more
- Insight Global (Chicago, IL)
- …years of experience focusing in security automation Strong understanding of: IAM, encryption , KMS, & network security Experience with automation & scripting: python, ... /Powershell, & javascript for lambda based security automation Experience with: Terraform, CloudFormation, CI/CD pipelines, Kubernetes AWS Certifications more
- Jensen Hughes Inc. (Allen, TX)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- SAP (Palo Alto, CA)
- …be very helpful but not mandatory. . Cloud security including Cyber Security, Encryption , and key management knowledge is preferred. **This team is also considering ... candidates located in Tempe, AZ and Bellevue, WA.** **\#SAPECSCareers** **Bring out your best** SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known… more
- Marriott (Hilton Head Island, SC)
- …or directed. * Provide end-user support. * Confirm technology security (ie encryption , patch deployment) and technology compliance (ie Quarterly audit measures are ... in place). * Support unit infrastructure (servers, switches, router, APs etc.) and engage appropriate MI IT and/or vendor resources. * Assist in creating and maintaining secure server environment. Perform server backups and routine preventative maintenance. *… more
- BlackBerry Corporation (San Jose, CA)
- …leads in key areas such as artificial intelligence, endpoint security and management, encryption and embedded systems. You couldn't choose a more exciting time to ... consider joining us! For more information, visit BlackBerry.com and follow @BlackBerry. (C) 2022 BlackBerry. All right reserved. BlackBerry(R) and related trademarks, names, and logos are the property of BlackBerry Limited and are registered and/or used in the… more
- First National Bank of Omaha (Omaha, NE)
- …+ Ensure all solutions are compliant with best practices around application security, encryption , and data in flight + Participate in planning for initiatives; tasks ... include design, estimates, breakdown of work, and identifying dependencies **Team Leadership:** + Collaborate with product owners and stakeholders to define project scope and deliverables + Drive timely deliverables, ensure effective team utilization, and… more
- Jensen Hughes Inc. (Concord, CA)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Amentum (Linthicum, MD)
- …security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. + Familiarity with commercial security ... products, security authorization techniques, security incident management, and PKI and authorization services. **Required Certifications:** + Compliance with DoD 8570.01-M with a minimum certification of IAM Level I is required. \#javelin **Compensation… more
Recent Jobs
-
AVP, Loan Officer
- Banc of California (Chicago, IL)
-
Police Officer - New Recruit (Entry Level)
- City and County of San Francisco (San Francisco, CA)
-
SCADA and Automation Engineer - Senior Technical Manager
- WSP USA (Phoenix, AZ)
-
Senior Accountant
- Marquee Staffing - OC (Chino Hills, CA)