- Jensen Hughes Inc. (Concord, CA)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Amentum (Linthicum, MD)
- …security tools, hardware/software security implementation; communication protocols; or encryption tools and techniques. + Familiarity with commercial security ... products, security authorization techniques, security incident management, and PKI and authorization services. **Required Certifications:** + Compliance with DoD 8570.01-M with a minimum certification of IAM Level I is required. \#javelin **Compensation… more
- State of Minnesota (St. Paul, MN)
- …and hardware to secure these systems (ie firewalls, virtual private networks, encryption , digital certificates, and their relationship to data security). + Working ... in a highly regulated, large and heterogeneous environment with the ability to articulate security controls, measures and recommendations to a leadership team. + Proven experience and leadership working across diverse business lines to resource and monitor… more
- Oracle (Dover, DE)
- …technologies. 5. Solid understanding of **network topologies, load balancing, encryption , identity federation, and multi-tenant architectures** . 6. Experience ... conducting **technical due diligence, scalability assessments, and system integration reviews** . 7. Excellent written and verbal communication skills with the ability to present to both **engineering and executive audiences** . 8. Bachelor's or Master's… more
- Highmark Health (Annapolis, MD)
- …security practices such as identity and access management, data protection, encryption , certificate and key management + Knowledge of containerization and container ... orchestration technologies such as Google Kubernetes Engine (GKE). **LICENSES or CERTIFICATIONS** **Required** + GCP, AWS, Azure or other Cloud Service Certification **Preferred** + Terraform, Ansible or other, similar tool certification **SKILLS** +… more
- Eliassen Group (Olympia, WA)
- …Transport, SFTP, and IBM Connect:Direct. + Experience managing SSL, TLS, data encryption , and certificates. + Basic understanding of networking concepts. + Proven ... interpersonal, communication, organizational, documentation, leadership, and customer service skills. + Ability to influence and work in a dynamic cross-functional team environment with diplomacy and assertiveness. **Education Requirements:** **Education… more
- ServiceNow, Inc. (Atlanta, GA)
- …& Data Protections** + Deep background in **data security** , including encryption , data access policies, safe data routing, personal data protections, and ... privacy-by-design. + Hands-on experience with designing **AI access security controls** , such as: + Role- and policy-based restrictions on AI usage + Guardrails and content safety filters + Monitoring and logging of AI interactions + Auditable decision trails… more
- ProSphere Tek (Mary Esther, FL)
- …SOCOM, and C4ISR systems. + Knowledge of military tactical data links, encryption equipment, and radio communication devices. + Knowledge of DoD information ... assurance, policy, and regulatory requirements. + Knowledge of and experience in Local Area Network (LAN) design, operation, maintenance, troubleshooting, and sustainment. + Experience in the design andmanagingcomplex systemsoverthe product life cycle. +… more
- Deloitte (Houston, TX)
- …monitoring, security incident and event management, data protection (DLP, encryption ), user and administrator account management, SSO, conditional access controls ... and password/key management. + Troubleshooting system level problems in a multi-vendor, multi-protocol network environment. + Documenting platform technical issues, analysis, client communication, and resolution as part of cyber risk mitigation steps. +… more
- Mission Support and Test Services (North Las Vegas, NV)
- …Protection:** Knowledge and experience with data security best practices, including data encryption at rest and in transit (using TLS), and potentially using tools ... like **Oracle Data Safe** for database security assessments and auditing. + **Auditing and Compliance:** Experience with collecting and retaining identity and application access logs, utilizing audit APIs or tools like the Oracle Risk Management service to… more