- Deloitte (Honolulu, HI)
- …and compliance standards, implementing network segmentation, access controls, encryption , and collaborating with security teams to address vulnerabilities ... and risks. + Troubleshoot and resolve network incidents, collaborating with IT and communications teams to analyze root causes, prevent recurrence, and ensure connectivity and performance. + Maintain thorough network documentation, educate users and junior… more
- IBM (Austin, TX)
- …Complexity: Guide your team in transforming intricate technical requirements (eg, encryption , rotation, access control) into clear, usable, and safe user ... experiences. Champion the "secure by design" philosophy. * Drive Winning Results: Align design strategy with product roadmaps for industry standards like Vault and Boundary. Ensure your team delivers work that drives adoption and reduces friction for DevOps… more
- MSys Inc. (Austin, TX)
- …and firewalls. + 8. years Understanding of cloud security frameworks, encryption , identity and access management (IAM), and compliance standards like GDPR, ... HIPAA, etc. + 8. years Familiarity with CI/CD pipelines, containerization (Docker, Kubernetes), and infrastructure as code (IaC) tools like Terraform or Cloud Formation. + 8. years Proficiency in languages such as Python, Java, C#, and scripting languages for… more
- NVIDIA (Santa Clara, CA)
- …and interconnects. + Implement data protection and compliance controls such as encryption in-transit, access control, and auditing. and foster automation in storage ... and networking operations through the utilization of infrastructure-as-code and orchestration guided by AI/ML. What we need to see: + BS/MS in Computer Science, Electrical Engineering, or a related field, or equivalent experience. + 12+ years of experience in… more
- Alight (IN)
- …SQS, etc.)** . + **Security & Compliance:** Expertise in **OAuth, JWT, SSO, encryption , and secure coding practices** . + **DevSecOps & CI/CD:** Hands-on experience ... with **Terraform, Bitbucket, Jenkins, Artifactory, and other automation tools** . **Soft Skills & Leadership** + Strong **system design** , **problem-solving and analytical skills** , with the ability to exercise **sound judgment** . + Experience leading… more
- Jensen Hughes Inc. (Mountlake Terrace, WA)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Comcast (West Chester, PA)
- …optimization + Advanced AWS experience with: S3 lifecycle tiers, encryption , cross-account architectures; MSK provisioning, tuning, scaling, monitoring; EC2, VPC ... networking, IAM role design; Lambda for serverless automation + Strong background in backend/datastore technologies (Oracle, MongoDB). + Expert-level knowledge of Kafka, Spark, distributed computing, and real-time ingestion frameworks. + Proficiency in Python,… more
- RTX Corporation (Cedar Rapids, IA)
- …executive leadership + Familiarity with Cryptographic Hardware architecture/design, Network Encryption specifications and test methodologies + Experience with tools ... such as DOORS, CAMEO or similar, Software Languages such as Rust and Python. + Experience with the systems development process, including requirements capture, design, decomposition, integration, and verification/validation, and transition to production. +… more
- Google (Cambridge, MA)
- …services to cloud platforms. + Experience with security concepts such as encryption , identity management, access control, attack vectors, and pen testing. + ... Experience in programming languages, debugging or systems design. + Experience in resolving technical and capacity blockers. **About the job** When leading companies choose Google Cloud, it's a huge win for spreading the power of cloud computing globally. Once… more
- JPMorgan Chase (Tampa, FL)
- …of cloud security best practices, identity and access management (IAM), encryption , network security, and compliance frameworks relevant to cloud deployments. + ... **DevOps and CI/CD:** Experience with DevOps practices and tools for continuous integration and continuous deployment (CI/CD) in cloud environments + **Monitoring and Optimization:** Familiarity with cloud monitoring, logging, and cost optimization tools (eg,… more