- VF Corporation (Raleigh, NC)
- …Advise on security best practices organization-wide, including password management, encryption , software updates, and other improvements. + Provide consultations on ... information security designs for infrastructure and application projects. + Build strong collaborative relationships with defensive and infrastructure teams. + Prepare detailed reports on discovered vulnerabilities and recommend solutions to mitigate risks. +… more
- Parker Hannifin Corporation (OH)
- …AKS). + Security and Privacy: Experience handling sensitive data (PII), encryption , access controls, secure model serving. + Search and retrieval: ... Elastic/OpenSearch, knowledge graphs, advanced RAG patterns. + Ethics and Compliance: Champions responsible AI and governance. + Delivery: On-time, high-quality deployment of ML/LLM features into production. + Assess current AI/ML assets, data pipelines, and… more
- Insight Global (Cincinnati, OH)
- …build & protect: Design and implement enterprise data protection controls including encryption , key management, DLP, and data governance platforms across cloud and ... on-prem environments. Monitor, hunt, detect: Monitor for data misuse, exfiltration, and policy violations; integrate detection capabilities with SOC workflows. Respond, recover, sustain: Lead response activities related to data exposure incidents, ensuring… more
- Oracle (Annapolis, MD)
- …security by implementing Identity and Access Management, network segmentation, encryption , key management, and compliance mapping specific to each hyperscaler. ... Conduct regular assessments for adherence to regulatory standards (GDPR, HIPAA, PCI, SOC 2, etc.). 5. **Cost Management and Optimization:** Design and implement cost-effective architecture, recommending and applying tools and best practices for budgeting,… more
- Cognizant (Washington, DC)
- …computing. + Implement security best practices, such as access controls, encryption , network segmentation, and compliance with industry standards and regulations + ... Design transactional compute patterns with compensation mechanisms. + Define monitoring metrics, alerts, and diagnostics; troubleshoot performance bottlenecks. + Promote component-based development for reusability and consistency. + Coordinate effort within… more
- TekSynap (Arlington, VA)
- …environment. + Knowledge of Tech Control equipment such as Switches, Encryption devices, Network Operation Consoles, and Circuits. + Provide comprehensive technical ... support and maintenance services to the Pentagon Primary Technical Control Facility (PPTCF), Pentagon Alternate Technical Control Facility (PATCF), and Mark Center. + Experience with BICSI installation regulations and standards. **REQUIRED QUALIFICATIONS** +… more
- ServiceNow, Inc. (San Diego, CA)
- …Prediction, Cloudera Big Data clusters, Kafka and RabbitMQ messaging, database encryption , E-Mail infrastructure, DNS, Puppet, NGINX, Kubernetes, RHOSP, and more. ... **To be successful in this role, you have:** **The ideal candidate will have experience producing infrastructure-centric code for a production environment.** **This role also requires senior-level skills and background in systems administration and… more
- Lumen (San Antonio, TX)
- …JNCIA or CCNA is preferred + Firm knowledge of the HAIPE and other encryption devices (KG-175G/D and KIV-7M) + Some knowledge and experience with optical transport ... technology is preferred. **Compensation** This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other… more
- CACI International (Beale AFB, CA)
- …+ Creates, updates, and responds to Incident tickets. + Manages data encryption changes and implementation. + Monitors the SIGINT enterprise and networks ... health/status (Sensor, platform, network paths to include crypto, DCGS SIGINT systems, and SIGINT related enterprise services). + Provides comprehensive analysis, diagnostics and fault isolation for the SIGINT systems and networks associated with ground… more
- Actalent (Albuquerque, NM)
- …FedRAMP, FISMA, and agency ATO requirements, including identity management (SAML/OAuth), encryption , and audit logging. + Participate in Agile ceremonies, backlog ... grooming, and sprint reviews; estimate work effort and contribute to continuous improvement. + Develop and maintain technical documentation, design artifacts, and configuration guides compliant with Federal CDRL and IV&V expectations. + Support production… more