- Guidehouse (Huntsville, AL)
- …operations align with FedRAMP High and RMF requirements, including encryption , boundary isolation, identity controls, inference logging, and auditable model‑output ... trails. + Establish secure input‑validation flows, restricted‑context enforcement, prompt sanitization, and runtime protections to mitigate security and data‑integrity risks. + Develop telemetry pipelines capturing query metadata, retrieval context, response… more
- NTT America, Inc. (Plano, TX)
- …and enforce Windows system security best practices, including access control, encryption , and secure configurations. + Manage user access, Group Policy Objects ... (GPOs), and Active Directory (AD) policies in line with IAM standards. + Identify, and remediate security vulnerabilities reported by scanning tools or external advisories. + Support compliance initiatives by maintaining secure and auditable Windows… more
- NTT America, Inc. (Austin, TX)
- …and resolve problems. + Implement database security protocols, data masking, encryption , auditing, and manage user privileges. + Work with application teams ... on database design, queries, and performance optimization. + Manage database migrations, upgrades, and patch applications in production and development environments. + Perform on-call rotations for database production support as required. + Document all… more
- NTT America, Inc. (Plano, TX)
- …+ Enforce Linux system security best practices, including access control, encryption , and secure configurations. + Manage user access, sudo privileges, and ... SSH key policies in line with IAM standards. + Monitor, identify, and remediate security vulnerabilities reported by scanning tools or external advisories. + Support compliance initiatives by maintaining secure and auditable Linux environments. + Collaboration… more
- Penske (Reading, PA)
- …TCP/IP and packet capture applications * Endpoint Protection solutions * Encryption Technology * Good documentation and presentation skills are also necessary ... for this position * Familiarity with disaster recovery planning and test execution * Regular, predictable, full attendance is an essential function of the job * Willingness to travel as necessary, work the required schedule, work at the specific location… more
- Black & Veatch (Overland Park, KS)
- …user experience and organizational alignment + Enforce strict security protocols, MFA, encryption , and secure remote access + Coordinate with Infosec teams to ... monitor threats and ensure executive devices remain hardened + Anticipate issues before they occur through monitoring, patching, and performance optimization + Prepare devices and environments ahead of executive travel, board meetings, and major events +… more
- Northrop Grumman (Los Angeles, CA)
- …(Firmware) Assurance, Software Attack Surface Analysis Report, Select Software/Firmware Encryption , and Secure Key Handling Salary Range: $121,400.00 - ... $182,000.00Salary Range 2: $151,100.00 - $226,700.00 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and… more
- Leidos (Scott Air Force Base, IL)
- …and experience with the operation and configuration of MILSATCOM encryption devices. + Moderate understanding and experience with Satellite Communications ... (SATCOM) architecture and signal flow. + Currently possess an active Secret security clearance. + Ability to manage IP over SATCOM networks using iDirect/Linkway/EBEM or equivalent FM-TDMA hubs **Required Education and Experience:** + High school diploma and… more
- CGI Technologies and Solutions, Inc. (Arlington, VA)
- …Experience with Security Systems: Familiarity with secure communication equipment (COMSEC), encryption , and secure access protocols is often necessary. CGI is ... required by law in some jurisdictions to include a reasonable estimate of the compensation range for this role. The determination of this range includes various factors not limited to skill set, level, experience, relevant training, and licensure and… more
- Oracle (Nashville, TN)
- …SSO, Identity Provisioning, Identity Governance etc. + Expertise in Encryption , Key management, Cybersecurity fundamentals (eg, access controls, common software ... vulnerabilities, and security best practices), Deployment Methodologies, and Security Standards Compliance Certification (STIG, FedRAMP, PCI-DSS), etc. + Very good understanding of concepts related to Docker, Container, Serverless computing, and Kubernetes. +… more
Recent Jobs
-
Manager, Sales Development
- MongoDB (Austin, TX)
-
Software Engineer III
- AeroVironment (Huntsville, AL)
-
Summer 2026 Research Consultant Intern
- CoStar Realty Information, Inc. (Richmond, VA)
-
Software Engineer II
- The Gowan Co. (Yuma, AZ)