- STG International (Rockville, MD)
- …customer portals as necessary. * Understands and shows proficiency in password protection, encryption , and secure send. * Understands and uses the full capability of ... the FOH phone system and virtual meeting platforms (ie: WebEx, MSTeams, Cisco Jabber, etc. * Updates and uses all available IT software and resources appropriately in order to complete tasks in a timely manner. * Informs MEP Program Manager of IT disruptions… more
- Boston University (Boston, MA)
- …backup and restore, endpoint protection, and several native and centrally managed encryption solutions required. + A valid driver's license. + You can explain ... tech clearly and listen with empathy. + Deliver patient, professional support consistently. + Adapt fast and resolves issues efficiently. + Collaborate smoothly with IT and business partners. Boston University offers an excellent benefits package including:… more
- Oracle (Salt Lake City, UT)
- …components, RSA Algorithms, Symmetric/Asymmetric keys, Hashing , Signing, Encryption /Decryption , Cyber Security, Cryptography **Preferred Qualifications** + ... Hands-on experience developing services on a public cloud platform (eg, AWS, Azure, Oracle) + Experience and understanding of multi-AD/AZ and regional data centers + Building continuous integration/deployment pipelines with robust testing and deployment… more
- Guidehouse (Huntsville, AL)
- …operations align with FedRAMP High and RMF requirements, including encryption , boundary isolation, identity controls, inference logging, and auditable model‑output ... trails. + Establish secure input‑validation flows, restricted‑context enforcement, prompt sanitization, and runtime protections to mitigate security and data‑integrity risks. + Develop telemetry pipelines capturing query metadata, retrieval context, response… more
- NTT America, Inc. (Plano, TX)
- …and enforce Windows system security best practices, including access control, encryption , and secure configurations. + Manage user access, Group Policy Objects ... (GPOs), and Active Directory (AD) policies in line with IAM standards. + Identify, and remediate security vulnerabilities reported by scanning tools or external advisories. + Support compliance initiatives by maintaining secure and auditable Windows… more
- NTT America, Inc. (Austin, TX)
- …and resolve problems. + Implement database security protocols, data masking, encryption , auditing, and manage user privileges. + Work with application teams ... on database design, queries, and performance optimization. + Manage database migrations, upgrades, and patch applications in production and development environments. + Perform on-call rotations for database production support as required. + Document all… more
- NTT America, Inc. (Plano, TX)
- …+ Enforce Linux system security best practices, including access control, encryption , and secure configurations. + Manage user access, sudo privileges, and ... SSH key policies in line with IAM standards. + Monitor, identify, and remediate security vulnerabilities reported by scanning tools or external advisories. + Support compliance initiatives by maintaining secure and auditable Linux environments. + Collaboration… more
- Penske (Reading, PA)
- …TCP/IP and packet capture applications * Endpoint Protection solutions * Encryption Technology * Good documentation and presentation skills are also necessary ... for this position * Familiarity with disaster recovery planning and test execution * Regular, predictable, full attendance is an essential function of the job * Willingness to travel as necessary, work the required schedule, work at the specific location… more
- Black & Veatch (Overland Park, KS)
- …user experience and organizational alignment + Enforce strict security protocols, MFA, encryption , and secure remote access + Coordinate with Infosec teams to ... monitor threats and ensure executive devices remain hardened + Anticipate issues before they occur through monitoring, patching, and performance optimization + Prepare devices and environments ahead of executive travel, board meetings, and major events +… more
- Northrop Grumman (Los Angeles, CA)
- …(Firmware) Assurance, Software Attack Surface Analysis Report, Select Software/Firmware Encryption , and Secure Key Handling Salary Range: $121,400.00 - ... $182,000.00Salary Range 2: $151,100.00 - $226,700.00 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and… more