- NS2 Mission (Falls Church, VA)
- …to Develop (ATD) and Authority to Operate (ATO) processes, including encryption , monitoring, auditing, reporting, and role-based access controls. Experience leading ... or supporting automated security testing, including vulnerability scanning and report delivery. Proven ability to partner with engineering teams to translate, implement, and validate security requirements. Experience supporting IA documentation such as System… more
- iCIMS (Holmdel, NJ)
- …and event-driven APIs. + Showcased proficiency in security-by-design: identity/IAM, encryption , secrets management, zero trust, and compliance frameworks (eg, SOC ... 2, ISO 27001, GDPR/CCPA). + Proven ability to define reference architectures, establish guardrails/standards, and drive adoption across multiple product teams. + Track record of success in leading Agile or Iterative software development initiatives. +… more
- Gridiron IT Solutions LLC (Odenton, MD)
- …best practices and compliance frameworks within Intune, including endpoint protection, encryption , and data loss prevention Monitor and respond to security incidents ... related to mobile devices and endpoints, integrating with SIEM and SOC workflows Continuously evaluate and improve endpoint management processes, proposing innovative solutions and communicating effectively with leadership Develop and maintain comprehensive… more
- Argonne National Laboratory (Lemont, IL)
- …Knowledge and experience with installing, configuring, and troubleshooting network encryption devices. Assist with device maintenance and transferring electronic ... keys. + Ability to manage multiple concurrent tasks and balance conflicting priorities. + Ability to work effectively as a team member. + Strong customer service skills in providing user support to research and scientific staff. Preparing tools, resources, and… more
- Entrust (Shakopee, MN)
- …**Preferred Qualifications:** + Experience in data security, cybersecurity, encryption /cryptography, identity, or authentication software sales, with exposure to ... multi-channel go-to-market strategies including direct, partner, and digital sales motions. + Knowledge of Government sales processes across the US and broader Americas region, with proven ability to navigate complex government procurement cycles and… more
- Acuity Inc. (Atlanta, GA)
- …to ensure discoverability, secure access, and auditability. - Implement access controls, encryption , and audit trails for PII/SPII and regulated data. - Ensure ... adherence to SOX, GDPR, CCPA and internal compliance standards. - Drive data quality, lineage, and governance initiatives using enterprise data marketplace tool. Data Democratization, Consumption & Literacy - Drive data democratization by making curated,… more
- Career Strategy Consultants (New Martinsville, WV)
- …proactively. Cybersecurity & Compliance: Enforce firewalls, access controls, and encryption protocols. Conduct audits and ensure compliance with regulatory ... standards. Coordinate with security teams on incident response and risk mitigation. Team Leadership & Vendor Relations: Lead IT support and systems teams. Coordinate with vendors for software/hardware acquisition and support. Maintain internal documentation,… more
- BeOne Medicines (San Mateo, CA)
- …of information security concepts including: cloud security and compliance, encryption , access controls, intrusion detection and prevention, disaster recovery, ... network security, security operations, security architect. + Experience working in a global enterprise environment. + Relevant and current industry certification(s): CRISC, CISSP, CISM, CISA All qualified applicants will receive consideration for employment… more
- Acuity Inc. (Fort Wayne, IN)
- …UDP, IGMP, HTTP + USB Communication Protocols: UVC, UAC, HID + Encryption and Computer Security experience + Vulnerability assessment methodologies + Streaming media ... protocols: RTSP, RTP, RTCP, SIP, AES67, Dante, SMPTE 2022 + Experience with Teams, Zoom, and Bring Your Own Meeting/Device environments + Real-time embedded systems + High performance, distributed, or high availability systems + Unit testing (Python and Google… more
- PennVeterinary Supply, Inc (Lancaster, PA)
- …processes QUALIFICATIONS Strong background in: Cybersecurity, NGAV/EDR/SOC, pen testing, encryption , threat monitoring, incident response and SIEM solutions (Rapid7 ... preferred) System and network management including experience with firewalls, routing/switching, Site to Site VPN, VPN Configuration of Active Directory GPOs, DNS, DHCP, WSUS Microsoft 365 Administration (Endpoint Manager, Exchange, Entra, SharePoint, Teams)… more