- ServiceNow, Inc. (Santa Clara, CA)
- …role also owns secure key management, certificate infrastructure, enterprise-wide encryption capabilities, credential and secrets management, and the client ... libraries and Kubernetes services that make it all secure, observable, and reliable. This technical, hands-on architect and subject matter leader will partner cross-functionally with product, infrastructure, and information security teams to deliver… more
- STG International (Rockville, MD)
- …in the use of Microsoft Word, Microsoft Outlook, Microsoft Excel, and HIPAA-compliant encryption software. + Must be able to communicate effectively, in writing and ... verbally, to various stakeholders about occupational health issues involving specific employees, or agency wide issues . + Must be comfortable performing trend analysis on populations . + Must be knowledgeable of f ederal regulations and capable of researching… more
- GovCIO (Kearneysville, WV)
- …SIPRNet network infrastructure, including routers, switches, firewalls, TACLANEs, and encryption devices, ensuring compliance with DoD and DISA security standards ... + Implement and enforce security configurations and hardening across network devices,serversand endpointsin accordance withSTIGs and RMF requirements + Conduct vulnerability scans (eg, ACAS, SCAP), analyze findings and remediate security issues… more
- General Dynamics Information Technology (Fairfax, VA)
- …learned. + Define and implement data protection rules, access controls, encryption standards, and automated incident response procedures for all cloud resources ... and data flows. + Establish and enforce granular Identity and Access Management (IAM) policies, including least-privilege access, segregation of duties, and automated provisioning/deprovisioning. + Conduct periodic access reviews, create reports and make… more
- NTT America, Inc. (Sacramento, CA)
- …Segmentation:** Integrate MPLS VPN segmentation with Zero Trust principles; enforce encryption (MACsec/IPsec) and compliance with FCC and cybersecurity standards. + ... **Performance Testing & SLA Assurance:** Develop KPIs, conduct end-to-end load testing, and validate optical and MPLS performance using OTDR, iPerf, and ThousandEyes. + **Automation & Orchestration:** Utilize Cisco IOS-XE programmability, Ansible, and… more
- Themis Insight (Fort Meade, MD)
- …Traffic Shapping Voice over IP (VOIP), GRE Tunneling, IP Security (IPSec) IP Encryption and Media over IP (MoIP), and network address translation (NAT) where ... appropriate + Coordinate with the system engineering and dataflow efforts to ensure proper mission operations to minimize down time. + Design solutions, integrate, configure, deploy, test and provide ongoing maintenance for numerous types of network devices,… more
- STG International (Rockville, MD)
- …in the use of Microsoft Word, Microsoft Outlook, Microsoft Excel, and HIPAA-compliant encryption software. + Must be able to communicate effectively, in writing and ... verbally, to various stakeholders about occupational health issues involving specific employees, or agency wide issues. + Must be knowledgeable of federal regulations and capable of researching other applicable regulations to design and convey recommendations… more
- Cummins Inc. (GA)
- …AM protocols (OAuth 2.0, OpenID Connect, SAML) and security principles, including encryption , token security, and session management. + Deep knowledge of agile ... processes and workflows + Must have good communication and collaboration skills + Solid diagnostic, testing, and problem-solving skills + Nice to have experience with the Salesforce.com platform. Sales Cloud, Service Cloud, CPQ, Experience Cloud etc.… more
- Jensen Hughes Inc. (Denver, CO)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Leidos (Ashburn, VA)
- …ECSS - EC-Council Certified Security Specialist + ECES - EC-Council Certified Encryption Specialist **Preferred Qualifications:** + A minimum of 8 years of hands-on ... experience with experience in the last 2 years that includes host-based and network-based security monitoring using cybersecurity capabilities. + Demonstrated experience planning, executing, and participating in threat hunt missions. + Previous DOD, IC or Law… more