- Synergy ECP (Annapolis, MD)
- …Room Kit/Room Kit Pro). + Knowledge of security protocols: SSL, TLS, encryption + Audio processing + Sound reinforcement and speaker placement + Sightlines, ... screen size and projection distances + Knowledge of AV-over IP. + Integration of audio and video teleconferencing systems + Design and installation of audio support systems (microphones, amplifiers, and interfacing with Skype) + Five (5) years' experience… more
- Lockheed Martin (Orlando, FL)
- …solutions \- NSA Type 1/Commercial Solutions for Classified \(CSfC\) encryption solutions \- Demonstratable experience conducting internal and external customer ... assessments, including: \- Identifying areas for improvement \- Providing recommendations for remediation \- Developing and implementing corrective action plans \- Proven ability to evaluate proposed changes or additions to the information system, including:… more
- OCT Consulting, LLC (Suitland, MD)
- …Analysis, Firewall Management, Incident Response, Data Loss Prevention (DLP), Encryption , Two-Factor Authentication, Web filtering, and Advanced Threat Protection. ... Responsibilities will include, but are not limited to: + Analyze management and technical controls to ensure that specific security and compliance requirements are met through the verification of documented processes, procedures, and standards in order to… more
- KPH Healthcare Services, Inc. (East Syracuse, NY)
- …procedures are followed and enforced for: + Asset tracking + Device encryption + Anti-malware protection + Multi-factor authentication + Patching of operating ... systems and applications + Other operational and security related processes + Analyze systems data to help ensure system conformance to standards. + Document standard operating procedures and system configuration standards to drive consistency. + Utilize… more
- CAE USA INC (Arlington, TX)
- …Security Management: Firewalls, Data Protection Controls, + Patching, Encryption , Certificates, vulnerability scanning (ACAS/SCAP/E-STIG). + Continuous Monitoring . ... Patch/STIG . Annual ATO Package Review . Peer Reviewing program security documents. + Attending and presenting in Design reviews, Program Meetings, Technical Interchange Meetings and IPT meetings. + Assist in compliance monitoring. Reviewing, evaluating and… more
- Jensen Hughes Inc. (Rockville, MD)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Zebra Technologies (Lincolnshire, IL)
- …by implementing robust security protocols for all integrations, including PGP encryption and secure access controls (ISU/ISSG). + Ensures compliance with standards ... and regulatory requirements by maintaining comprehensive documentation of system configurations, integrations, and data flows. System Integrity & Deployment + Prepares and manages integration migrations and deployments to Sandbox and Production environments… more
- Highmark Health (Helena, MT)
- …deep expertise in Microsoft Purview, ForcePoint, BigID, Varonis, Windows, Linux, GKE, Encryption , and other data loss prevention (DLP) and data security posture ... management (DSPM) tools. **ESSENTIAL RESPONSIBILITIES** + Lead the design, implementation, and maintenance of the organization's data protection infrastructure across multiple platforms and vendors, ensuring optimal performance, scalability, and security. This… more
- Mission Support and Test Services (North Las Vegas, NV)
- …controls including firewalls, intrusion detection/prevention systems, endpoint protection, encryption , and multi-factor authentication solutions. + Design networks ... and systems with a security focus, ensuring systems are developed in accordance with federal law, customer requirements, certification and accreditation requirements, and industry best practices. + Review purchase requests for technology items and provide… more
- Fujifilm (Bothell, WA)
- …data security measures to protect sensitive information, including access controls, encryption , and data masking + Develop and implement data quality standards ... and processes to maintain data accuracy, consistency, and reliability **Knowledge and Experience:** + Excellent communication ability (written and verbal) + Bachelor of Science in Computer Engineering or related degree (master's degree preferred) from an ABET… more
Recent Jobs
-
Engineer I - Protection & Control (Engineering Boot Camp 2026)
- Qualus (Westborough, MA)
-
Support Services Program Manager / Specialist
- Cayuse Holdings (Indianapolis, IN)
-
Mechanical Engineer
- Leidos (College Park, GA)
-
Certified Athletic Trainer - Eastern University
- Select Medical (Broomall, PA)