- Palo Alto Networks (Santa Clara, CA)
- …Application security, Network security, Authentication, Authorization, Identity systems, encryption , and secure coding practices. **Preferred Qualification** BS/MS ... in Computer Science, other engineering/technical degree **The Team** To stay ahead of the curve, it's critical to know where the curve is, and how to anticipate the changes we're facing. For the fastest-growing cybersecurity company, the curve is the evolution… more
- Generac Power Systems (Waukesha, WI)
- …and release planning. + Set enterprise policies for backup frequency, retention, encryption , and separation of duties and verify execution through controls and ... continuous monitoring. + Lead regular recovery testing for tier one and tier two services including technical failover, data recovery, application restoration, and end to end business validation. + Maintain an enterprise recovery runbook library with service… more
- SMBC (Charlotte, NC)
- …and Governance, Privileged Account Management, Compliance, Penetration testing, Encryption , Cloud Security, Incident Response, Vulnerability Management. + Excellent ... communication skills, writing skills, and the ability to work with internal teams. + Be a performance-driven team player with an excellent attitude. + Able to follow priorities set by management. + Strong ability to deliver on time. + Strong ability to deliver… more
- Motion Recruitment Partners (Spring, TX)
- …with core security technologies: firewalls, VPNs, IDS/IPS, authentication, encryption , vulnerability management, incident response. **Technical Skills** + Strong ... knowledge of TCP/IP networking, firewall virtualization, VPNs, NAT, DNS, IPS/IDS. + Preferred certifications: + Cisco (CCNA/CCNP Security) + Fortinet (FCA/FCSS/NSE) + CISSP, GIAC (nice to have) **Automation & DevOps Experience** + Highly preferred experience… more
- ColdQuanta (Chicago, IL)
- …features on GitHub + Familiarity with security core best-practices such as access control, encryption at rest, key rotation, and logging + Exposure to or interest in ... front-end / GUI development, eg, HTML/CSS, React, PyQt. Our team will begin reviewing applications on January 20, 2026 and will continue until the position is filled. Benefits Benefits + Salary range: 120,000 to 150,000 USD/year + 100% company-paid medical,… more
- ManTech (Belcamp, MD)
- …specific mission needs, including data link layers, routing protocols, and encryption mechanisms. + Experience with testing methodologies for embedded systems, ... integration testing, and systems-level testing. + Familiarity with utilization of simulation tools to analyze system performance under various scenarios. + Experience with hardware interfacing (analog/digital converters, sensors, actuators) **Clearance… more
- Koniag Government Services (Chantilly, VA)
- …methods (SSO, SAML, OAuth, LDAP, Active Directory) + Understanding of encryption technologies and data protection mechanisms + Knowledge of network, cloud, ... & application security logging, monitoring, and SIEM integration + Experience with security audits, security assessments, vulnerability scanning, & compliance reporting + Understanding of API security and secure integration patterns + Knowledge of ServiceNow… more
- Jensen Hughes Inc. (West Chester, PA)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
- Excellus BlueCross BlueShield (Albany, NY)
- …knowledge of a minimum of two (2) concepts and/or tools listed below: o Encryption o PKI o Network and application security, and related firewalls (Palo Alto ... Networks, Imperva, Azure, AWS, etc.) o Identity management (AD, Entra ID, conditional access, MFA, SSO, etc.) o Virus detection and end point security (Defender preferred) o Vulnerability scanner and pen testing tools (eg, Rapid 7, Nessus, Nexpose, Metasploit,… more
- Jensen Hughes Inc. (West Chester, PA)
- …access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only authorized individuals may access your personal ... data for the purpose for which it was collected, and these individuals receive training about the importance of protecting personal data. Jensen Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business, including,… more
Recent Jobs
-
Project Manager, Construction
- ARCO (Birmingham, AL)
-
Global Head of Sales Automotive
- None (Oakland, CA)
-
Project Manager Infrastructure Management and Pavement Engineering
- Stantec (Reno, NV)
-
Sentinel Nuclear Surety Senior Principal Systems Engineer
- Northrop Grumman (Roy, UT)