- Jensen Hughes Inc. (Rockville, MD)
- …your personal data against unauthorized access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only ... recruitment process. Please click **here (https://www.jensenhughes.com/careers/responsible-use-of-ai-in-the-jensen-hughes-recruitment-process)** to review. The security of your personal data is important… more
- Jensen Hughes Inc. (Rockville, MD)
- …your personal data against unauthorized access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only ... recruitment process. Please click **here (https://www.jensenhughes.com/careers/responsible-use-of-ai-in-the-jensen-hughes-recruitment-process)** to review. The security of your personal data is important… more
- Rubrik (Palo Alto, CA)
- …Role-Based Access Controls (RBAC)** across all clouds. + Design and implement ** security controls** including encryption , KMS, VPC Service Controls, privileged ... Azure, GCP, and OCI. As a **Senior Cloud Platform Engineer ** , you will be part of the **Global...Federal Government's interests: + Know, acknowledge, and follow system-specific security policies and procedures; + Protect data … more
- CACI International (Sterling, VA)
- …US Anticipated Posting End: 12/29/2025 **The Opportunity:** CACI/BITS is seeking a Cyber Security Engineer to support our Makalu contract. If you are interested ... vulnerabilities. + Working with development teams to create, maintain, and monitor data connections, NPE security certificates, firewall connection requests. +… more
- Schrodinger (NY)
- …A security professional who is passionate about public cloud and developer security workflows + A self-motivated engineer and architect who can articulate a ... We're looking to hire a **Senior** **Cybersecurity Engineer ** to join us in our mission to...+ Additional understanding of other cybersecurity practices, such as encryption , identity and access management (IAM), network security… more
- Jensen Hughes Inc. (West Chester, PA)
- …your personal data against unauthorized access, use, or disclosure, using security technologies and procedures, such as encryption and limited access. Only ... recruitment process. Please click **here (https://www.jensenhughes.com/careers/responsible-use-of-ai-in-the-jensen-hughes-recruitment-process)** to review. The security of your personal data is important… more
- Amgen (Jacksonville, FL)
- …diagnosis and continuous improvement of live models and applications. + **Embed security and responsible-AI controls** ( data encryption , access policies, ... frictionless, enterprise-grade AI developer experience. **Roles & Responsibilities:** + ** Engineer end-to-end ML pipelines** - data ingestion, feature… more
- Cummins Inc. (GA)
- …Strategic Improvements** Your ability to spot systemic issues from vulnerability data and configuration assessments will guide long-term security enhancements ... partners to ensure the confidentiality, integrity and availability of data and systems. + Systems Security Requirements...2.0, OpenID Connect, SAML) + A strong understanding of security principles, including encryption , token security… more
- Sierra Nevada Company, LLC (Fort Worth, TX)
- …operations in contested or degraded environments. + Implement and manage network security controls (firewalls, VPNs, encryption , VLAN segmentation, Zero Trust ... We are seeking an experienced Network Engineer to support the development, integration, and sustainment...will design and implement robust network infrastructures, ensure mission data flows securely and efficiently across domains, and contribute… more
- Capital One (Boston, MA)
- …fundamentals (eg, private links, mTLS, API gateways) + Knowledge of data security concepts including data tokenization, encryption , and access control ... Senior Associate, L2 Support Engineer (Databolt) - Capital One Software (Remote) Ever...ensuring our customers receive expert-level service for a mission-critical data security product. This is a highly… more