Government (Azure-Gov) and Amazon Web Services Government (AWS-G). Responsible for assessing and facilitating network requests: including firewall policies, VPN, load balancing, cryptography, and network architecture. Design and implement security-first network policies and procedures to adhere with NIST 800.171 and CMMC compliance regulations. Communicates effectively with end More ❯
cybersecurity threats and risks they face. Broad cybersecurity experience with a combination of technology involvement, business knowledge and risk awareness (incl. on topics like cryptography, network design, application security, data protection, identity and access management, cloud security). Ability to analyse complex problems and to deliver insightful, practical and sustainable More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification, authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. More ❯
PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next step in your career, we would love to hear from you. More ❯
PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next step in your career, we would love to hear from you. More ❯
threat modeling or other risk identification techniques. Preferred Qualifications Experience with AWS products and services. Experience in threat modeling, secure coding, identity management, authentication, cryptography, system administration, or network security. Proficiency in programming languages such as Python, Java, or C++. Amazon is an equal opportunity employer that values diversity. We More ❯
Reston, Virginia, United States Hybrid / WFH Options
RedKey Solutions
repeatable tasks and provide consultative support. • Design, configure, implement, troubleshoot, and maintain security platforms (e.g., firewalls, intrusion detection/prevention, anti-virus/malware, cryptography systems, SIEM, MDM). • Formulate systems and methodologies, respond to security events, and assist in remediation efforts. • Participate in the change management process. • Coordinate and More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
Competencies You should be capable of defining architectures independently or collaboratively, proficient in Infrastructure Security Design and Information Systems Security, familiar with Risk Analysis, Cryptography, IAM, cloud technologies, and able to monitor risk and compliance. Strong communication skills with customers and technical teams are essential. Nice to Have Domain knowledge More ❯
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM; Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) - Review and provide input to program and contract work breakdown structure (WBS), work packages and More ❯
with security tool development such as fuzzers, security checkers. Advanced knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, and application security Familiarity with AWS services Security training and outreach to internal development teams Security guidance documentation Assistance with recruiting activities MSC/MEE More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Thales Group
You can independently define architectures, are proficient in Infrastructure Security, Security Supervision, and Information Systems Security. You are familiar with Risk Analysis, Network Security, Cryptography, IAM, cloud technologies, and compliance monitoring. You excel in working with customers and technical teams. NICE TO HAVE: Domain expertise in Defence, Nuclear, Government, Aerospace More ❯
Development, knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT.Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Job Description: As part of a high-performing Agile team, turn Agile stories into fully implemented features across a More ❯
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
work at a technical level with teams; Identification/design/selection of appropriate security components to provide security enforcing functions (e.g. network, endpoints, cryptography, authentication, authorisation, data inspection etc) for a variety of infrastructures including cloud environments; Legal and regulatory topics that merit consideration when conducting various activities in More ❯
work at a technical level with teams; Identification/design/selection of appropriate security components to provide security enforcing functions (e.g. network, endpoints, cryptography, authentication, authorisation, data inspection etc) for a variety of infrastructures including cloud environments; Legal and regulatory topics that merit consideration when conducting various activities in More ❯
work at a technical level with teams; Identification/design/selection of appropriate security components to provide security enforcing functions (e.g. network, endpoints, cryptography, authentication, authorisation, data inspection etc) for a variety of infrastructures including cloud environments; Legal and regulatory topics that merit consideration when conducting various activities in More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) • Review and provide input to program and contract work breakdown structure (WBS), work packages and More ❯
the job you are applying. Must have experience in designing, coding, and testing programmable cryptographic devices and associated software. Must have experience in basic cryptography; computer architecture; technical writing; software quality assurance Must have experience evaluating to meet Information Assurance Security Requirements Directive (IASRD) These Qualifications Would be Nice to More ❯