experience with IDS/IPS solutions, ACAS Scanning (Nessus), Trellix ePO, & Splunk are a plus. • A working knowledge or previous experience with encryption and cryptography is a plus. • Knowledge of previous hands-on experience supporting PKI and certificate-based authentication, Zero-Trust architectures, and multi-factor authentication is a plus. More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) - Review and provide input to program and contract work breakdown structure (WBS), work packages and More ❯
AWS, Azure, Google) These Qualifications Would be Nice to Have: Experience with relational, noSQL, and file-based storage products Experience with Java Security and Cryptology (PKI Certificates) Understanding of Amazon Web Services (AWS) Experience with software configuration management processes and tools Knowledge of Intelligence Community (IC) processes, policies and guidance More ❯
Demonstrated expertise with malware analysis, including investigations of botnet and root kit behavior. Familiarity with information security concepts (OWASP Top 10, CVEs, IoCs, TTPs, Cryptography). Network Security Devices (IDS/IPS, NGFW, WAF, NGAV). OSSEC, Snort, Suricata Experience. Experience with at least one SIEM i.e Alienvault, Logrhythm, Splunk More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
SSH, and CLI Experience with McAfee, Tenable, and other security products Experience with major cloud service providers, such as Azure and AWS Knowledge of cryptography protocols and standards, including TLS, mTLS, hashing algorithms, and Public Key Infrastructure (PKI) Knowledge of federal compliance standards, including NIST 800-53, FIPS, DoD STIG More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethical hacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials, including syllabi, lecture notes More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The "Technical Standardisation for Trustworthy and Sustainable ICT, Construction, and Aerospace" research programme represents a strategic collaboration More ❯
risk management experience to lead our team of Assessors in conducting rigorous technical testing of security controls across various domains such as access control, cryptography, network security, and incident response for our Intelligence Community customer. This role is 100% on-site and you must be a self-starter able to More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. The "Technical Standardisation for trustworthy and sustainable ICT, Construction, and Aerospace" programme represents a strategic collaboration between More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
WOOD Consulting Services, Inc
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. • Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). • Experience developing on Windows, and/or Linux operating systems. • Must have documented professional experience with web services. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
the leaders in the secure financial transactions space. Qualifications What will make you successful Technical skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
TCP/IP PREFERRED QUALIFICATIONS - 2+ years of any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security experience - Experience with AWS products and services - Experience with programming languages such as Python, Java, C++ Acknowledgement of country: In More ❯
SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
Government (Azure-Gov) and Amazon Web Services Government (AWS-G). Responsible for assessing and facilitating network requests: including firewall policies, VPN, load balancing, cryptography, and network architecture. Design and implement security-first network policies and procedures to adhere with NIST 800.171 and CMMC compliance regulations. Communicates effectively with end More ❯