and threat intelligence. Understanding of OT and IT assets, technologies, and security best practices within the current threat landscape. Deep knowledge of network protocols, cryptography, vulnerabilities, and attack vectors used by sophisticated threat actors. Proficiency with a range of penetration testing tools and methodologies, especially those related to threat analysis. More ❯
to remain in a stationary position 50% Desired: Experience with database and web server security Familiarity with cross-domain solutions and COTS/GOTS cryptography Strong communication and teamwork skills This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within More ❯
in network management and experience directly performing configurations and security implementation on LAN and WAN equipment. Certifications addressing system security, network infrastructure, access control, cryptography, assessments and audits, and organizational security. Active Secret clearance or eligible to obtain a Secret clearance. Desired Skills: Experience holding a leadership position. Implementing, maintaining More ❯
protocols over USB, RS232, LAN, and wireless interfaces. Knowledge of established coding standards i.e. MISRA-C Experience with GUI development using Qt Familiarity with cryptography, DS101/102 protocols, key fill, Type 1 certified products, and secure networking is highly desirable Experience with KMI/EKMS, ACES, Key Loader Devices More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM Formulate systems and methodologies as well as respond to security related events and assist in remediation efforts of cyber More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The successful candidate will join the SIGCOM Research Group, led by Prof. Symeon Chatzinotas. Additionally More ❯
interfaces. Desired: Cross compilation, compilation frameworks, remote debugging Knowledge of established coding standards i.e. MISRA-C Experience with GUI development using Qt Familiarity with cryptography, DS101/102 protocols, key fill, Type 1 certified products, and secure networking is highly desirable Experience with KMI/EKMS, ACES, Key Loader Devices More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
expert in the development of systems and equipment that protect classified National Security information. • S/he will be responsible for applying security and cryptography expertise throughout the Systems Engineering process to develop and successfully certify National Security systems on time, within the allotted budget, and with low residual risk. More ❯
or similar object oriented language PREFERRED QUALIFICATIONS - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ - Experience applying threat modeling or other risk identification techniques or equivalent More ❯
expand new business. Familiarity with building or securing embedded devices, other digital systems, and embedded binary reverse engineering (ARM, RTOS, etc.) Familiarity with basic cryptography design and implementation concepts Previous experience in a client-facing technical role Security Clearance: Active US Security clearance of Top Secret level and ability to More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. About the role The successful candidates are expected to perform the following tasks: Work on project-relevant More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT. Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with web services. Must More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. Your role The SnT Automation & Robotics Research Group is hiring a motivated PhD candidate for the bi More ❯
for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services & Applications. SnT carries out interdisciplinary research in secure, reliable and trustworthy ICT (Information and Communication Technologies) systems and More ❯
SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography including encryption, signing and digital certificates Principles of securing mobile applications and web services Docker or Kubernetes and infrastructure as code Event driven streaming technologies More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Base-2 Solutions, LLC
of the following: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off the-shelf and government off-the shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; Education and experience Bachelors degree (technical More ❯
XML, XSLT. Must have experience with software source control and configuration management tools. Must have experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures). Must have experience developing on Windows, and/or Linux operating systems. Must have documented professional experience with More ❯
the C&L Team include: Weapon system command & control (e.g., missile crew launch console and command data processing equipment, etc.) ICBM nuclear codes/cryptography (i.e., securing the nuclear launch codes and assuring confidentiality, integrity, and authenticity of the critical commands) ICBM targeting (i.e., weapon system processing of the strategic More ❯
Anduril Industries is a defense technology company with a mission to transform U.S. and allied military capabilities with advanced technology. By bringing the expertise, technology, and business model of the 21st century's most innovative companies to the defense industry More ❯