Get new jobs by email
- ...Exciting Remote Encryption Engineer (HSM), 6 months, contract opportunity. Requirements Experience with deploying encryption manager on VMware, Hypervisor, Azure, AWS, Google Cloud environments Experience in HSM, Luna, Ciphertrust, ProtectDB, Protectapp....SuggestedContract workRemote work
- ...Title: Encryption/HSM Security Engineer Location: Seattle, WA Duration: 12 Months Rate: $Open Requirement: •Exciting HSM Security Engineer •Familiar with most of our HSM integrations, and specifically the ones used in Azure •Familiar...SuggestedContract work
$143k - $266k
...Principal, Business Development (Type-1 Encryption / DoD Capture) Camden, NJ or Washington, DC | Full-Time | $143,000 – $266,000 Lead strategic growth initiatives within NSA Type-1 Encryption programs supporting DoD and Intelligence Community customers...SuggestedFull timeContract workFor contractorsWork at officeVisa sponsorshipRelocation package- Sr. Analyst Information Security (CISSP, Risk Management, Network Security, encryption, communication protocols) in Waukegan, IL CISSP, encryption, Information Security, IT Risk Management, IT Security Operations, Network Security, penetration testing, vulnerability...SuggestedPermanent employmentFull timeContract workRemote work
$130k - $165k
...support for end-user devices o Gateway process development o Dual-domain subsystem and cross-domain solutions o Data-at-rest encryption This position is 100% onsite at Naval Air Station Patuxent River, located on the Chesapeake Bay in St. Mary's County,...Suggested- ...(FT) or nothing rather than the number of hours worked per week (e.g., 40, 30, 20, etc.) may be considered incomplete. Submitting encrypted documents or uploading Adobe portfolio documents. Submitting any document that contains a photo or image of you. Including social...SuggestedFull timePart timeRemote work
- ...members, visitors, or others. Company-approved technology only: All work must be performed on secure, company-issued devices using encrypted connections (VPN required). Other Responsibilities: This job description is not designed to cover or contain a comprehensive...SuggestedFull timeContract workWork at office
- ...) or nothing rather than the number of hours worked per week (e.g., 40, 30, 20, etc.) may be considered incomplete. Submitting encrypted documents or uploading Adobe portfolio documents. Submitting any document that contains a photo or image of you. Including social...SuggestedPermanent employmentFull timePart timeRemote workTrial period
- ...IDS/IPS, firewalls, and vulnerability scanning. Familiarity with cloud security (AWS, GCP, or Azure). Solid understanding of encryption, authentication, and authorization systems. Proven track record of securing distributed, high-scale environments. Strong...SuggestedFor contractors
- ...your work schedule. If you fail to provide this information in your resume, your resume will be considered as incomplete. Submitting encrypted documents or uploading Adobe portfolio documents. Submitting any document that contains a photo or image of you. Including social...SuggestedFull timePart timeWork at officeRemote workRelocation package
$118.5k - $170.5k
...using cryptographic signing to prevent unauthorized code execution. Design secure truck‑to‑cloud interfaces utilizing end‑to‑end encryption and robust mutual authentication. Qualifications: Minimum of 3 years in cybersecurity, specifically focusing on product...SuggestedWork at officeWork from homeFlexible hours- ...Data Governance & Security: Establish and enforce data governance frameworks, quality standards, and security measures (e.g., encryption, access controls) to ensure data integrity, privacy, and compliance with regulations (GDPR, HIPAA, CCPA, etc.). Performance Optimization...Suggested
- ...audits. Proficiency with security tools and technologies, such as firewalls, IDS/IPS, vulnerability scanners, WAF, SIEM, and encryption solutions. Demonstrated ability to influence security strategies and drive improvements within a team. The team goes into the...SuggestedWork at office
- ...data pipeline metrics, and automated validation checks. Implement security best practices in data architecture including IAM, encryption (KMS), row/column‑level security, PII handling, data masking, and regulatory compliance controls. Familiar with version‑...Suggested
- ...recommendations for reducing expenses. Security and Compliance: Implement cloud security best practices, including access control, encryption, and compliance with industry standards (e.g., GDPR, ISO 27001). Conduct periodic audits to identify vulnerabilities and...SuggestedFlexible hours
- ...design, and containerization (Docker, Kubernetes). Strong understanding of security best practices, identity management, and encryption techniques . Ability to evaluate trade-offs in architectural decisions, balancing scalability, cost, and complexity....Temporary workWorldwideHome office
- ...the preparation, review, and maintenance of key logistics documentation for SATCOM ground terminals, modems, routers, switches, encryption and related equipment. Responsibilities Supply chain management - manage and track levels of critical DATCOM components...
- ...work schedule. If you fail to provide this information in your resume, your resume may be considered as incomplete. Submitting encrypted documents or uploading Adobe portfolio documents. Submitting any document that contains a photo or image of you. Including social...Full timePart time
$140k - $175k
...to remediate vulnerabilities and track patch compliance. Email & Data Security Configure Exchange Online transport rules (encryption, forwarding, malicious forwarding detection). Evaluate and propose new email security options. Monitor SaaS-specific alerts...Work at officeLocal area- ...Works with Portfolio technology leaders to include IT Risk and Security Exception initiatives in portfolio roadmap Manage Encryption Standards: key management, tokenization for payments, DLP/classification/handling ; architect PCI DSS segmentation boundaries and...Work at officeMonday to Friday
$85k - $105k
...Clearance: Top Secret/SCI with potential for higher read-ins. ~ CSSP Infrastructure Support certification desired ~ Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE],...Full timeShift work- ...applications, services, and frameworks, ensuring seamless data exchange. • Ensure data security and integrity: Implement data encryption, access controls, and backup strategies to ensure data security and integrity. • Troubleshoot and optimize performance: Identify...Full timeImmediate start
- ...Grafana/Influx DB dashboards, alerting and runbooks; Security/compliance: least-privilege IAM, Secrets Manager/Parameter Store, KMS encryption, audit logging; Right-sizing/auto-scaling; Code reviews, internal docs/presentations; Containers & Orchestration: Docker; Linux...Local areaRemote workWork from homeFlexible hours
- ...architectures including the integration of identity & access management, intrusion detection and prevention, security monitoring, and data encryption solutions. Working familiarity with REST API and microservices architecture Technical understanding of virtualization,...Full timeWork experience placementWork at officeRemote workFlexible hours
$125k
...delivery * Familiarity with DevSecOps practices: vulnerability scanning, dependency management, secure coding, secrets management, encryption * Experience with Infrastructure as Code (e.g. Terraform, CloudFormation, Azure Resource Manager). * Proficiency with APIs /...- ..., solve and correct issues in real-time, providing problem resolution end-to-end Maintain highest levels of data security and encryption Provide clean, tested code and follow fluid release processes based on client needs Support and prioritize multiple ongoing...Remote jobFull timeMonday to Friday
$85 per hour
...building RESTful/GraphQL APIs * Experience with data warehousing for reporting * Experience with AWS security tools (e.g., KMS for encryption, GuardDuty) and infrastructure-as-code (e.g., Terraform, CloudFormation) to ensure compliant, scalable deployments Scope: * 20%...Contract work$160k - $210k
..., Intelsat, et. al.) and delay-tolerant networks · Familiarity with networking protocol stacks · Familiarity with NSA Type 1 encryption, especially high-assurance IP encryption (HAIPE) devices · Working knowledge or experience with military networking systems and...Full timeWork at officeShift work$100k
...backend services using Retrofit and Ok * Experience with secure coding practices including OAuth 2.0/OIDC, biometric authentication, encrypted storage (EncryptedSharedPreferences), and certificate pinning * Experience working with Firebase (push notifications via FCM,...Contract workRemote work- ...networking, with strong Cisco switches/routers experience • Deep knowledge of: IP, OSPF, BGP, EIGRP, MPLS, stateful firewalls, and encryption technologies • Working knowledge of network management and troubleshooting tools (e.g., Wireshark, Riverbed, Micro Focus...Contract workFor contractors

