- ManTech (Linthicum Heights, MD)
- ManTech is seeking a motivated, career and customer-oriented ** Cryptographic Vulnerability Analyst ** to join our team in the **Linthicum** location and will ... be part of a team that provides Cybersecurity Analysis and Cryptographic Engineering technical expertise. **Responsibilities include, but are not limited to:** +… more
- ABBTECH Professional Resources, Inc. (Columbia, MD)
- …projects. General security analysis Design work (product architecture) Vulnerability testing Physical security testing System-level logical analysis Product ... evaluations against Technology Type standards (Protection Profiles) Cryptographic and Public Key Infrastructure (PKI) testing Cryptographic algorithm testing… more
- Hawaiian Electric (Honolulu, HI)
- Information Assurance Analyst - Oahu Date:Jan 5, 2025 Location: Honolulu, Hawaii (HI), US, 96840 Company: hawaiianel We recognize our competitive advantage -- our ... management for privacy, e-discovery, security awareness training, digital forensics, vulnerability remediation, and other security and compliance programs. +… more
- Volvo Group (Greensboro, NC)
- Cyber Defense Threat Specialist (Sr. SOC Analyst ) Location: Greensboro, NC, US, 27409 Position Type: Professional Transport is at the core of modern society. Imagine ... Threat Specialist within the Global Cybersecurity Operations Center (CSOC) Analyst you will play a crucial role as a...SANS Critical Security controls + Working knowledge in modern cryptographic algorithms and systems + Experience working with and… more
- Leidos (Bethesda, MD)
- …opportunity for a **Technical Security and Signals Countermeasures (TSSC) Support Analyst ** in our **National Security Sector's (NSS) Cyber & Analytics Business ... Mission Software, Analytical Methods and Modeling, Signals Intelligence (SIGINT), and Cryptographic Key Management. At **Leidos** , we offer **competitive benefits**… more
- TEKsystems (Nashville, TN)
- …as required. Skills Active directory, Iam, Identity access management, Vulnerability management, Sql, Project management, Requirements gathering, Access, Incident ... requirements Top Skills Details Active directory, IAM, Identity access Management, Vulnerability management Additional Skills & Qualifications * 5+ years of… more
- ABBTECH Professional Resources, Inc. (Columbia, MD)
- …- Knowledge of FIPS 140 requirements - Knowledge of cryptographic encryption algorithms, key exchange algorithms, hashing/message authentication algorithms, PKI, ... of entropy sources. - Knowledge of OpenSSL and/or OpenPGP. - Vulnerability Analysis and/or penetration testing experience/expertise. - Strong knowledge of computer… more
- MIT Lincoln Laboratory (Lexington, MA)
- …years of work experience + Experience reverse engineering or performing vulnerability assessments of control systems + Proficient at high-level programming languages ... tools + Familiarity with any of the following security areas: + Basic cryptographic principles and their practical application (eg, ECC, RSA, JWT) + Penetration… more