- Deloitte (Washington, DC)
- …and/or Oracle Identity Cloud Service (IDCS) + Knowledge/experience in data protection tools and techniques + Oracle Risk Management Cloud Certified ... a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber...to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing… more
- Deloitte (Washington, DC)
- …and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of ... cyber risk solutions. Learn more about Deloitte...Sign-on (SSO) and Multi-factored authentication (MFA) + Knowledge/experience in data protection tools and techniques + Knowledge/experience… more
- CareFirst (Washington, DC)
- …explain technical information to technical and nontechnical personnel. + Knowledge of cyber security related risk management techniques. + Knowledge of network ... **Resp & Qualifications** **PURPOSE:** To ensure the organization's data remains protected from inappropriate access, disclosure and/or damage. To advocate for and… more
- RELX INC (Annapolis, MD)
- …users make breakthroughs and drive societal progress. Are you looking for a unique Cyber Security role whereby you will provide key insight and research into new ... Responsibilities: + Helping improve the resilience and readiness of security protection and mitigation technologies and processes which ensure the confidentiality,… more
- ABBTECH Professional Resources, Inc. (Wheaton, MD)
- …Cybersecurity Lead will oversee the organization's cybersecurity initiatives and ensure the protection of networks, systems, and data . The successful candidate ... and monitor a strategic, comprehensive enterprise information security and IT risk management program. + Lead the enterprise's information security organization,… more
- Deloitte (Baltimore, MD)
- …secure and support technology innovation required by the business. Join Deloitte's Advisory Cloud Cyber Risk Services team and become a member of the largest ... group of Cyber Risk individuals worldwide. Microsoft is an...control, auditing and monitoring, security incident and event management, data protection (classification/labeling, DLP, encryption), user and… more
- Concurrent Technologies Corporation (Columbia, MD)
- …enclave environments to include those with multiple enclaves and with differing data protection /classification requirements. Builds IA into systems deployed to ... relies on effective acquisition, preser-vation, and timely reporting of cyber incident data . + Cyber ...program life cycle. Contributes to the security planning, assessment, risk analysis, risk management, certification and awareness… more
- Deloitte (Washington, DC)
- …and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data ; and Application Security. Our dynamic team offers opportunities… more
- Proofpoint (Maryland City, MD)
- …threats, safeguard their data , and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the ... expert in Email Security Gateways, Advanced Persistent Threats, Attack Protection , Threat Response, Data Loss Prevention (DLP),...and shadow IT monitoring + IT security, vulnerability or risk assessments, and policy enforcement + Data … more
- Trellix (Columbia, MD)
- …cyber threat intelligence capabilities by leveraging the experience, knowledge, tools, and data of the Trellix cyber defense enterprise. The role is ... organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems....leading the next evolution of national defense - the data evolution - by accelerating a breadth of national… more
- Lockheed Martin (Fort Meade, MD)
- …designs that encompass multiple enclaves, to include those with differing data protection /classification requirements * Recommend system\-level solutions to ... management * Identify overall security requirements for the proper handling of Government data * Provide security planning, assessment, risk analysis, and … more
- Robert Half (Washington, DC)
- …Knowledge of security-related topics such as authentication, entitlements, identity management, data protection , data leakage prevention, validation ... take necessary corrective steps in real-life situations. Additionally, this team offers data privacy and protection services to safeguard personal information,… more
- SMX (Fort Meade, MD)
- …response investigations, and implementing measures to protect systems against cyber threats. The ISSO assesses cybersecurity threats, conducts threat intelligence ... posture. The ISSO provides guidance and ensures compliance with DoD Risk Management Framework (RMF) processes and manages eMASS authorization records, validates… more
- SMX (Washington, DC)
- …and domestic antiterrorism, defense critical infrastructure, fire prevention and protection , munitions operations risk management, Chemical Biological ... in DoD and Service Prescribing directives to support identification, assessment, risk management, and monitoring of military service strategic assets. **This… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems....leading the next evolution of national defense - the data evolution - by accelerating a breadth of national… more
- Guidehouse (Washington, DC)
- …Project examples include _IT strategy and implementation projects; cybersecurity and data protection strategy and implementation projects; data ... **Job Family** **:** Cyber Consulting, Risk & Regulatory Compliance...a catalyst for transformational change or protecting critical systems, data and assets. **Senior Cybersecurity Analyst** have responsibility for… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems....leading the next evolution of national defense - the data evolution - by accelerating a breadth of national… more
- Bank of America (Washington, DC)
- …security innovation and architecture, engineering, solutions and capabilities development, cyber resiliency, access management engineering, data strategy, ... Teammates in this role deliver moderately complex tools and systems that mitigate the risk of malicious cyber -attacks. Individuals in this role contribute to the… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government… more