- Deloitte (Washington, DC)
- …and/or Oracle Identity Cloud Service (IDCS) + Knowledge/experience in data protection tools and techniques + Oracle Risk Management Cloud Certified ... a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber...to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing… more
- Deloitte (Washington, DC)
- …and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of ... cyber risk solutions. Learn more about Deloitte...Sign-on (SSO) and Multi-factored authentication (MFA) + Knowledge/experience in data protection tools and techniques + Knowledge/experience… more
- CareFirst (Washington, DC)
- …explain technical information to technical and nontechnical personnel. + Knowledge of cyber security related risk management techniques. + Knowledge of network ... **Resp & Qualifications** **PURPOSE:** To ensure the organization's data remains protected from inappropriate access, disclosure and/or damage. To advocate for and… more
- Highmark Health (Annapolis, MD)
- …provides information security and risk management services with a focus on data protection . The position leads a team of application and infrastructure ... CSF), or the NIST 800-83 cyber security framework + Experience with data protection technologies like Purview DLP, Symantec, Forcepoint, BigID, Varonis, IBM… more
- RELX INC (Annapolis, MD)
- …users make breakthroughs and drive societal progress. Are you looking for a unique Cyber Security role whereby you will provide key insight and research into new ... Responsibilities: + Helping improve the resilience and readiness of security protection and mitigation technologies and processes which ensure the confidentiality,… more
- Deloitte (Washington, DC)
- …and mitigating major cyberattacks. If you're seeking a career that increases cyber awareness, utilizes risk management programs, and develops strategies for ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data ; and Application Security. Our dynamic team offers opportunities… more
- Proofpoint (Maryland City, MD)
- …threats, safeguard their data , and make their users more resilient against cyber attacks. Leading organizations of all sizes, including more than half of the ... expert in Email Security Gateways, Advanced Persistent Threats, Attack Protection , Threat Response, Data Loss Prevention (DLP),...and shadow IT monitoring + IT security, vulnerability or risk assessments, and policy enforcement + Data … more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems....leading the next evolution of national defense - the data evolution - by accelerating a breadth of national… more
- Lockheed Martin (Fort Meade, MD)
- …designs that encompass multiple enclaves, to include those with differing data protection /classification requirements * Recommend system\-level solutions to ... management * Identify overall security requirements for the proper handling of Government data * Provide security planning, assessment, risk analysis, and … more
- Robert Half (Washington, DC)
- …Knowledge of security-related topics such as authentication, entitlements, identity management, data protection , data leakage prevention, validation ... take necessary corrective steps in real-life situations. Additionally, this team offers data privacy and protection services to safeguard personal information,… more
- SMX (Fort Meade, MD)
- …response investigations, and implementing measures to protect systems against cyber threats. The ISSO assesses cybersecurity threats, conducts threat intelligence ... posture. The ISSO provides guidance and ensures compliance with DoD Risk Management Framework (RMF) processes and manages eMASS authorization records, validates… more
- SMX (Washington, DC)
- …and domestic antiterrorism, defense critical infrastructure, fire prevention and protection , munitions operations risk management, Chemical Biological ... in DoD and Service Prescribing directives to support identification, assessment, risk management, and monitoring of military service strategic assets. **This… more
- Guidehouse (Washington, DC)
- …Project examples include _IT strategy and implementation projects; cybersecurity and data protection strategy and implementation projects; data ... **Job Family** **:** Cyber Consulting, Risk & Regulatory Compliance...a catalyst for transformational change or protecting critical systems, data and assets. **Senior Cybersecurity Analyst** have responsibility for… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems....leading the next evolution of national defense - the data evolution - by accelerating a breadth of national… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems....leading the next evolution of national defense - the data evolution - by accelerating a breadth of national… more
- Old Dominion Freight Line (Curtis Bay, MD)
- …security, cloud architecture, endpoint security, identity and access management, and data protection , while ensuring compliance with regulatory requirements and ... integrity, confidentiality, and availability of the organization's information systems and data . You will lead the development of cybersecurity strategies, provide… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …and commercial customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments to fleet sustainment, ... Mission Technologies is leading the next evolution of national defense - the data evolution - by accelerating a breadth of national security solutions for government… more
- CACI International (Annapolis Junction, MD)
- …designs that encompass multiple enclaves, to include those with differing data protection /classification requirements + Recommend system-level solutions to ... security requirements for processing classified information. You will perform vulnerability/ risk assessment analysis to support certification and accreditation. You… more
- Athenix Solutions Group, LLC (Annapolis Junction, MD)
- …enclave environments to include those with multiple enclaves and with differing data protection /classification requirements. + Building IA into systems deployed ... among external systems and architectures + Supporting security planning, assessment, risk analysis, and risk management + Identifying overall security… more
- CACI International (Annapolis Junction, MD)
- …enclave environments to include those with multiple enclaves and with differing data protection /classification requirements. You will build IA into systems ... designs that encompass multiple enclaves, to include those with differing data protection /classification requirements * Recommend system-level solutions to… more