The Sponsor requires Cyber Security Project Engineering support to ensure the maintenance of cyber security compliance... in ensuring that the project's systems and infrastructure are designed and implemented with security in mind, and that they meet...
/security/other applicable policies, advising the Sponsor on risk mitigation to ensure future policy compliance, and adherence... with Sponsor security directives and regulations and consistent with ICD 503, FISMA, and all other legal and technical compliance...
of responsive and scalable applications that comply with security and industry standards. Requirements: U.S Citizenship... methodologies. Strong understanding of security best practices and regulations (e.g., FedRAMP, HIPAA). Excellent problem...
, change management, monitoring, security, emergency response, and capacity planning. The Contractor shall apply, develop..., and security processes. The Contractor shall develop analytical software packages, pipelines, and custom virtual environments...
, Math, or Physics U.S. Citizenship Required for the purposes of obtaining/holding a U.S. security clearance Ability...
. Our systems are used for interest rate and credit risk management, investment analysis and trading, security issuance, automated.... Fixing software security vulnerabilities identified in SAST and FOSS scanning. Code review and guiding junior level...
, Math, or Physics U.S. Citizenship Required for the purposes of obtaining/holding a U.S. security clearance Ability...
security clearance Per the U.S. Government’s eligibility requirements, you must be a U.S Citizen to be considered... for a security clearance Applicable work experience related to Autonomy and AI. Understand autonomous systems across different...
development opportunities Exposure to real-world SaaS security, compliance, and risk management challenges Inclusive, mission...
contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday... a security clearance at the TS/SCI w/CI Poly level. Applicants must have the ability to obtain and maintain a U.S. government...
contracts with the U.S. Federal Government which, due to federal government security requirements, mandates that all Workday... a security clearance at the TS/SCI w/CI Poly level. Applicants must have the ability to obtain and maintain a U.S. government...
, and security. Automate and optimize: Automate infrastructure provisioning, configuration management, and application deployments...-related issues, working closely with development teams to resolve problems. Security and compliance: Implement and maintain...
Job Family: IT Cyber Security Travel Required: None Clearance Required: Ability to Obtain NACI... Ops Professional Certification An ACTIVE and CURRENT SECRET federal or DOD security clearance...
innovative, technology-enabled solutions to our customers across defense, civilian, and homeland security sectors. Our teams work... for logical and physical separation. Identifies security and connectivity requirements for separated environments. Provides cost...
against adversary intent, and evaluate cyber security processes to protect and defend against our adversaries. Requirements... Required Demonstrated experience analyzing IT systems for cyber security vulnerabilities. Demonstrated experience developing IT system...
security and trust of U.S. currency and financial services. Roles & Responsibilities: Understand and apply system...
with industry standard technologies such as Databases, Active Directory, Security/Web APIs, Ping, Snowflake, Dremio... by executing against policies and procedures and adhering to privacy & security obligations as required via training programs...
a security clearance Experience with programming in languages such as Python, Java, C++, or C Familiarity with operational...
technologies in core areas such as: Enterprise Network Engineering Network Security Network Modeling and Simulation IT Service... service delivery processes. Risk Analysis: Conduct cybersecurity risk analysis on proposed designs, evaluate security...
, Information Security tools such as HashiCorp Vault and CyberArk for Credentials Management Understanding of the Software... exercise this responsibility by executing against policies and procedures and adhering to privacy & security obligations...