and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science More ❯
of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols. PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services particularly: VPC IAM Security Group Management EBS Outposts Amazon is an equal opportunities More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
the following to: system security design process; engineering life cycle; information domain; cross domain solutions; commercial off-the-shelf and government off-the-shelf cryptography; identification; authentication; and authorization; system integration; risk management; intrusion detection; contingency planning; incident handling; configuration control; change management; auditing; certification and accreditation process; principles of More ❯
National Telecommunications and Information Administration (NTIA and commercial (Federal Communications Commission (FCC frequency registration and approval process International Telecommunications Union (ITU) frequency allocation rules Cryptography implementation and Information Assurance accreditation Desired Skills/Qualifications M.S. Physics, Electrical Engineering, Mathematics or related discipline FTS International, LLC is an Equal Opportunity Employer More ❯
response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
knowledge of databases and structures, and/or experience working with JSON, HTML, XML, XSLT Experience with technologies underlying cryptographic systems (symmetric and asymmetric cryptography, ASN.1 encoding, XML canonicalization, digital signatures) Experience developing on windows, and/or linux operating systems Must have documented professional experience with web services Must More ❯
for Information Assurance Services (Confidentiality, Integrity, Nonrepudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary). Required Skills/Abilities: Excellent verbal and written communication skills. Excellent interpersonal, negotiation, and conflict resolution skills. Excellent organizational skills and attention to More ❯
Android, and iOS. Familiarity with network principles, IP protocols, and virtualization/emulation tools. Experience developing proof-of-concept exploits, firmware dumping, and basic cryptography knowledge. Proficiency with communication and network protocols, hardware bus protocols, and security tools and techniques. If you are enthusiastic about pushing the boundaries of cybersecurity More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.). Responsibilities include, but are not limited to: Responsible for developing comprehensive SOA solutions. Will More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
QUALIFICATIONS Experience with AWS products and services Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
and Python These Qualifications Would be Nice to Have: React Experience with relational, noSQL, and file-based storage products Experience with Java Security and Cryptology (PKI Certificates) Understanding of Amazon Web Services Experience with software configuration management processes and tools Knowledge of Intelligence Community (IC) processes, policies and guidance Experience More ❯
San Antonio, Texas, United States Hybrid / WFH Options
Kudu Dynamics, LLC
stack applications Experience with automated testing frameworks Experience with Python Experience with setting up Man in the Middle proxies to instrument applications Background in cryptography, privacy, virtual private networking, distributed computing protocols Experience in commonly used communications protocols such as TCP, UDP, HTTPS, TLS Experience evaluating open-source code for More ❯
to Focus On: Programming languages like Python, Java, C++, Linux scripting Network and application security knowledge Familiarity with security assessment tools Threat modeling and cryptography skills Knowledge of operating systems (Windows, Linux, macOS) Experience with penetration testing frameworks and tools Highly Valued Certifications: OSCE (Offensive Security Certified Professional) OSCP (Online More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.) Ultimate responsibility for the technical integrity of work performed and deliverables associated with the Systems More ❯
a lab setting. Work efficiently both individually and as a team. Desired: An active DoD TS/SCI clearance. OSCP or equivalent certification. Basic cryptography knowledge. Basic programming/scripting experience (Python, Java, C/C++, bash). Code analysis and reverse engineering experience. Familiarity with COTS/GOTS radios More ❯
QUALIFICATIONS - Experience with AWS products and services - Experience with any combination of the following: threat modeling, secure coding, identity management and authentication, software development, cryptography, system administration and network security - Experience with programming languages such as Python, Java, C++ Amazon is an equal opportunities employer. We believe passionately that employing More ❯
modification Experience with network stack development, mesh networking, or tactical handheld radios Experience with the Rust programming language Practical knowledge of symmetric and asymmetric cryptography in software, such as working with OpenSSL or other cryptographic libraries Knowledge of cryptographic systems for vulnerabilities and attack vectors including security proofs, cryptanalysis techniques More ❯
Experience with secure coding practices and code review methodologies. • Familiarity with static and dynamic application security testing tools. • Strong understanding of encryption algorithms and cryptography standards. • Familiarity with version control systems (e.g., Git, SVN) and CI/CD pipeline integration. • Experience with security frameworks and industry best practices (e.g., NIST More ❯
Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic lnforrnation Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords cryptography, discretionary acces control, mandatory access control , hashing, key management, etc.) - Implement comprehensive SOA solutions - Implement operational. view, technical standards view, and system and service view More ❯