. Architect and implement cryptography-based security features, including but not limited to: Data encryption, Protection... transition to post-quantum cryptography algorithms for Micron products to ensure they meet emerging security standards. Integrate...
ROM firmware for embedded systems and SoCs. Develop and maintain secure boot flows, including post-quantum cryptography... of cryptographic algorithms and protocols, including post-quantum cryptography (PQC). Experience with threat modeling, attestation...
, and Cryptography expertise, with demonstrated success contributing to NSA-approved products considered highly desirable. Essential... Functions: Applies security and cryptography expertise throughout the Systems Engineering lifecycle to develop...
L3Harris Technologies ⚡ $104500 - 193500 per year ⚡ Fri, 10 Apr 2026 02:58:02 GMT
activities across the system lifecycle, applying expertise in IA principles, cryptography, authentication, authorization... lifecycle processes Cross-domain solutions COTS/GOTS cryptography Identification, authentication, authorization Risk...
Columbia Technology Partners ⚡⚡ Thu, 09 Apr 2026 22:54:45 GMT
/cryptography standards, protocols and best practices Strong knowledge on analyzing malicious payloads (malware/spyware... from others. Security Incident Handling and Response and Threat Management Encryption/cryptography standards, protocols, and best practices...
Staffing Solutions USA ⚡ $100000 - 125000 per year ⚡ Thu, 09 Apr 2026 07:27:03 GMT
Information Systems Security Manager (ISSM)
systems security programs, policies, procedures, and tools. Knowledge of cryptography and cryptographic key management...
Abacus Technology ⚡ ⚡ Sat, 11 Apr 2026 00:04:19 GMT