Key Management Specialist Annapolis Junction, MD Position Clearance TS/SCI FS Poly
Listed on 2025-12-27
-
IT/Tech
Cybersecurity, Data Security, Information Security
Key Management Specialist LOCATION
Chantilly, VA 20151
CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship)
KEY SUMMARYWe are looking for a highly organized and security-focused Key Management Specialist to oversee the lifecycle and protection of cryptographic keys within our organization. In this role, you will be responsible for implementing and maintaining secure key management practices, ensuring compliance with industry standards, and supporting the integrity of encryption-based systems. The ideal candidate is a meticulous problem-solver with a deep understanding of cryptographic principles and a passion for safeguarding sensitive data.
If you thrive in a dynamic environment and are ready to contribute to a secure operational framework, we encourage you to apply.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals.
We look forward to you joining our family. ***
Cryptographic Key Manager, Encryption Specialist, Data Protection Analyst, Information Security Specialist, Cybersecurity Analyst, Cryptography Engineer, Security Operations Specialist, Key Access Control Analyst, Identity and Access Management Specialist, IT Security Specialist, Secure Communications Analyst, Data Security Engineer, Network Security Specialist, Key Lifecycle Manager, Digital Security Specialist, Compliance and Risk Analyst, Secure Storage Engineer, Threat Intelligence Analyst, Security Systems Administrator, etc.
DEGREE (Level Desired)Bachelor's Degree
DEGREE (Focus)Cybersecurity, Computer Science, Information Technology, Information Systems, Computer Engineering, Network Engineering, Data Science, Information Assurance, Cryptography, Security Management, Telecommunications, Applied Mathematics, Systems Engineering, Digital Forensics, Software Engineering, Risk Management, Artificial Intelligence, Secure Communications, Compliance and Regulatory Affairs, Electrical Engineering, etc.
ALTERNATE EXPERIENCEGeneral comment on degrees:
Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.
- Implement and maintain cryptographic key management systems
- Monitor and manage the lifecycle of encryption keys
- Ensure compliance with cryptographic policies and standards
- Conduct regular audits of key usage and storage practices
- Develop and enforce secure key distribution protocols
- Respond to security incidents involving cryptographic systems
- Proficiency in cryptographic algorithms and key generation techniques
- Familiarity with key management tools and platforms (e.g., HSMs)
- Strong knowledge of encryption standards (e.g., AES, RSA)
- Ability to troubleshoot and resolve cryptographic system issues
- Experience with certificate management and public key infrastructure (PKI)
- Understanding of secure storage and transmission protocols
- Familiarity with cloud-based encryption and key management solutions
- Experience with automated key rotation and renewal processes
- Knowledge of regulatory compliance frameworks (e.g., FIPS, GDPR)
- Understanding of quantum-resistant cryptography
- Strong documentation and reporting skills
- Ability to train and mentor teams on cryptographic best practices
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company,…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).