Industrial Cybersecurity Consultant. Our client, a global Architecture and Design Firm, is looking to hire an Industrial Cybersecurity Consultant to join their IT Consulting team in Amarillo, TX OR Kansas City MO. The Industrial Cybersecurity Consultant will support cybersecurity programs at clie...
As a Cryptologic Technician Interpretive (CTI) you're more than a linguist-you're a cultural expert, able to translate and interpret foreign communications. Cryptologic Technicians Interpretive can expect a clean, comfortable office-type or small technical laboratory-type environment while on sho...
Obtain and analyze financial information on current and potential customers across all Medline core business units.Determine the degree of risk involved for credit authorization while maximizing the opportunity to garner sales and collateralization.Conduct comprehensive analysis of customer's fin...
Contribute technically to store remodeling and new store construction projects. * Install TVs, Raspberry Pis, and media players for Ads and Menu TVs. * Thoroughly document processes in OneNote and ...
Deploy monitoring and logging tools (Prometheus, Grafana, ELK Stack, AWS CloudWatch) to ensure ... Herring Bank is an equal opportunity employer committed to data excellence. This is a remote ...
Bachelor's degree in a technical field, e.g., (Cybersecurity, Industrial Cybersecurity, Industrial Cyber Engineering, Cyber-Physical System Security, Computer Science or Information Systems, Computer ...
Pay, benefits, Human Resources, and Employment Management functions are provided by AIS.Qualified applicants must be a US citizen, at least 18 years of age, and able to meet pre-employment ...
Employers want to know
Do you have experience as a Information Technology?
Directs and utilizes project team resources to successfully deliver assigned projects within agreed upon constraints (e.g., scope, schedule, labor cost, and quality). Participates with project teams ...
Adheres to security and quality standards when designing/developing solutions. * Troubleshoots, debugs and resolves issues * Has working knowledge of relational databases such as SQL server * Relies ...
Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs. ...
Akima Infrastructure Services, LLC (AIS), is actively seeking Engineering, Professional, Technical, and administrative personnel as part of our staff augmentation team supporting the Department of Energy at the Y‑12 National Security Complex located in Oak Ridge, Tennessee and the Pantex Plant lo...
Akima Infrastructure Services, LLC (AIS), is actively seeking Engineering, Professional, Technical, and administrative support personnel as part of our staff augmentation team supporting the Department of Energy at the Y‑12 National Security Complex located in Oak Ridge, Tennessee and the Pantex ...
Designs, documents, tests, and modifies current and new software development applications; reviews requirements documents and helps to develop solutions in order to meet these requirements; Contributes to shaping the architecture and technical design for both the broader software product area(s) ...
Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vettin...
PhD in a technical field with limited experience or Master’s degree in a technical field and 2 to 5 years of related experience or Bachelor’s degree in a technical field and 5 to 10 years of related experience or Associates degree in a technical field and 10 to 15 years of related experience.Inst...
GEM) is seeking a Cyber Security Technical Writer to join our team. Ability to present administrative, technical, and operational information clearly and effectively through the oral and written word as well as diagrams and charts. Coordinating and ensuring technical requirements of cyber securit...
We enable employees to craft their career with curated development plans that set their learning path to a rewarding and fulfilling career. ...
PhD in a technical field with limited experience or Master’s degree in a technical field and 2 to 5 years of related experience or Bachelor’s degree in a technical field and 5 to 10 years of related experience or Associates degree in a technical field and 10 to 15 years of related experience.Uses...
Software Engineer IIIs design, code, test, and debugs programs; maintain and document program changes. Demonstrates expertise and elevated knowledge of Software Engineering skills and emerging technologies. Provides coaching and mentorship to less experienced Software Engineers. ...
PhD in a technical field with limited experience or Master’s degree in a technical field and 2 to 5 years of related experience or Bachelor’s degree in a technical field and 5 to 10 years of related experience or Associates degree in a technical field and 10 to 15 years of related experience.EGRC...
Coordinating and ensuring technical requirements of cyber security are appropriately documented and integrated into the overall site security efforts. Ability to develop and update cybersecurity policy documents, system security plans, baselines and threat models for deployment and risk acceptanc...
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle. ...