Previous experience working at Federal facilities, especially Coast Guard, is a plus.The position.. U.S. citizenship is required, and you must be able to obtain and maintain a security clearance..
Overview Lead Transportation Security Officer Open & closing dates 04 19 2024 to 05 03 2024 Pay scale.. At the Transportation Security Administration, you will serve in a high stakes environment to safeguard..
Description. JOB SUMMARYThis job directs and manages Information Security and Risk Management (ISRM.. Provides leadership to the Organization's Information Security programs, including developing and..
Description. JOB SUMMARYThe Principal Information Security Architect. Enterprise Technology serves as.. The role functions as a premier enterprise information security futurist and subject matter expert and..
Transparency to the business on upcoming security initiatives, identifying impact to the business and to.. Information Security organizationLICENSES or CERTIFICATIONSRequiredNonePreferredPMPCISSPSKILLSChange..
Three years GMD program experience. Potentially requires one week per quarter remote travel. This position requires the ability to obtain a US Security Clearance for which the US Government..
Job DescriptionThe Remote Security Officer provides services for a variety of large and small business.. NMS' vehicle insurance policy.Must be able to obtain and pay the Alaska Guard License fee of. 97..
Must obtain and maintain any necessary security access and or background checks. DESIRED QUALIFICATIONS & SKILLS DOD contracting experience. Deltek Costpoint, Costpoint Reporting, WAWF and IPP..
The 2 3 person crew (2 surveyors and 1 bear guard) will live in oilfield facilities and interact with.. citizen applicants must have (or obtain) a social security numberApplication Process Interested..
Wilderness First Aid training is preferred. Non U.S. citizen applicants must have (or obtain) a social security number. Application Process Interested candidates who meet the above..
Canada, Russia, and the United States. Our work is closely tied with food security needs, and often co produced with Indigenous partners. Current focal areas include marine mammals and shipping..
They demonstrate advanced project management security guidance and are able to track identified risks.. Bachelor's Degree in CS, MIS, Information Security, EE, Business or related field Or equivalent educ..
Security Engineers are also responsible for researching, evaluating, and designing technical security.. providing technical security assessment support. developing, maintaining, and monitoring an effective..
Active Directory Engineers (Security Engineers) are responsible for the maintenance, support, and.. developing, maintaining, and monitoring the service in adherence with the Information Security program..
Description. Summary This position is responsible for combination of security design and implementation.. This position will be the technical SME security resource to multiple Arrow teams for functionality..
System recovery when necessary. Support of corporate security standards for mobile devices (Microsoft.. M365. Email, SharePoint, OneDrive, Teams, Security, ATP, Windows Defender, Conditional Access Controls..
Apply MS PowerBI across the enterprise. Build New solutions for reporting and analytics, including model development, data visualizations, security and governance. Gather and analyze business..
In case of a security incident, the System Administrator assists Security in investigating the incident.. Monitors and reviews security audit logs. Also, this candidate will serve as the point of contact to for..
Provide software and system troubleshooting and support, backup and recovery. CompTIA Security.. Must be a United States citizen and possess an active SECRET security clearance (adjudicated within the..
You will be responsible for the security and integrity of our systems that keep our jets flying.It takes more than steel, advanced electronics and engine thrust to make the F 35 Lightning II..
Li. li Security and Compliance. Implement security best practices and measures to safeguard backend.. li. li Understanding of security principles, authentication, and authorization mechanisms in AWS. li..
We need professionals experienced in network security, computer science and software engineering to prevent cybercrimes, data theft, ransomware and other attacks to our national security..
We need professionals experienced in network security, computer science and software engineering to prevent cybercrimes, data theft, ransomware and other attacks to our national security..
We need professionals experienced in network security, computer science and software engineering to prevent cybercrimes, data theft, ransomware and other attacks to our national security..
Leads the identification and definition of Java applications architectures, components and interfaces, design of data model, data information flows and security design.Provides practical, expert..