Featured Job
-
Job Removed or Not Found
Related Jobs
- Home Depot (Houston, TX)
- …+ Patrol the GCC complex and investigates unusual occurrences. + Write incident reports on actual or potential loss and interview victims and witnesses. + Respond to
- Luke Staffing (Yuma, AZ)
- …US Customs & Border Protection is looking for bilingual caregivers, who will perform the duties and responsibilities for Unaccompanied Alien Children (UAC) and Family
- FM (Norwood, MA)
- …+ Monitor and patrol the buildings and grounds: Ensure there is no unauthorized activity taking place on the grounds or inside the building. + Address all emergencies
- Oregon State University (Corvallis, OR)
- …The Division of Research and Innovation is seeking an Export Control and Research Security Analyst. This is a full-time (1.00 FTE ), 12-month, professional faculty
- BWX Technologies, Inc. (Lynchburg, VA)
- …+ A bachelor's degree in Cybersecurity, Information Technology, or a related field is preferred; equivalent work experience may be considered. + At least 10 years of
- Xcel Energy (Monticello, MN)
- …Responsible for auditing nuclear security performance and recommending corrective actions to ensure Security Force compliance with the nuclear Security Plan, procedures,
- AeroVironment (Centreville, VA)
- …**Summary** The Information Systems Security Manager (ISSM) provides information systems security support for DoD and Non-DoD classified systems and networks. Standing up
- Sun Pharmaceuticals, Inc (Princeton, NJ)
- …This role reports to the head of security with dotted line reporting to the DEA compliance manager. Works closely with key stakeholders including, but not limited to DEA,
- Whirlpool Corporation (Benton Harbor, MI)
- …will include** + **Strategic Leadership:** Develop, direct, implement, and continuously improve the organization's protective services, threat management, and corporate
- Dickinson Financial Corporation (Kansas City, MO)
- …+ Perform risk assessments and impact analyses to identify vulnerable areas within the company's security program. The risk assessment process includes identifying