- GovCIO (Tallahassee, FL)
- …Required: Secret + 7+ years of DoD software procurement/acquisition experience + DAWIA Level II or III in Contracting or Purchasing + Familiarity with GSA, SEWP, ... maintain software procurement, integration, and implementation schedules + Develop and engineer business software categories + Strong analytical skills to assist… more
- MUFG (Tampa, FL)
- …support, implementation, and enhancement of Oracle Financial Services Analytical Application (OFSAA) for Asset and Liability Management (ALM) and Liquidity ... LRMS team with project management activities, business process model design, application development, project testing, and documentation. + Support the initial… more
- Cipher Tech Solutions (Tampa, FL)
- …various cellphone forensic tools such as Cellebrite or XRY + 8570 IAT compliant at Levels II or III . Any of the following certifications for these levels will be ... cards + Extraction of external and internal drone storage + Mobile application database analysis and parsing Accordingly, candidates must thoroughly understand the… more
- MUFG (Tampa, FL)
- …lines to understand business requirements and lead design session with the engineer team. The candidate would maintain the Liquidity Data & Reporting technology ... financial data domains. + Experience in Oracle's OFSAA LRM application and understanding of frameworks such as UMM, Run...laws (including (i) the San Francisco Fair Chance Ordinance, ( ii ) the City of Los Angeles' Fair Chance Initiative… more
- SpaceX (Cape Canaveral, FL)
- …+ Bachelor's degree + Merchant Mariner credential (MMC) of Unlimited Third Mate, Third Engineer or higher, or 500-ton Captain with STCW or higher + 2+ years of ... applicant must be a (i) US citizen or national, ( ii ) US lawful, permanent resident (aka green card holder), ( iii ) Refugee under 8 USC | 1157, or (iv) Asylee… more
- MUFG (Tampa, FL)
- …environments + Participate in tactical assessments involving social engineering, application security, and lateral movement + Document Tactics, Techniques, and ... + Conduct research into real-world threat actor behaviors and reverse engineer proof-of-concept (PoC) exploits + Collaborate with security operations to correlate… more