- Texas A&M University System (College Station, TX)
- … security -sensitive. Applicants are subject to a criminal history investigation , and employment is contingent upon the institution's verification of credentials ... University leads advanced research in several important national and global areas for the betterment of humanity. Areas of...engagement with the Texas A&M Data Science Institute, the Global Cyber Research Institute, the Texas A&M Energy Institute,… more
- Bechtel Corporation (Port Arthur, TX)
- …to create a lasting positive impact. We serve the Infrastructure; Nuclear, Security & Environmental; Energy; Mining & Metals, and the Manufacturing and Technology ... Texas, between the inner coastal waterway bridge and Keith Lake. The Infrastructure Global Business Unit (GBU) is executing site civil and marine scopes of work… more
- Marriott (Irving, TX)
- …Conducts regular inspection tours of the entire facility for appearance, safety, staffing, security , and maintenance. * Sends copy of MOD report to all departments ... of the property. * Participates as needed in the investigation of employee and guest accidents. * Performs Front...The Ritz Carlton has earned the reputation as a global brand leader in luxury hospitality. As part of… more
- Texas A&M University System (San Antonio, TX)
- … security -sensitive. Applicants are subject to a criminal history investigation , and employment is contingent upon the institution's verification of credentials ... and marketable skills that prepare them for rewarding careers, responsible global citizenship and lifelong learning. Mission Statement As a proud Hispanic-Serving… more
- Texas A&M University System (College Station, TX)
- … security -sensitive. Applicants are subject to a criminal history investigation , and employment is contingent upon the institution's verification of credentials ... University leads advanced research in several important national and global areas for the betterment of humanity. Areas of...engagement with the Texas A&M Data Science Institute, the Global Cyber Research Institute, the Texas A&M Energy Institute,… more
- Texas A&M University System (College Station, TX)
- … security -sensitive. Applicants are subject to a criminal history investigation , and employment is contingent upon the institution's verification of credentials ... University leads advanced research in several important national and global areas for the betterment of humanity. Areas of...engagement with the Texas A&M Data Science Institute, the Global Cyber Research Institute, the Texas A&M Energy Institute,… more
- Lockheed Martin (Fort Worth, TX)
- …actions to closure with accountability\. The MPM/MPS team works laterally across all global supply chain teams and across Lockheed Martin functions to meet program ... skills with an ability to multitask and prioritize requests and tasking ** Security Clearance Statement:** This position requires a government security clearance,… more
- US Tech Solutions (Houston, TX)
- …and recovery tools, IBM Spectrum, Dell Networker. + Good knowledge of Linux security , including configuration of endpoint security tools. + Ability to evaluate ... vendors in technical environments and in the reporting and investigation of system problems. + Provide a written weekly...**About US Tech Solutions:** US Tech Solutions is a global staff augmentation firm providing a wide range of… more
- Texas A&M University System (Fredericksburg, TX)
- … security -sensitive. Applicants are subject to a criminal history investigation , and employment is contingent upon the institution's verification of credentials ... nationally ranked program with a mission focused on sustainability, wellness, and food security to support the economic viability, and national and global … more
- Houston Methodist (Houston, TX)
- …activities, following managerial review, as appropriate. May perform initial investigation and information for internal and external complaints to management. ... privacy rights and maintains confidentiality of patient information and computer security codes, as well as protects the integrity of privileged information.… more