- Deloitte (Westlake, TX)
- …our people. The Talent Innovation and Strategy (TIS) Talent Strategy & Program Management team works across Deloitte to shape our future workforce strategy. This ... + Gathering requirements to help the Data Analysis & Management team analyze complex data sets to find patterns...and present insights effectively. + Working with the Data Security and Governance team to manage data ownership and… more
- TXNM Energy (Lewisville, TX)
- …of construction practices as it pertains to utility lines, stations, and access roads. 6. Experience with environmental permitting requirements for the construction ... job title may be covered by NERC CIP cyber security standards. If the position is covered, prior to...must successfully pass a Personnel Risk Assessment, which includes identity verification and a criminal background check. Prior to… more
- TXNM Energy (Lewisville, TX)
- …$153,536** Personnel in this job title may be covered by NERC CIP cyber security standards. If the position is covered, prior to being hired, promoted, or ... the candidate must successfully pass a Personnel Risk Assessment, which includes identity verification and a criminal background check. Prior to being granted… more
- Kilgore College (Kilgore, TX)
- …Part-Time Retirement Plan Kilgore College does not participate in the federal Social Security program. All full-time positions are located in Kilgore, TX. No fully ... experience leading them to success in life while improving access to higher education and partnering with those who...hired must submit satisfactory proof of employment authorization and identity within three (3) days of being hired. Failure… more
- Charles Schwab (Southlake, TX)
- …improving efficiency, increasing security posture, and supporting growth of the firm's Identity and Access Management (IAM) Program. **What you'll do:** ... (SCS), Office of CISO, we provide platforms, services, and security operations capabilities which enable the firm to produce...to ensure a safe and compliant environment is maintained. Identity and Access Management has… more
- TXNM Energy (Alvin, TX)
- …cyber security training; supplemental training for certain PNMR Energy/Generation/Plant Management Systems and annual cyber security training will be ... CIP compliance/ security related controls, and technical support of Energy/Generation Management Systems operations for both PNM and TNMP. Supports a variety of… more
- Camping World (TX)
- …and work towards enhanced automation. + Work within Active Directory to grant users access to camera and security portals. + Work within Active Directory to ... resolve user profile issues preventing access to necessary camera and security portals....incident footage requests received from sites directly or Risk Management team. **Documentation** + Create clear and concise end… more
- Evolent (Austin, TX)
- …and application virtualization. Endpoint management and security tools. Identity and access management tools. Microsoft Windows. Microsoft 365. ... and SaaS tools). * Strong understanding of adjacent technologies ( identity , security , endpoint management , vulnerability...of managing digital workplace tools, configuration management , identity and access management , active… more
- Evergreen Fire and Security (Killeen, TX)
- …Identify and relay customer feedback and requirements to your supervisor and/or the management of Evergreen Fire and Security The Necessities + Associate degree ... + Medical, dental, and vision insurance plans + services, identity theft protection, and accident insurance Pay Range is...Security is a US government contractor with sensitive access requirements. As our employee, you must also be… more
- Molina Healthcare (San Antonio, TX)
- …NSGs, SD-WAN, micro-segmentation + Cloud security posture management (CSPM) + Identity & Access Management (IAM), Zero Trust + Microsoft 365 (M365) ... 365(M365) environments, including: + Microsoft Defender, Purview, DLP, Conditional Access + Email security , SharePoint, and Teams... security gap analysis & risk mitigation + Identity security vulnerabilities in cloud (Azure), network,… more