- L3Harris (Greenville, TX)
- …to government security investigation(s) and must meet eligibility requirements for access to classified information . By submitting your resume for this ... space, air, land, sea and cyber domains in the interest of national security . Job Title: Specialist, Systems Engineer Job Code: 29353 Job Location: Greenville, TX… more
- L3Harris (Waco, TX)
- …to government security investigation(s) and must meet eligibility requirements for access to classified information . By submitting your resume for this ... the space, air, land, sea and cyber domains in the interest of national security . Job Title: Lead, Systems Engineering - Avionics Job Code: 28770 Job Location: Waco,… more
- Exeter Government Services, LLC (Fort Bliss, TX)
- …of related experience Position Description: Exeter is seeking an Intermediate-level Information Technology (IT) Support Specialist to act as the Workstation ... management of networked systems used for the transmission of information in voice, data, and/or video formats. This is...+ Function as a technical specialist for computer systems security at SFLTAP. + Recommend and participates in the… more
- Mastercard (Austin, TX)
- …to your email promptly. **Corporate Security Responsibility** All activities involving access to Mastercard assets, information , and networks comes with an ... employer that considers applicants without regard to gender, gender identity , sexual orientation, race, ethnicity, disabled or veteran status,...for, or on behalf of, Mastercard is responsible for information security and must: + Abide by… more
- Jensen Hughes Inc. (Houston, TX)
- …regard to race, color, religion, sex, national origin, sexual orientation, gender identity , disability or protected veteran status._** The security of your ... or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies...confidentiality of personal data and may not use the information for any unauthorized purpose. *Policy on use of… more
- Jensen Hughes Inc. (Houston, TX)
- …regard to race, color, religion, sex, national origin, sexual orientation, gender identity , disability or protected veteran status._** The security of your ... or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies...confidentiality of personal data and may not use the information for any unauthorized purpose. *Policy on use of… more
- Jensen Hughes Inc. (Allen, TX)
- …regard to race, color, religion, sex, national origin, sexual orientation, gender identity , disability or protected veteran status._** The security of your ... or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies...confidentiality of personal data and may not use the information for any unauthorized purpose. *Policy on use of… more
- Jensen Hughes Inc. (Houston, TX)
- …regard to race, color, religion, sex, national origin, sexual orientation, gender identity , disability or protected veteran status._** The security of your ... or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies...confidentiality of personal data and may not use the information for any unauthorized purpose. *Policy on use of… more
- Jensen Hughes Inc. (Austin, TX)
- …regard to race, color, religion, sex, national origin, sexual orientation, gender identity , disability or protected veteran status._** The security of your ... or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies...confidentiality of personal data and may not use the information for any unauthorized purpose. *Policy on use of… more
- Cayuse Holdings (Austin, TX)
- …expertise in stakeholder engagement, organizational change management, service catalog management, identity and access management, cloud operations, and tooling ... ensure a seamless user experience. **4. Roles, Groups, & Access ( Identity & Access Management)**...roles, tenancy boundaries, and approval workflows. + Partner with Security /IAM to implement and manage compliant access … more