- Sherwin-Williams (Norfolk, VA)
- …which may include minors; and access to cash and other payment methods , electronic equipment, personal information, store merchandise and other items of value, ... and such access may be supervised or unsupervised. The Company therefore has determined that a review of criminal history is necessary to protect the business and its operations and reputation and is necessary to protect the safety of the Company's customers,… more
- Nightwing (Arlington, VA)
- …Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods , effects on system and information - Collects network device ... integrity data and analyze for signs of tampering or compromise - Assists with real-time CND incident handling (ie, forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite… more
- Packing Corp of America (Harrisonburg, VA)
- …continual improvement processes and safety practices. Knowledge of the machinery, methods and procedures in the corrugated fabricating or production. Working ... knowledge of manufacturing systems including shop floor software. Strong organizational skills with the ability to handle numerous details, deadlines, and requests. Strong interpersonal skills to effectively lead and communicate with production team and… more
- WSP USA (Richmond, VA)
- …via drilling including direct-push, hollow-stem auger, and other similar drilling methods . + Project management experience with small to mid-level projects including ... tracking hours and expenses for project work. + Experience in conducting Phase I and Phase II Environmental Site Assessments in accordance with ASTM guidelines and industry standards. + Experience with UST investigations and remediation including investigation… more
- Insight Global (Mclean, VA)
- …workflows Understanding of cyber threats, attack vectors, and log-based detection methods Automation & Scripting (Supporting) Python and/or PowerShell for data ... analysis, automation, or API integration REST APIs for integrating Splunk with external systems Security frameworks and standardsNIST RMF, FISMA, FedRAMP, ISO 27001, DoD STIGs more
- BCMC (Arlington, VA)
- …Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods , effects on system and information - Collects network device ... integrity data and analyze for signs of tampering or compromise - Assists with real-time CND incident handling (ie, forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite… more
- Sherwin-Williams (Spotsylvania, VA)
- …which may include minors; and access to cash and other payment methods , electronic equipment, personal information, store merchandise and other items of value, ... and such access may be supervised or unsupervised. The Company therefore has determined that a review of criminal history is necessary to protect the business and its operations and reputation and is necessary to protect the safety of the Company's customers,… more
- Bowman (Richmond, VA)
- …analysis, and quality control using industry-standard software. + Troubleshoot equipment, survey methods , and data quality issues in the field and office. + ... Coordinate with clients, regulatory agencies, and internal teams to resolve technical questions and survey constraints. **Do the Work** + Conduct hydrographic data acquisition in marine, coastal, riverine, and inland environments. + Process, analyze, and… more
- The Caton Companies (Marion, VA)
- …super substructure and substructure, cofferdams, work trestles, and bridge deck construction methods used to construct major bridge structures and retaining walls . ... Work within precise standards of accuracy; able to compare and see differences in the size, shape, and forms of lines, figures, and objects . Experience efficiently and safely operating trade tools and equipment. Qualifications . 3+ years of hands-on… more
- The MITRE Corporation (Arlington, VA)
- …for applicability to DoW cryptographic challenges, including advanced cryptographic methods and zero trust architectures. + Risk Management: Identify, analyze, ... and mitigate cybersecurity risks, ensuring compliance with DoW policies and frameworks. Collaboration and Stakeholder Engagement + Cross-Functional Coordination: Facilitate collaboration across DoW components, industry partners, and other stakeholders to… more