- DXC Technology (Austin, TX)
- …the stack + Follow established coding standards, architectural patterns, and security practices + Create and maintain documentation for both frontend components ... sides + Experience with version control systems (Git) + Understanding of web security best practices + Experience with cloud environments (AWS, Azure) + Strong… more
- CGI Technologies and Solutions, Inc. (Austin, TX)
- …Business Analyst to join our Texas Business Unit. We're a close-knit team that has access to global resources. You'll have the opportunity to explore a wide range of ... can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security … more
- CGI Technologies and Solutions, Inc. (Austin, TX)
- …project deliverables that meet our clients' needs. We're a close-knit team that has access to global resources. You'll have the opportunity to explore a wide range ... can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security … more
- University of Texas Rio Grande Valley (Rio Grande, TX)
- …beyond via an innovative and unique multicultural education dedicated to student access and success. By championing leading research, healthcare, and application of ... a bilingual and bicultural environment, UTRGV will promote student access and success by building from strength in education...by selecting to edit your profile in the application. Security sensitive; All UTRGV employees are required to have… more
- Cisco (TX)
- …made for a hybrid, multi-cloud world. Leading enterprises use our unified security and observability platform to keep their digital systems secure and reliable. ... orchestrate complex deals across more diverse business stake-holders. + Holistically embrace, access , and apply the channel to identify and open new, unchartered… more
- GovCIO (San Antonio, TX)
- …common database tasks. + Maintains complex databases with respect to JCL, access methods, access time, device allocation, validation checks, organization, ... protection and security , documentation, and statistical methods. + Performs installs, configuration,...employees enjoy working here. In addition, our employees have access to a range of perks and benefits to… more
- CGI Technologies and Solutions, Inc. (Houston, TX)
- …looking for a Workstream Lead to join us. We're a close-knit team that has access to global resources. You'll have the opportunity to explore a wide range of ... can vary dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government security … more
- DriveTime (Dallas, TX)
- …+ Collaborate with other IT teams for escalations and problem resolution. **Data Security & Compliance** + Monitor end users' and team members' issues to protect ... data integrity and prevent unauthorized access or breaches. + Identify gaps and potential vulnerabilities to keep all data and systems secure. **Team Training &… more
- Headquarters, Air Force Reserve Command (Fort Worth, TX)
- …(ECAMP) environmental protection practices and procedures and complies with security regulations, directives and policies. Requirements Conditions of Employment ... orally and in writing both manually and through computer-based access methods. 5. Knowledge of work area hygiene, upkeep,...Must be able to obtain and maintain a secret security clearance. 3. Cleans work area and equipment. 4.… more
- DXC Technology (Plano, TX)
- …and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's ... Stack for business process outsourcing, insurance, analytics and engineering, applications, security , cloud, IT outsourcing, and modern workplace. Our DXC Insurance… more