- Insight Global (Fort Bliss, TX)
- …385-1-1; conduct daily safety briefings, inspections, and toolbox talks. Enforce security compliance, including restricted-area access control and verification ... and maintain the site logistics plan developed by the Sr. CM, including access control, staging, material flow, and phasing. Conduct daily field walks to verify… more
- Allied Universal (Carrollton, TX)
- …across the business + Maintain and expand expertise in low-voltage electronic security systems: intrusion detection, video surveillance, access control, life ... Allied Universal(R) Technology Services, a global leader in transforming the security industry. We integrate advanced technology - video surveillance, electronic … more
- M. C. Dean (Dallas, TX)
- …of a team that designs, engineers, integrates, operates and maintains electronic security services inclusive of intrusion detection, access control, biometric ... With over 7,000 employees, our capabilities span electrical, electronic security , telecommunications, life safety, automation and controls, audiovisual, and IT… more
- Jensen Hughes Inc. (Allen, TX)
- …misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies and procedures, ... 1939. Today, our expertise extends broadly across closely related security and risk-based fields - from accessibility consulting and...such as encryption and limited access . Only authorized individuals may access your… more
- Jensen Hughes Inc. (Allen, TX)
- …misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies and procedures, ... 1939. Today, our expertise extends broadly across closely related security and risk-based fields - from accessibility consulting and...such as encryption and limited access . Only authorized individuals may access your… more
- Jensen Hughes Inc. (Houston, TX)
- …misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies and procedures, ... 1939. Today, our expertise extends broadly across closely related security and risk-based fields - from accessibility consulting and...such as encryption and limited access . Only authorized individuals may access your… more
- Jensen Hughes Inc. (Houston, TX)
- …misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies and procedures, ... 1939. Today, our expertise extends broadly across closely related security and risk-based fields - from accessibility consulting and...such as encryption and limited access . Only authorized individuals may access your… more
- Jensen Hughes Inc. (Houston, TX)
- …misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies and procedures, ... 1939. Today, our expertise extends broadly across closely related security and risk-based fields - from accessibility consulting and...such as encryption and limited access . Only authorized individuals may access your… more
- Eliassen Group (Houston, TX)
- …data, troubleshoot discrepancies, and implement corrective actions as needed. * Support security role administration, ensuring appropriate access based on job ... and ensure it aligns to defined business rules and security needs. * Support data conversion by preparing templates,...SKILLS * Strong understanding of HR systems, data structures, security protocols, and HR processes. * Proficiency with HRIS… more
- TISTA Science and Technology (Austin, TX)
- …using CloudWatch, Azure Monitor, Log Analytics. + Manage identity and access controls, enforce security best practices, and remediate vulnerabilities. ... scripting skills in Bash, PowerShell, or Python. + Working knowledge of cloud security (eg, IAM, Defender for Cloud, GuardDuty). + Familiarity with CI/CD pipelines,… more