- APTIM (San Diego, CA)
- …budgeting, and execution + Subject Matter Expert (SME) and lead business analyst for projects involving advanced configuration of industry-leading EHS platforms ... on solution design by analyzing client business needs, evaluating competing configuration strategies, and contributing to detailed system design documentation +… more
- Walmart (Irvine, CA)
- …and take your career to the next level! As the Business Systems Analyst - Platform+ Applications within VIZIO's Information Technology team, this individual plays a ... of requirements, translation into proper system requirement specifications and configuration ; formulates and defines systems scope and objectives based on… more
- Deloitte (Los Angeles, CA)
- …experience with Agiloft, SirionOne, Icertis or any other CLM (contract lifecycle management ) software + Experience with document extraction tools, data wrangling ... Agent + PMP (Project Management Certification) + Contract & Commercial Management (CCM) Certification Program + Certified Financial Analyst (CFA) + PMI… more
- Linchpin Solutions, Inc. (Camp Pendleton, CA)
- …you are looking for an exciting career opportunity in the IT, engineering, software development, logistics, and project management fields, Linchpin Solutions is ... means exciting career opportunities for talented professionals in IT, engineering, software development, logistics, project management , and other key areas.… more
- KBR (Lompoc, CA)
- …is at the forefront of engineering, logistics, operations, science, program management , mission IT and cybersecurity solutions. + Collaborative Environment: Be part ... authoring and customizations for CSpOC operational needs including providing real-time configuration changes as well as enhancing exercise and mission rehearsal… more
- Hyundai Autoever America (Fountain Valley, CA)
- …and network security including intrusion detection, incident response, vulnerability management , application security, and compliance with the corporate information ... Access Control, Endpoint Protection, Two-Factor Authentication, Security Information and Event Management (SIEM), and vulnerability management tools, along with… more