- AeroVironment (San Diego, CA)
- …Workday's Compensation module, including configuration, integrations, business processes, reporting, and security . + Hands on expertise to launch Annual Merit, Bonus ... with Workday Report Writer and advanced reporting techniques. + Understanding of HRIS security concepts and data privacy best practices. + Single Point of Contact… more
- Global Dimensions (Key West, FL)
- …expanding company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security , and intelligence (analysts, CI, HUMINT, ... requirements and other high priority tasks supporting real world operations pursuant to the mission. Linguists shall cull out...will not disrupt the event. Requirements + Current Secret Security Clearance + CI, HUMINT, SIGINT or OSINT experience… more
- Signature Aviation (Shreveport, LA)
- …response procedures during critical events. + Understand, comply with, and enforce all security (physical, cyber and data) protocols as dictated by both ... Work as part of a team to conduct airside operations safely and efficiently in accordance with established policies...background check requirements to receive and maintain an airport security badge, and be insurable by the Company's applicable… more
- Signature Aviation (Cedar Rapids, IA)
- …response procedures during critical events. + Understand, comply with, and enforce all security (physical, cyber and data) protocols as dictated by both ... Work as part of a team to conduct airside operations safely and efficiently in accordance with established policies...background check requirements to receive and maintain an airport security badge, and be insurable by the Company's applicable… more
- Air National Guard Units (Madison, WI)
- …provide voice, data, wireless, Communications Focal Point (CFP) and information security services provided to the Wing, supported Geographically Separated Units, and ... maintained by the Unit - network infrastructure, wireless systems, voice systems, and CFP operations . The purpose of this position is to serve as a customer support… more
- General Dynamics Information Technology (Sterling, VA)
- …Trust/Other Required:** None **Job Family:** IT Infrastructure and Operations **Skills:** Systems Engineering,Virtual Desktop,VMware VDI **Experience:** 10 + ... scripting skills in PowerShell or Python + Providing Tier 3 and above support as needed (troubleshooting, problem resolution...IAT Level II requirements including one of the following: Security + CE, CND, SSCP, GSEC, GICSP, CySA+, or CCNA… more
- Northrop Grumman (Colorado Springs, CO)
- …regional, and operational levels to plan ballistic missile defense operations systematically, monitor the battle collectively, and dynamically control networked ... networking, integrating, and synchronizing autonomous sensor and weapon systems and operations globally and regionally to improve performance. C2BMC is essential for… more
- CACI International (Washington, DC)
- …database performance to recommend and implement improvements. 7. Mitigate software security vulnerabilities to ensure cyber compliance. 8. Support application ... and reliable software solutions that directly support our Navy's vital operations . **Responsibilities:** 1. Research AI, data structures, and algorithms, utilizing… more
- Signature Aviation (Van Nuys, CA)
- …response procedures during critical events. * Understand, comply with, and enforce all security (physical, cyber and data) protocols as dictated by both ... Work as part of a team to conduct airside operations safely and efficiently in accordance with established policies...background check requirements to receive and maintain an airport security badge, and be insurable by the Company's applicable… more
- Axxum Technologies (Rancho Cordova, CA)
- …IT point of contact for the Corporate office. Independently managing daily technical operations while escalating complex issues to the remote IT team as needed. + ... on time and within budget. + Implement and monitor security protocols to protect company data and systems from... protocols to protect company data and systems from cyber threats. + Participate in after-hours network upgrades and… more