- Mastercard (Salt Lake City, UT)
- …deployment, configuration, and documentation, to ensure business requirements are met with high quality. * Drive the automation of build, operation, and runtime ... availability, and user satisfaction. * Develop a comprehensive understanding of end -to- end technical architecture and related dependency systems to guide… more
- TEKsystems (New York, NY)
- …Cloud Services, Network and Telecom Services, Service Desk, Event Technology, and End User platforms ensuring reliable, scalable, and secure operations across the ... and strategies to support the company's business objectives. * Accountable for the management and hands-on support for the implementation and maintenance of core IT… more
- AIG (Charlotte, NC)
- …excellence. The team is responsible for shielding the company's systems from security risks, while designing technology strategies that enable AIG's businesses to ... with various teams like Application Delivery, Business Operations, and Product Management . The DQ&E teams utilize Subject Matter Expertise and technical engineers… more
- Encore Electric, Inc. (Lakewood, CO)
- …as: + Phishing + Firewalls + Network access control + Antivirus + End -Point protection + Infrastructure Management : Ensure the efficient and effective operation ... the Role + Infrastructure Services: To ensure the stability, scalability, and security of the organization's IT infrastructure by leading the design, implementation,… more
- Fresh Consulting (Bellevue, WA)
- …is a design-led, hardware, AI, robotics, and software development company, offering end -to- end technological services to help companies innovate. We bring ... in every technical project and program. + Provide Project planning, Milestone management , Scope management , and Resource forecasting. + Proven track record… more
- RTX Corporation (Andover, MA)
- …Status Requirements:** The ability to obtain and maintain a US government issued security clearance is required. US citizenship is required, as only US citizens are ... eligible for a security clearance ** Security Clearance:** DoD Clearance: Secret...data science and AI at Raytheon by leading a high -performing team of data scientists and AI engineers. You… more
- City of Cincinnati (Cincinnati, OH)
- …In-depth graphic design. User interface design. Advertising and marketing. Information architecture. Management of e-commerce. Front- end web code such as HTML ... skills. Provides second level network problem escalation resolution. Develops and administers end -user training programs. Assures that appropriate IT security is… more
- SAIC (Scott AFB, IL)
- …. Support the control assessment, reporting and monitoring processes using the Cyber Security and Assessment Management (CSAM) system . Create and maintain all ... associated with those vulnerabilities. . Design and development of comprehensive Systems Security Plan, covering at a high level the infrastructure, policies… more
- Mission Support and Test Services (North Las Vegas, NV)
- …Our VISION is to be the user site of choice for large-scale, high -hazard, national security experimentation, with premier facilities and capabilities below ... aspects of scope, cost, and schedule performance and risk management of the NA-90 Direct Funded Global Security...cost, risks, and possess a strong understanding of program/project management concepts. + Ability to exercise high … more
- Maloney Properties, Inc. (Wellesley, MA)
- …iPhones, and Microsoft 365 Office products. This position also supports endpoint security products like anti-virus, mobile device management , and remote support ... Responsibilities + Troubleshoot and resolve incoming help requests from end users in a courteous manner. Resolution may require...in a timely manner, including system down and cyber security incidents. + Routinely evaluate helpdesk trends and make… more