- University of Texas Rio Grande Valley (Rio Grande, TX)
- …Research Assistant LocationRio Grande Valley, Texas CollegeN/A DepartmentOffice of the President DivisionDivision of President FTE.50 Scope of Job + ... application. The confidential information includes the following: Date of Birth Social Security Number Gender Ethnicity/Race Please make sure that you omit this… more
- Rowan University (Glassboro, NJ)
- …University (CMSRU) Reports To: Primary Reporting to the Associate Vice President , Research Compliance, Chief Research Compliance Officer SUMMARY As the University's ... Welfare Program. He/she will also advise the Associate Vice President for Research of the Virtua College of Medicine...with violations, occupational health and safety issues and facility security . The AV will engage users in dialogue on… more
- Sierra Nevada Company, LLC (Dayton, OH)
- …finance and accounting, operations, human resources, legal, IT, information security , facilities, marketing, and communications. SNC has led thoughtful and ... and deliver the next-generation SAOC aircraft trusted by the President , Secretary of Defense and Chairs of the Joint...the ability to obtain and maintain a Secret US Security Clearance. US Citizenship status is required as this… more
- Northrop Grumman (Orlando, FL)
- …DoD Secret Clearance. + Current DoD 8140 Certification IAT Level II or higher ( Security +, CISSP, etc.) or ability to obtain one within 6 months. + Solid ... understanding security vulnerability scanning and remediation in accordance with STIGs,...employees to share in company results. Employees in Vice President or Director positions may be eligible for Long… more
- Sierra Nevada Company, LLC (Lone Tree, CO)
- The ISR (Intelligence, Surveillance & Reconnaissance), Aviation, and Security (IAS) business area is a leader in ISR and aviation, it is a leading prime manned and ... meaningful work to modernize and deliver the next-generation SAOC aircraft trusted by the President , Secretary of Defense and Chairs of the Joint Chiefs of Staff to… more
- Northrop Grumman (Jacksonville, FL)
- …. Create and maintain user and computer accounts and modify file permissions and security access lists. . Test new releases of products to ensure compatibility and ... services, and suggestions. . Adhere to strict Information Systems security guidelines in all cases. . Maintain security...employees to share in company results. Employees in Vice President or Director positions may be eligible for Long… more
- Northrop Grumman (Los Angeles, CA)
- …collaboration with team members of other projects within the organization for security architecture designs as well as external partners and customers. The ... on multi-region and multi-network architectures. All candidates must have a ** Security + certification** . **Roles and responsibilities** A successful candidate will… more
- Northrop Grumman (Los Angeles, CA)
- …+ Create and maintain user and computer accounts and modify file permissions and security access lists. + Test new releases of products to ensure compatibility and ... services, and suggestions. + Adhere to strict Information Systems security guidelines in all cases. + Maintain security...employees to share in company results. Employees in Vice President or Director positions may be eligible for Long… more
- Northrop Grumman (Aurora, CO)
- …* Create and maintain user and computer accounts and modify file permissions and security access lists. * Test new releases of products to ensure compatibility and ... services, and suggestions. * Adhere to strict Information Systems security guidelines in all cases. * Maintain security...employees to share in company results. Employees in Vice President or Director positions may be eligible for Long… more
- Northrop Grumman (Cincinnati, OH)
- …technical discipline. **Responsibilities:** This position involves developing solutions to national security threats and products in the portfolio include: + Scaled ... performance. Knowledge of DevOps, digital testing, data interfaces, network security , access controls (authentication & authorization), software modularity and… more