Distance: |
Resume alert |
Resumes 141 - 150 of 266190 |
Clifton, NJ
... Supervised a team of 11, including accounting staff, maintenance workers, and security personnel. Ensured compliance with NYC housing regulations, lease agreements, and financial reporting standards. Collaborated with auditors and legal teams to ...
- May 22
El Paso, TX
... field trips • Monitored student progress through regular assessments and provided reports to lead teacher and parents/guardians Security Guard Multiple-Newark, NJ August 2015 to February 2019 Responsibilities I used to buzz people who stayed in the ...
- May 22
Los Angeles, CA
... ● Provided leadership and support for network rollouts of applications, preformed IT and security audits. ● Setup and manage enterprise domain infrastructure consisting of Windows NT/2000/2003 Servers running Novell 4.11. ● Installed and maintained ...
- May 22
Manhattan, NY, 10007
... CORE COMPETENCIES Strategic Planning & Governance Security, Audit & Compliance Budget/Financial Management Business Planning & Implementation Data Analytics & Reporting People Management Disaster Recovery & Capacity Planning Facilities and Space ...
- May 22
Allen, TX
... • In-depth experience integrating security features in frontend apps, including token-based authentication using JSON Web Tokens (JWT), CORS handling, and input sanitization for secure API communication. • Extensive understanding of JSX, Virtual DOM ...
- May 22
Santa Rosa Beach, FL
... - Operations Support/Advance Development & Optimization (ADO) developing Statement of Work (SOW) directly with all fields of engineering, facility & project managers, security management, IT, programmers, wastewater, construction supervision, ...
- May 22
Columbia, MD
Abayomi Oladapo Splunk Analyst Security Engineer SIEM Specialist 443-***-**** ********@*****.*** PROFESSIONAL SUMMARY Highly skilled Splunk Analyst with 8+ years of experience supporting cybersecurity operations through advanced SIEM administration, ...
- May 22
Atlanta, GA
... JAVA, Software Engineering, Computer Architecture, UNIX/Linux, Computer Organization, Data Communication, Computer Security I and II, Network Defense, Cloud Computing, Management of Information Security, Operating System, Database Principles ...
- May 22
Dayton, OH, 45402
... Stay compliant with DoD and Air Force network security guidelines to include latest Security Technical Implementation Guides (STIGS), Time Compliance Network Orders (TCNO), and Information Assurance Vulnerability Management (IAVM) as well as confirm ...
- May 22
Westwood, MA
... Support for Intune Company Portal software CyberArk for security access – Multi-Factor Authentication support Support in “Tech Lounge” environment for user walkups. Support using Service Now for ticket tracking Remote user support including ...
- May 22