Distance: |
Resume alert |
Resumes 341 - 350 of 821636 |
Austin, TX
... Google Suite • Sales Training/Skills Development with full toolkit of sales productivity tools • Marketing Leadership ... SaaS/ASP, desktop, self-host and Managed Data Services business models. Director of Sales: Key Accomplishments Grew sales 66 ...
- May 31
Marietta, GA, 30062
... Full Stack, front-end and back-end developers, Node.js, Azure, SSIS/SSRS, Imbedded Engineers, RedHat, UNIX, etc. CYBER Security: CISO, CISSP, CISM, CIPPE, CIPM, IAM, Cyber Security Advisors, IAM, Network Security Analyst, IT Auditor, AWS Cloud Data ...
- May 31
Louisville, KY
... KY Jul 2019 – Present Classification & Treatment Officer, Correctional Officer • Reviewed and classified inmates for entry and custody level • Developed risk level assessment and case management plans for inmates • Worked compound and inmate ...
- May 31
Greeneville, TN
Hermione Hickman Greeneville, TN 423-***-**** *******************@*****.*** Summary Reliable and motivated individual eager to begin a career in remote support or data entry. Known for strong attention to detail, fast learning, and a positive, team ...
- May 31
San Francisco, CA
... Teceze IT Servises Field Network Engineer Oct 2024 – present • Network Device Installation and Configuration in data center. ... • Configured DNS Entry, Source Nating, Destination Nating, NAT log configuration in router and capping user bandwidth on ...
- May 31
Atlanta, GA
... Receiving • Forklift Operator • Food Service • Cherry Picker • Data Entry • 10 Key Calculator • Customer Service • Warehouse ... Full results: Proficient Forklift Safety — Proficient January 2020 Best practices and safety hazards in forklift operation ...
- May 31
Spring, TX
... • Provided data to banks through fraud detection software. • Decision positive pay daily
- May 31
Eldorado at Santa Fe, NM, 87508
... Bloom 1 of 2 May 6, 2025 09/1994 – 08/1995 Systems Delivery Services Manager/IT Infrastructure Woodland Hills, CA The Zenith Insurance Company Managed the seamless transiTon of applicaTons and data from mainframe systems to modern packaged ...
- May 31
Worcester, MA
... indicators ofmaliciousactivity Explain the purpose ofmitigationtechniquesto secure the enterprise Apply securityprinciplestosecureenterpriseinfrastructure Conduct vulnerability management activities Use data sources to support an investigation. ...
- May 31
Winston-Salem, NC
... • Invoice Tracking • Customer/Supplier Relations- receiving authorizations for new projects, inquires for declined projects and total hours billed to active projects • Employee Time and Data • Attends interactive meetings with Honda buyers and ...
- May 31