Waldorf, MD
... Coordinate with Security and with the Travel Office, when necessary, to ensure completion of proper security checks and or ... Correctional Officer at D.C. Department of Corrections June 1990 - April 1991 (1 Year) Responsible for count procedures, ...
- May 19
Abilene, TX
... June 2022 Identifying differences in materials, following instructions, and detecting details among distracting information Full results: Proficient Call center customer service — Proficient June 2021 Demonstrating customer service skills in a call ...
- May 19
Fairfax, VA
... This includes managing Azure resources using Azure Resource Manager (ARM) templates, deploying and managing Azure Virtual Machines (VMs), configuring Azure networking services such as Virtual Networks and Network Security Groups (NSGs), and ...
- May 19
Los Angeles, CA
... Projects Cost-Driven Credit Card Fraud Detection Using Gradient Boosting and ROI Analysis Oct 2024 - Nov 2024 • Developed a full-cycle fraud detection system using Python on 98K+ real-world transaction records with low fraud prevalence. • Engineered ...
- May 19
Melbourne, FL
... Company: Carter and Burgess 12/2002 – 12/2005 Position: Program Manager and Director of Operations Transportation Security Managed the design and construction of security upgrades to over 100 National Airports across America. Managed all staff, from ...
- May 19
Austin, TX, 78701
ROBERT L.ENGLAND 425-***-**** *************@*****.*** EDUCATION June 2012-Mar 2013 Information Security System BA of Applied Science (ITT TECH) June 09-June2012 Computer Networking Systems Associate of Applied Science (ITT TECH) Feb 92-May-94 ...
- May 19
Chicago, IL
... Self-Employed Chicago, IL (June 1999-December 2001) Contractual Maintenance of NT Workstations and Servers NT Server Updates Data Security & Backup Management Support & Integration of Network Applications Management of users, groups, and system ...
- May 19
Irving, TX
... Skills: •Knowledge and experience in IT Securities including access controls, network Security, Login/monitoring, Pen Testing, Vulnerability scan, Vulnerability assessments, ITGC and Application controls. Efficient in using SAST/DAST/IAST tools like ...
- May 19
New York City, NY
... Partnering with technology and security teams on adopting Microsoft cloud-based security services. Strong interpersonal and training skills, with a commitment to empowering users and maintaining secure, efficient digital workspaces. Professional ...
- May 19
Austin, TX
... Monitor the indicated place, wait for my other partner to arrive on shift and report what happened during the shift at JOM SECURITY January 1970 - January 1970 (0.5 Year) Monitor the indicated place, wait for my other partner to arrive on shift and ...
- May 19