- UpvoteDownvoteShare Job
- Suggest Revision
Administer a Top Secret inventory and document control program to account for COMSEC equipment and materials. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities across the enterprise.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in Bentley OpenRoads and an understanding in AutoCAD Civil 3D. Flood Risk Management design and construction projects specifically for USACE Working knowledge of federal flood control design guidelines, like USACE Engineering Manuals and FEMA’s 44 CFR Section 65.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and experience supporting all Access Control Products (ACP) (Access Control Facility 2 (ACF2), Resource Access Control Facility (RACF) and CA Top Secret Security (TSS. Inalab Consulting is a leading Small Business IT solutions and strategy consulting firm focused on providing solutions that transform enterprise operations in the government and commercial sectors by dependably bridging the gap between business strategy and technology.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have advanced level understanding of automated control systems and integration, electronics, robotics, fibre optic sensors, pneumatic-hydraulic controls, HMI touch panels, and PLC programming.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Document inventory, using a computerized database, word processor & drawing program, plus manual drafting of wiring of systems. Support station & field operations, as necessary, especially during major studio & field efforts involving technical equipment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will assist in various functions assigned by the Bank’s BSA Officer in compliance with the Bank Secrecy Act, Customer Identification Program (CIP), and Office of Foreign Assets Control (OFAC) requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience performing SOC operations, incident response, cyber tool engineering and support for SIEM , EDR/MDR/XDR, IDS/IPS tools, Red Team assessments, network management, and NIST RMF evaluations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage IAM with Okta, create access control policies, ensure proper implementation of least privilege and RBAC across internal and SaaS applications. 5+ years of experience in a Security Operations/IT security position.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure that parts and equipment inventory relating to control device technology are maintained to ensure continuous plant efficiency and reduce down-time. Must have advanced level understanding of automated control systems and integration, electronics, robotics, fiber optic sensors, pneumatic-hydraulic controls, HMI devices, and PLC programming.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this position, the industrial Control Systems (ICS) Cyber Security Engineer / Analyst can expect to be responsible for assisting in the evaluation and implementation of network architecture and cyber security services and technologies in nuclear power plants around the world.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Using technology, Aledade changes that by enabling doctors to intervene with the proper preventive care, like blood pressure control, before it becomes a stroke. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The TPM will manage multiple programs including IGA (Identity Governance & Administration) , PAM (Privileged access Management), RBAC (Role Based Access Control), DnR (Detect & Respond / Security Event Monitoring), AI Security, API Security, DLP (Data Loss Monitoring) and Data Security Fabric.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of Genetec Access control systems and field devices. This is not a cybersecurity role but a physical security role in the design and management of card reader-based access control systems, Cameras and other physical security equipment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep experience in cloud security and how it is relevant in a rapidly evolving market landscape, especially in emerging privacy and infosec regulations, access control (authentication/auditing) and/or encryption, secure development practices, and integrations between systems (e.g., with cloud provider services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT Asset Management or Obsolescence, specifically on Governance Definition and Operationalization, or asset discovery, asset inventory management, etc. Experience leveraging technologies to discover, inventory, and map data assets across complex environments.
ExpandApply NowActive JobUpdated Today
inventory control jobs Title: operations support Company: Fastenal in New Berlin, WI
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.