SECURITY TECHNOLOGIES. ADDITIONALLY, THIS POSITION WILL DEVELOP AUTOMATION INTEGRATION AMONG SECURITY TOOLS. THIS POSITION... TECHNOLOGIES. Interview Process (phone, video or in-person, how many rounds of i/v s, etc)? All Interactions via MICROSOFT...
Security Comments: Position Description: Please ensure you attach the SC Cover Sheet (attached), a valid Right to Represent, and the candidate's resume with full legal first name, and last name. Withdrawn candidates will not be permitte...
Interview Process: 1 round - Virtual Duration of the Contract: 12 months Possibility for Extension: Yes Work Location: The resource will be required to be onsite Monday through Friday for their first 90 days. After 90 days, the positio...
Security Comments: Position Description: Please ensure you attach the SC Cover Sheet (attached), a valid Right to Represent, and the candidate's resume with full legal first name, and last name. Withdrawn candidates will not be permitte...
Position Description: Please ensure you attach the SC Cover Sheet (attached), a valid Right to Represent, and the candidate's resume with full legal first name, and last name. Withdrawn candidates will not be permitted to be replaced. If ...
Security Comments: Position Description: The State of South Carolina is looking for a Programmer - Advanced. Why is this position open: One especially critical project is a Power BI dashboard that will allow for more accurate fiscal-yea...
Security Comments: Position Description: Please ensure you attach the SC Cover Sheet (attached), a valid Right to Represent, and the candidate's resume with full legal first name, and last name. Withdrawn candidates will not be permitte...
Security Comments: Position Description: Please ensure you attach the SC Cover Sheet (attached), a valid Right to Represent, and the candidate's resume with full legal first name, and last name. Withdrawn candidates will not be permitte...