security and safety, educating the store on emergency preparedness topics and assisting employees in safety incidents. Monitor... Manager is responsible for the safety and security of employees, theft prevention, enhancing company profitability...
security, infrastructure, and business units to ensure that mobile devices, applications, and data are securely managed...), and mobile application management (MAM), along with a strong focus on security, compliance, and automation. This work is located...
security, infrastructure, and business units to ensure that mobile devices, applications, and data are securely managed...), and mobile application management (MAM), along with a strong focus on security, compliance, and automation. This work is located...
to security protocols. Monitor the Mobile Device Management (MDM) system for compliance, proactively identifying and resolving... Management: Maintain accurate and organized records related to IT assets, user accounts, and security protocols...
cFocus Software seeks a Mid-Level Systems Architect to join our program supporting the Department of Homeland Security... to access methods, access time, device allocation, validation checks, organization, protection and security, documentation...
to detect, monitor, and manage Enterprise services. This includes ensuring the timely exchange of situational awareness... Required Qualifications: An Active TS/SCI Clearance with Polygraph Current Security+ or any DoD 8140 IAT certification At least 5...
while adhering to Information Security standards. Provide technical assistance and escalation support for all troubleshooting tasks... Policy Objects (GPO) based on stated requirements. Troubleshoot and resolve any GPO related issues which arise. Monitor...
Description This position will monitor all CBRNE network activity in a government Emergency Operations Center (EOC... and information sources during emergent and non-emergent conditions. Basic Qualifications Must have active SECRET security...
Description This position will monitor all CBRNE network activity in a government Emergency Operations Center (EOC... and information sources during emergent and non-emergent conditions. Basic Qualifications Must have active SECRET security...
strategies. Monitor network performance, analyze usage trends, and implement improvements to ensure optimal throughput... with applicable network security protocols, including DoD STIGs, RMF, and other accreditation standards (e.g., DoD 8500 series...
and virtual systems, as well as implementing best practices for system functionality, reliability, and security. The... hardware. Proven ability to monitor and tune system performance, including storage allocation and system optimization...
strategies. Monitor network performance, analyze usage trends, and implement improvements to ensure optimal throughput... with applicable network security protocols, including DoD STIGs, RMF, and other accreditation standards (e.g., DoD 8500 series...
strategies. Monitor network performance, analyze usage trends, and implement improvements to ensure optimal throughput... with applicable network security protocols, including DoD STIGs, RMF, and other accreditation standards (e.g., DoD 8500 series...
, and security across physical and virtual environments. Primary Responsibilities: Install, configure, and maintain systems... infrastructure, ensuring alignment with functional specifications and organizational best practices. Monitor system performance...
strategies. Monitor network performance, analyze usage trends, and implement improvements to ensure optimal throughput... with applicable network security protocols, including DoD STIGs, RMF, and other accreditation standards (e.g., DoD 8500 series...
and virtual systems, as well as implementing best practices for system functionality, reliability, and security. The... hardware. Proven ability to monitor and tune system performance, including storage allocation and system optimization...
(SLAs). Ensure adherence to safety, security, and operational standards during all service desk activities. Monitor...
while adhering to Information Security standards. Provide technical assistance and escalation support for all troubleshooting tasks... Policy Objects (GPO) based on stated requirements. Troubleshoot and resolve any GPO related issues which arise. Monitor...
mission critical IT systems, supporting end users, and ensuring the security and performance of our infrastructure... and peripheral equipment, Active Directory and virtual environments (VMware). Perform system health checks, monitor system...
such as DFAS, DCAA, and DCMA Track and monitor contract closeout files, both hardcopy and electronic, ensuring proper... Regulation Supplement (DFARS), and NGA regulations Security Requirement(s): Candidates for this position must hold an active...