Search Results: 8,766 vacancies
...IT Purchasing Analyst
Direct Hire
Addison, TX (Hybrid)
Responsibilities:
Monitor daily intake of purchase requisitions and ensure timely processing within established service levels.
Review requisitions for completeness and proper approvals.
Proactively...
Suggested
Contract work
...Innova solutions is hiring for an Information Security Analyst.
Title: Information Security Analyst
Locations: Irving, TX Charlotte... ...their fields.
Recent Recognition's:
One of the Largest IT Consulting Staffing firms in the USA - Recognized as #4 by...
Suggested
Contract work
Temporary work
Work experience placement
Worldwide
Flexible hours
...Innova Solutions is immediately hiring for Information Security Analyst Position type: Contract (W2)
Location: Irving, TX
As an Information... ...their fields.
Recent Recognitions:
One of Largest IT Consulting Staffing firms in the USA - Recognized as #4 by...
Suggested
Hourly pay
Contract work
Temporary work
Work experience placement
Immediate start
Worldwide
Flexible hours
...Position Type: Contract
Duration: 12+ Months
Position: Information Security Analyst
Location: Irving TX
Required Qualifications:
~4 years of Information Security Analysis experience
Must Have Skills:
Disaster recovery...
Suggested
Hourly pay
Contract work
Temporary work
Work experience placement
Immediate start
Worldwide
Flexible hours
...documentation, etc.
Create User Acceptance test plans in collaboration with the business managers/stakeholders, business users, business analysts, IT teams, and project managers.
Monitor User Acceptance Testing [execution] efforts and work with users to record and mitigate...
Suggested
Permanent employment
..., New York, Dallas, and Seattle. (url removed)
Location:
Highgate Corporate Offices Irving, TX
Overview:
The Director of IT Security will oversee all security responsibilities for both the hotel level and corporate operations. The position will require both a technical...
Suggested
Permanent employment
Overseas
...terms of compliance including conducting vendor risk assessments, security and compliance standards, data governance, and contractual... ...throughout the firm.
Conduct regular audits and assessments of IT systems and processes to identify and mitigate compliance and security...
Suggested
For contractors
Fixed term contract
Local area
...Job Description Job Title: Cybersecurity Analyst
Job Location: DownTown Dallas, TX (... ...implementing, managing, monitoring, and upgrading security measures for the protection of the... ...Qualifications
A degree in computer science, IT, systems engineering, or related...
Suggested
Full time
Work experience placement
...career development has created tenure and loyalty that enables us to perpetuate our family atmosphere.
Job Description:
As an IT Security Administrator, you will play a critical role in ensuring the confidentiality, integrity, and availability of Omnis information...
Suggested
...will report to the Vice President of Information Technology (VP IT) and will be key in developing and implementing IT strategy and... ...platform technologies. Develop business cases for change
Lead IT security efforts, including timely application of critical patches, and...
Suggested
Permanent employment
Temporary work
Remote job
...work independently and be responsible for the daily operation and continuous tuning of Information Security systems to maintain and improve the overall security of the IT environment. The role will lead efforts to work across the lines of business to encourage their participation...
Suggested
Operation Support Analyst
The Operations Support Analyst is a member of the Operations Support Team which has a primary responsibility in maintaining system availability. The Operations Support Analyst provides knowledge and skills in a multi-faceted environment of App...
Suggested
Permanent employment
Temporary work
Work from home
Flexible hours
...About Us:
Perfict Global is a leading IT consulting services provider focused on providing innovative and successful business workforce solutions to Fortune 500 companies. Our trained and experienced professionals constantly strive to bring together the best technologies...
Suggested
...impact and be valued just for being you!
OVERVIEW
The Security Analyst will work in a dynamic, fast-paced environment as part of the... ...standards 27001 and 27701
Performs required internal audits of IT, Security and Privacy controls and processes
Assists in...
Suggested
Relocation
Overview:
The IT Purchasing Analyst I is responsible for administering and coordinating all purchasing functions related to the acquisitions of IT hardware, software, and services at the lowest cost possible, while also maintaining exceptional quality and service standards...
Suggested
Contract work
Work experience placement
Immediate start
...strong culture with career opportunities for our people.
Across IT we are on an exciting mission to ensure we harness our growth... ...innovate and this is where you come in...
Life as a Business Analyst at CES/City IT:
As a Business Analyst at City IT, you will...
Local area
Remote job
Work from home
...leader in our industry! We are currently looking for an IT Senior Business Analyst to join our team!
The IT Senior Business Analyst is... ...participate in E-Verify. For more information go to E-Verify is a registered trademark of the U.S. Department of Homeland Security.
...Area: Information Technology (ITM)
Career Stream: IT Infrastructure (INFR)
Role: Analyst (ANA)
Job Title: Analyst, IT Infrastructure
Job... ...environment, ensuring the ongoing reliability, performance and security of the infrastructure. This includes monitoring and up...
...Job Description
JOB TITLE: Level 1 IT Analyst
DEPARTMENT: Information Technology
FLSA: Exempt
REPORTS TO: IT Infrastructure Manager
SUMMARY:
The IT Analyst ensures the day-to-day technology needs of associates are supported across multiple hardware platforms...
Work experience placement
Remote job
Afternoon shift
...Responsibilities:
The Technology Risk Analyst is responsible for supporting both Information Technology and Information Security in all aspects of end-to-end technology/information... ...and provide security risk guidance for IT projects, including the evaluation and recommendation...