Search Results: 31 vacancies
...documents to include in your application before it is submitted. Your uploaded documents may take several hours to clear the virus scan process.
* After acknowledging you have reviewed your application package, complete the Include Personal Information section as you...
Suggested
Permanent employment
Full time
Temporary work
Part time
Work experience placement
Local area
Remote job
Relocation
Trial period
Shift work
...to a positive shopping experience.
Key Responsibilities:
- Greet customers warmly and provide excellent customer service.
- Scan and process customer purchases accurately and efficiently.
- Handle cash, credit, and debit transactions, ensuring accuracy.
- Apply...
Suggested
...needs to understand and adhere to guidelines on restricted sale items (Alcohol, Tobacco, DVDs)
Report pricing discrepancies to the Scan Coordinator.
Follow established policies and procedures (where applicable) for postage stamps, gift cards, and coupons....
Suggested
Part time
Seasonal work
Local area
...shopping experience for Costco members.
Key Responsibilities:
- Greet and assist customers in a friendly and professional manner.
- Scan and process customer purchases accurately.
- Handle cash, credit, and debit transactions.
- Ensure proper pricing and apply...
Suggested
...discussions.
Participate in corporate business development activities.
Manage project team responsible for document preparation, scanning, indexing and document OCR imaging.
Update and maintain production and quality metrics of projects.
Minimum Requirements
Active...
Suggested
Full time
Contract work
Local area
...capability, service, or pilot identified by the Government as emerging requirements..
Complete and upload into eMASS vulnerability scans using Assured Compliance Assessment Solution (ACAS), and compliance scans (SCAP) on a monthly basis to support Risk Management Framework...
Suggested
Contract work
Local area
...indicators (KPI) and analysis reports to determine process effectiveness and residual risks.
Complete and upload into eMASS vulnerability scans using ACAS, and compliance scans (SCAP).
Develop artifacts in support of system ATOs.
Update the eMASS POA&M for each capability....
Suggested
...Ability to lift and carry items weighing up to [specify weight, e.g., 30 pounds].
- Capability to perform repetitive tasks such as scanning items and operating the cash register.
**Benefits:**
- Competitive hourly wage.
- Employee discount on store merchandise.
-...
Suggested
Hourly pay
Holiday work
Shift work
Afternoon shift
...and security of servers and systems.
Experience hardening servers to DISA standards and Assured Compliance Assessment Solution (ACAS) scans and documenting variances from the guidelines when needed
Perform and document all applicable STIGs.
Sets up administrator and...
Suggested
Permanent employment
Interim role
Shift work
Night shift
Afternoon shift
...authorization profiles, or system administration of Unix or Windows networks/systems including virtual networks.
Experience with ACAS scanning and STIG hardening for servers/networks.
Be capable of managing the servers, which typically involves installing and upgrading...
Suggested
Full time
Part time
Remote job
...processed, utilized, and stored in compliance with federal and institutional guidelines; assists in record management; alphabetizes, files, scans, and ensures all records are accurate and up to date
Assists and acts as backup for other department staff in the performance of...
Suggested
Hourly pay
Full time
Remote job
...ensuring they are stored in an orderly and accessible manner in warehouses, tool rooms, supply rooms, or other areas.
- Pick, pack, and scan orders according to company standards for delivery to stores or shipment to customers.
- Ensure workspace is free of debris and...
Suggested
....
- Ensure that correct labels are on all stored goods.
- Accurately track inventory and report any discrepancies.
- Use RF scanning equipment to track inventory movements and process orders.
Qualifications:
- Previous experience as a material handler or in...
Suggested
...Risk Management Framework
Previous ISSM experience
Knowledge of ACAS, Nessus, SCAP, STIGs, Splunk, system audits, vulnerability scanning, and RMF package development
Current Top Secret clearance
Salary Range: $92,600 - $139,000
The above salary range represents a...
Suggested
Holiday work
Shift work
...the network.
Familiar with secure and reliable connectivity of Enterprise and Cloud Systems.
Responsible for monthly vulnerability scanning of all services for which the RCC-CONUS provides O&M support.
Coordinate any findings with RCC-CONUS system and/or network owners...
Suggested
Permanent employment
Full time
For contractors
Local area
...Operate, maintain, secure, and update all RCC-CONUS server-based systems, to ensure integrity and security, configure, patch, and scan systems to maintain high availability of services
Respond to incident tickets, service requests, restoration of service, and request...
For contractors
Local area
Remote job
...documents to include in your application before it is submitted. Your uploaded documents may take several hours to clear the virus scan process.
* After acknowledging you have reviewed your application package, complete the Include Personal Information section as you...
Permanent employment
Full time
Temporary work
Part time
Local area
Remote job
Relocation
Trial period
...and lifecycle support to all CECOM users at Fort Huachuca. User devices in scope; Laptops, Desktops, Mobile Devices, Printing and Scanning devices. Interfaces with the Fort Huachuca Network Enterprise Center (NEC) personnel on behalf of customers advocating prompt resolution...
Contract work
For contractors
...and accuracy and assist with development of security related TTPs, SOPs, processes, plans, or diagrams
Use automated security scanning tools (SCAP, ACAS, BNA, etc.) to identify potential vulnerabilities
Analyze and report findings to technical teams and leadership...
For contractors
Local area
...system security documentation is developed, maintained, reviewed, and updated on a continuous basis
Conduct required IS vulnerability scans according to risk assessment parameters.
Develop Plan of Action and Milestones (POAMs) in response to reported security...