Skip to content
The Infantry is the backbone of the Army. These Soldiers fill the literal boots on the ground who are responsible for taking or holding ground during any combat operation. You'll attack, repel, and capture enemy ground forces using advanced weapons and tactics. Job Duties Assist in reconnaissance operations Employ, fire, and recover anti-personnel and anti-tank mines Operate weapon systems under various conditions, including engaging targets using night vision sights Operate and maintain communications equipment Perform as a member of a fire team during training and combat missions Process... more ->
About this role Wells Fargo is seeking a Cyber Defense Senior Lead Business Execution Consultant. This role will lead key transformation initiatives for Wells Fargo enterprise Cyber Defense Management. This role will have program level responsibilities for ensuring the success of large, strategic programs in Data Loss Prevention, Threat Intelligence, Detection & Response, Threat Prevention that have organizational wide impact. These initiatives will require high executive engagement, strong organizational and communication skills, and the ability to lead broad transformative programs. In this... more ->
Introduction The Charlotte-Mecklenburg Police Department is a highly respected law enforcement agency, both in our community and nationally. Our progressive department provides exciting opportunities for law enforcement professionals to develop partnerships with our citizens in order to prevent the next crime, and to enhance the quality of life within our community always treating people with fairness and respect. The department employs nearly 2,000 sworn officers and over 500 civilians serving a jurisdiction with close to 1 million people. Our employees are men and women from diverse... more ->
Position Summary . What you'll do . Threat Analysis and Dynamic Defense Requires knowledge of Types of threats or malware; Patterns of common malware characteristics; Mechanism of malware; Various file formats of malicious threat types; Programming languages used to create malware; Types and usage of static, dynamic, and behavioral analysis tools; Industry developments and trends in threat analysis and defense; New and emerging techniques in threat analysis. To verify cyber threat analysis outcomes and reports. Recommends proactive steps to combat and mitigate malicious code, threats, and... more ->
Become a part of our caring community and help us put health first Are you a transitioning military service member or a Military Spouse looking for an internship that supports the goal to put health first? During the period of this unpaid internship, you will work with The Learning Design team to help create dynamic and interactive training material for Humana Healthy Horizons (Medicaid program) utilizing experience, storytelling and skillsets acquired from the military experience and education. Work assignments are varied and frequently require creativity and independent determination of the... more ->
As an Army National Guard Indirect Fire Infantryman, you'll be in charge of the Infantry's most powerful weapon - the mortar. As part of a mortar squad, section, or platoon, you will perform challenging activities that may include parachuting from a troop transport airplane to access locations where you will construct mortars and camouflage their positions. You'll also locate and neutralize enemy mines. As your skills increase, so will your responsibilities. Advanced team members supervise and train other Soldiers, lead and control mortar squads, provide tactical and technical guidance to... more ->
CONQUERING CYBERSPACE With the constant evolution of today's technology, information and communications can be optimized like never before. Responsible for a wide range of weaponry, training and intelligence efficiencies, Cyberspace Operations Officers are the foremost experts on the vast world of cyberspace. From computerized, satellite and airborne communications to postal operations and tracking systems, these irreplaceable assets play a critical role in planning missions and ensuring the effectiveness of our cyberspace capabilities. REQUIREMENTS You must meet several requirements before... more ->