Skip to content
*InTulsa is partnering with Girl Scouts of Eastern OK to find candidates for this exciting role in Tulsa* *Location: Tulsa, OK. This is an onsite position for those already in Tulsa, OK or willing to relocate to Tulsa, OK* Job Summary The Chief Development Officer (CDO) is primarily responsible for related comprehensive strategic planning, implementation, management, and oversight of all fundraising and donor relations activities across the council with staff assigned in this functional area. The CDO will manage day-to-day fundraising operations including research and prospect identification,... more ->
Leonardo DRS is a prime contractor, leading technology innovator and supplier of integrated products, services and support to military forces, intelligence agencies and defense contractors worldwide. The company specializes in naval and maritime systems, ground combat mission command and network computing, global satellite communications and network infrastructure, avionics systems, and intelligence and security solutions. Additionally, the company builds power systems and electro-optical/infrared systems for a wide range of commercial customers. Headquartered in Arlington, Virginia, Leonardo... more ->
Information Technology Governance and Privacy - Financial Industry SALARY: $115k - $120k plus 15% bonus LOCATION: Chicago, IL Hybrid 3 days onsite and 2 days remote, Looking for candidate with information technology data governance to support development and implementation of information governance data protection. The Associate Principal, Information Governance and Privacy (reporting to the Privacy and Data Protection Officer) is responsible for supporting the development and implementation of information governance, data protection, and privacy program. This includes supporting the... more ->
Description Are you an IT Security engineer using Splunk? Do you thrive in a fast-paced and innovative environment? If so, we may have a position for you! We are seeking an IT Security Auditor for APL's Classified IT Services team. We provide technical expertise to meet compliance and security objectives in environments that require Audit & Logging Operations, Incident Identification, and Incident Response Coordination. The Auditor will be a valued team member responsible for performing auditing of five classified security enclaves using Splunk, as well as operations and maintenance of the... more ->
The primary function is to implement a community-wide security education, awareness, and training program within the Air Force Special Access Program community. * Up to $10k signing bonus. Performance shall include: Interpret customer needs and through collaboration with subject matter experts and independent research, support the development of effective, high-quality training materials on matters pertaining to the full scope of the JAFAN and DCID series of publications Incorporate Executive Orders and any other applicable regulatory documentation governing the protection of national... more ->
What you will do ? As a Security & Fire Electrical Installer under specific supervision, performs routine installation and checkout on a variety of systems utilizing codes, company procedures, engineering drawings and personal analysis. Works with "Prime" electrical contractors as required. Develops a positive interface with the customer to ensure confidence and satisfaction with the system installation.? How you will do it ? Installs raceways, cables and wiring to meet local or national codes, standards, and customer system requirements.? Mounts and terminates S&F equipment as needed.? May... more ->
Pay: $0 per year - $0 per year A Great Wolf, the Security Manager organizes and oversees all security operations of our lodge. Security attendants will be under your leadership while you develop and implement policies and procedures to maintain security standards. The goal is to create and preserve an environment where employees, visitors and property are safe and well protected. Essential Duties & Responsibilities Responsible for personnel related actions within the Security team including: hiring, orientation, training, coaching, feedback, discipline, and scheduling of employees Oversees... more ->
Job Summary: Be a key player in our Information Security team as a Remediation Analyst, focused on strengthening our cybersecurity posture. In this role, you'll collaborate closely with system owners, taking charge of remediation efforts for findings identified by our Information Security department. Your role is crucial in ensuring our systems adhere to top-tier security standards. If you're passionate about translating security insights into actionable solutions and enjoy the challenge of securing digital landscapes, we invite you to join us. Apply now and be instrumental in fortifying our... more ->
What you will do? Reporting within the Johnson Controls security business, directly to a Security Sales Manager, this role's main focus is to secure Planned Service Agreements with new and existing customers. This role serves as the subject matter expert for video services and digital services, including proactive health, and more. The job responsibility for this position is two-fold. One, to reactivate, add-on, make minor modifications to out-of-service locations. Resales represent a critical need for JCI. Not only do Resales help us recapture valuable recurring revenue, but they also bring... more ->
This position will be responsible for the installation of complex integrated security systems to include the wiring, equipment and programming of access control systems, CCTV, digital recorders, network recorders, and intercom systems for clients. How you will do it Capable of installing cabling, field equipment & control equipment enclosures in customer locations according to the national electric code, company and customer guidelines. Can use electronic test equipment to troubleshoot complicated problems during installation. Reads and interprets blueprints, diagrams, submittals,... more ->
Essential Functions: - Manage threat and vulnerability using CrowdStrike, Qualys, and Splunk. - Implement and maintain security infrastructure, including intrusion protection, firewalls, endpoint solutions, and SIEM (Splunk). - Handle security events and incidents, document procedures, and automate tasks. - Develop and document security procedures, standards, and guidelines. - Identify security risks and create mitigation plans. - Promote security awareness and training. - Conduct technical risk assessments, manage security testing results, and coordinate response actions. - Collaborate with... more ->