- Lockheed Martin (Fort Worth, TX)
- **Description:** This position is for a Cyber Security Engineering \(CSE\) F\-35 Control Account Manager \(CAM\)\. In this capacity, the candidate will ... Bachelor's Degree from an accredited institution\. Current or previous experience as a Labor Control Account Manager \(CAM\) and with Earned Value Management… more
- DR Horton, Inc. (Arlington, TX)
- …the IT Security Team and IT Controls Team reporting directly to the IT Cyber Security Risk Officer. Develop policies and procedures to ensure the organization has ... * Responsible for weekly status reporting to the IT Cyber Security Risk Officer, escalation of issues and written...procedures and external regulations including monthly, quarterly and annual account activity review * Manage day to day compliance… more
- Regions Bank (Dallas, TX)
- …including but not limited to stability, life cycle management, version control , design and development, mapping of business requirements to capability oriented ... existing architectural principles and patterns + Works closely with Cyber Security to understand network, application, and data security...the office three or more days a week. The manager will set the work schedule for this position,… more
- Signature Aviation (Dallas, TX)
- …secure ramps and operations. + Fuel handling, including fuel quality control , fuel receipt, inventory and maintaining accurate related documentation. + Understand, ... if the work continues. Report concerns to the appropriate manager and cooperate in addressing the unsafe act or...+ Understand, comply with, and enforce all security (physical, cyber and data) protocols as dictated by both Signature… more
- Signature Aviation (Dallas, TX)
- …secure ramps and operations. + Fuel handling, including fuel quality control , fuel receipt, inventory and maintaining accurate related documentation. + Understand, ... if the work continues. Report concerns to the appropriate manager and cooperate in addressing the unsafe act or...+ Understand, comply with, and enforce all security (physical, cyber and data) protocols as dictated by both Signature… more