- Alaska Airlines (Honolulu, HI)
- …airline people love, we want to hear from you. **Role Summary** The Senior Audit Data Analytics Specialist is a subject matter expert in data ... analysis. + Serve as a subject matter expert in business intelligence tools and data platforms to drive self-service analytics across teams. + Translate complex … more
- Datavant (Honolulu, HI)
- …or communications experience + Experience in content marketing/communications + Experience with data analytics and reporting + Ability to manage multiple ... Datavant is a data platform company and the world's leader in...Datavant's Corporate Communications team is seeking a detail-oriented publishing specialist to lead the creation and optimization of dynamic… more
- Leidos (Hickam AFB, HI)
- …challenge?** The National Security Sector at Leidos currently has an opening for a Senior Counterintelligence Specialist to work in Honolulu, HI. This is an ... + Conduct research on classified and unclassified systems to acquire relevant data and create comprehensive intelligence products. + Provide CI analytical and… more
- SAIC (Camp Smith, HI)
- …SAIC is seeking a highly qualified **Military Joint Information Management Specialist ** to support the **Pacific Multi-Domain Training and Experimentation Capability ... and Analysis:** Conduct comprehensive research on the PMTEC program, analyze relevant data , and produce professional articles and papers that inform and influence… more
- Norstella (Honolulu, HI)
- …years) working in Clin Dev/Ops roles within Sponsor/CRO/Partner environment + Experience using data analytics and services to solve clinical trial challenges + ... solutions and expert advisory services alongside advanced technologies such as real-world data , machine learning, and predictive analytics . **The Team** The… more
- KBR (Pearl City, HI)
- …environments. This role involves user activity monitoring (UAM), behavioral analytics , risk assessments, and coordination with counterintelligence and law ... enforcement teams to prevent data breaches, unauthorized disclosures, and sabotage by trusted insiders....solutions to detect anomalies. - Correlate security logs, behavioral analytics , and access patterns to identify indicators of potential… more