44 security-"https:"-"https:"-"https:"-"https:"-"IFM" positions at Texas A&M University System
Sort by
Refine Your Search
-
to solve the toughest challenges for our nation's security. The System Offices, within the Texas A&M University System, provides an outstanding benefits package including, but not limited to: competitive
-
are security-sensitive. Applicants are subject to a criminal history investigation, and employment is contingent upon the institution’s verification of credentials and/or other information required by
-
direction of the liaison, provide administrative support to the System Police Chiefs council and assist with mitigation efforts related to the Jeanne Clery Disclosure of Campus Security Policy and Campus
-
to your completed application: Resume List of References (3) All positions are security-sensitive. Applicants are subject to a criminal history investigation, and employment is contingent upon
-
(CoPs). - Demonstrated success in securing and managing philanthropic or federal grants. Other Requirements: This is a security-sensitive position and is restricted to U.S. citizens and legal permanent
-
of the IPG's camera, radar, and network capabilities to optimize event coverage. - As required, function as the Range Officer in Charge and/Range Safety Officer for support to both internal and external events
-
: This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices
-
the operational heartbeat of a major program, and contributing to national security impact, this is a rare and meaningful opportunity. The Texas A&M University System provides its employees with competitive
-
security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be considered for employment at The Texas A&M System Offices. Incomplete job
-
performance, troubleshoot issues, and coordinate with vendors for resolution. - Manage user access, roles, and permissions in accordance with security policies. - Support the implementation of SaaS applications