find the right job for you in USA


Information Technology Specialist jobs in clifton USA

5 information technology specialist jobs found in clifton: showing 1 - 5

Canine Handler - Explosive Detection
Company: Allied Universal |

Location: Passaic, NJ, USA

| Salary: unspecified | Date posted: 26 Nov 2024
, under Allied Universal Enhanced Protection Services, is hiring a Canine Training Specialist a Explosive Detection Canine (K9... their safety and well-being Adhere to all regulatory or other protocols, including the use of any required technology...
Canine Handler - Explosive Detection
Company: Allied Universal |

Location: Passaic, NJ, USA

| Salary: unspecified | Date posted: 26 Nov 2024
, under Allied Universal Enhanced Protection Services, is hiring a Canine Training Specialist a Explosive Detection Canine (K9... their safety and well-being Adhere to all regulatory or other protocols, including the use of any required technology...
Crm Product Development Specialist
Company: Kumon |

Location: Rutherford, NJ, USA

| Salary: unspecified | Date posted: 19 Oct 2024
to be in the Rutherford, NJ area.*** Requirements: Bachelor's Degree in computer science, information technology, or a related... annually to support their growth. Position Summary: The CRM Product Development Specialist will be responsible...
Medical Assistant
Company: UnitedHealth Group |

Location: Clifton, NJ, USA

| Salary: $16 - 28.27 per hour | Date posted: 14 Sep 2024
York, New Jersey and Connecticut. Work with state-of-the-art technology and brilliant co-workers who share your passion..., such as ensuring specialist appointments are scheduled and referrals are prepared All OPTUM employees are expected to keep abreast...
Specialist, Info Sec Sys Engineer Secret - Clifton, Nj Or Palm Bay, Fl
Company: L3Harris Technologies |

Location: Clifton, NJ, USA

| Salary: unspecified | Date posted: 30 Aug 2024
Job Title: Information Security Systems Engineer Job Code: 13289 Job Location: Multiple (Clifton, N.J., Palm Bay, FL...-art secure systems, networks, and database products. Uses methods such as encryption technology, vulnerability analysis...