CV, Curriculum Vitae and Online Resumes Search
Recruiters - Try Postings!
Postings.com™ is a must-have for recruiters who want to:
- Find Qualified Candidates
- Find Job orders and Post Splits
- Be Found in Search Engines
- Implement a Social Sourcing Strategy
Job Seekers - Look Here!
Hitting a wall with your job search? Try Climber Premium.
- Top the Search Engines
- Unsurpassed Candidate Marketing
- Power Career Networking
- Fresh Jobs from the Net
Were you looking for Threat-Mitigation job results?
Click Here to search for Threat-Mitigation in our 2.4M jobs.
Online Resumes with "Threat Mitigation"
To obtain a challenging position managing a Corporate Security unit involved protecting the enterprise assets and investigating violations of the standards of integrity.
To obtain a Business Continuity / Disaster Recovery / Threat Mitigation position within an organization.
Experienced senior Security Professional with over 15 years of experience in the Law Enforcement and Government Diplomatic Security Operations seeking a Security Manager position in Houston, Texas. •Over 10 years supervisory experience in the commercial arena; 6 of which are in Government Security Management Operations •Bachelors Degree in Security Administration specializing in Program Management, Asset Protection, Emer...
I currently work Critical Infrastructure Protection for Homeland Security for the State of Arizona. I'm also Hazardous Materials Technician since 2004. I would like to take my 22 years of experience to the private sector and offer my skills and training to a company looking to improve it's security and counter-terrorism measures to provide a better working environment for their staff and employees.
Ideal Companies: Private sector companies looking for a security person to conduct risk and threat assessments and critical infrastructure protection.
I am an extremely dedicated employee that works well independently and with others. My coworkers know that they can come to me with any questions that they have and if I do not know the answer, I will find it. My goal is to obtain a position that can challenge my current technical expertise and practical business experience within a company that can offer long term growth and opportunity for advancement. I have studied the ...
I am interested in a job that allows me to utilize my expertise in investigation, personal security, both within the country (workplace violence, internal investigations) and travel safety, crisis management and threat mitigation expertise to improve the security of all aspects of an organization.
SKILLS SUMMARY Program Management Anti-Terrorism Physical Security Operational Security Operations Planning Surveillance Detection Terrorist Threat Mitigation Individual Protection Measures Evasive Driving Intelligence Predictive Profiling Emergency Management Continuity of Operations Program Security Management Leadership Electronic Surveillance Assessment and Inspection Instructor Restraint Neutralization Command and Cont...
have minimum to no impact to the business processes. Leverage extensive experience in driving Security and Privacy solutions that drive business developed with threat mitigation and compliance to ensure the protection of the company�s assets. Highly adaptable in managing and achieving security and privacy initiatives with limited budget and resources.
Tags for this Online Resume: Security, Security Administrator, Information Security, Policies and Procedures, Audit, Business Continuity Planning, CIS (Ibm Customr Info Sys), Framework, Health Insurance Portability And Accountability Act, IBM OS/390
ACCOMPLISHMENTS * Mentored, lead and served as liaison between project-oriented teams and team members, technical teams and contractors, of 25 members or more to ensure an accurate implementation and reporting of IT operations & IT security solutions * Implemented cost-effective business solutions using IT automation, communicating with all stakeholders on their needs and leading IT teams * Provided comprehensive secure net...
Tags for this Online Resume: Compliance, Disaster Recovery, Disaster Recovery Planning, Leadership, Planning, Business Contingency Planning, Information Technology, C Programming Language, Firewall, Integrate
National Industrial Security Program Operating Manual (NISPOM) and DSS Assessment and Authorization Process Manual (DAAPM) Version 2.0 in meeting security risk design secure research analysis existing innovative technologies Aeronautics, Aero IT and EBS Internet of Things (IIoT) devices perform security test utilizing various security scanning tools manage the cyber security assessment & analysis process knowledge of compu...