Smarter prices start with HR-reported pay data
Employees: Get a Salary Increase
Develops, implements, and maintains classified security programs and protocols in accordance with all relevant government standards and regulations for the management of classified information and materials. Ensures that staff, consultants, and visitors possess appropriate security clearances and handle documents and materials appropriately. Monitors access to, and security of, controlled facilities or information. Identifies potential weaknesses or risks and suggests revisions or improvements to management. Briefs and trains personnel on proper security procedures and protocols. Investigates more...
Supervises a team of security officers and guards that ensure the physical safety of all visitors, employees, or customers to the organization's facilities and the security of property and assets. Schedules guard shifts. Conducts audits and inspections of buildings and grounds to ensure protection from intruders, fire hazards, theft, and vandalism. Follows protocols for the monitoring of systems and alarms, and procedures for response to issues. Ensures that all security events are logged, documented, and reported using standard procedures. Trains staff and establishes plans for crisis respons more...
The Document Security Administrator II classifies and files new documents following the established process. Administers and maintains a system of classified and unclassified company documents according to the record control policies and procedures for the secure management and access of company information assets. Being an Document Security Administrator II may prepare records for archiving, participate in audits, or assist in the destruction of records. Fulfills document requests from authorized users and tracks the retrieval and disposition of documents. In addition, Document Security Admin more...
The Classified Security Compliance Administrator II ensures that staff, consultants, and visitors possess appropriate security clearances and handle documents and materials appropriately. Develops, implements, and maintains classified security programs and protocols in accordance with all relevant government standards and regulations for the management of classified information and materials. Being a Classified Security Compliance Administrator II identifies potential weaknesses or risks and suggests revisions or improvements to management. Monitors access to, and security of, controlled facil more...
Leads a team in developing, implementing, and maintaining classified security programs and protocols in accordance with all relevant government standards and regulations for the management of classified information and materials. Ensures that staff, consultants, and visitors possess appropriate security clearances and handle documents and materials appropriately. Monitors access to, and security of, controlled facilities or information. Oversees projects to identify potential weaknesses or risks. Briefs and trains personnel on proper security procedures and protocols. Investigates any security more...
Supervises the implementation and administration of information systems and equipment in accordance with organizational policies and goals. Implements internal procedures and guidelines to diagnose and resolve technical issues across different systems and technologies, including hardware, software, and networks. Analyzes business needs and recommends IT hardware and software products to support internal business processes. Develops detailed documentation of methodologies, processes, and specifications of an organization's IT systems and coordinates and schedules IT initiatives. Monitors inform more...
Supervises a team of security officers and guards that ensure the physical safety of all visitors, employees, or customers to the organization's facilities and the security of property and assets. Schedules guard shifts. Conducts audits and inspections of buildings and grounds to ensure protection from intruders, fire hazards, theft, and vandalism. Follows protocols for the monitoring of systems and alarms, and procedures for response to issues. Ensures that all security events are logged, documented, and reported using standard procedures. Trains staff and establishes plans for crisis respons more...
The Information Systems (IS) Supervisor II implements internal procedures and guidelines to diagnose and resolve technical issues across different systems and technologies, including hardware, software, and networks. Supervises the implementation and administration of information systems and equipment in accordance with organizational policies and goals. Being an Information Systems (IS) Supervisor II develops detailed documentation of methodologies, processes, and specifications of an organization's IT systems and coordinates and schedules IT initiatives. Analyzes business needs and recommend more...
The IT Operations Supervisor II implements internal procedures and guidelines to diagnose and resolve technical issues across different systems and technologies, including hardware, software, and networks. Supervises the implementation and administration of information systems and equipment in accordance with organizational policies and goals. Being an IT Operations Supervisor II develops detailed documentation of methodologies, processes, and specifications of an organization's IT systems and coordinates and schedules IT initiatives. Analyzes business needs and recommends IT hardware and soft more...
Supervises professionals in the development, implementation, and maintenance of standards and systems that will ensure secure information systems and data. Implements standards and audit procedures to identify and resolve security violations. Conducts disaster recovery and cyberattack preparation and training. May require a bachelor's degree in area of specialty. Typically reports to a manager or head of a unit/department. Supervises a group of primarily para-professional level staffs. May also be a level above a supervisor within high volume administrative/ production environments. Makes day- more...
Simplify survey management, participation, and analysis with a single, centralized library for all your compensation data sources. Streamline your survey selection, data loading, participation, and analysis. Automatically participate in surveys with one-click exports to third-party survey participation templates.
An accurate job description starts with collaboration.
With JobArchitect you can share job descriptions with hiring managers and others in your organization and easily manage the review and approval process using the centralized command center.
Get comprehensive, reliable US compensation data for your specific industry, company size, and labor market.
Browse our complete catalog, showcasing more than 30 regional and global surveys with all the information and data points you need to get pay right.
Adjust Employee SalaryIndividualize employee pay based on unique job requirements and personal qualifications. |
|
Price My Industry JobsGet the latest market pricing for benchmark jobs and jobs in your industry. |
|
Individualize employee pay based on unique job requirements and personal qualifications.
Get the latest market pricing for benchmark jobs and jobs in your industry.
Analyze the market and your qualifications to negotiate your salary with confidence.
Search thousands of open positions to find your next opportunity.