Field Artillery Recruit Now Hiring Full and Part Time Positions Job Overview: Your role is vital in defending our country and ensuring victory on the battlefield. As a Field Artillery Specialist, you will operate advanced weaponry using cutting-edge...
Pride Health is hiring a “Phlebotomy - Phlebotomist I” to support our client's medical facility-based “Jacksonville FL 32250”. This is a 4-months assignment (Possibility of extension or...
The Customer Care Specialist delivers responsive, empathetic support to customers across phone, email, and chat. This role helps ensure a smooth, positive customer experience by resolving issues, answ
They should have an interest in advanced electronics and technology; exceptionally good character; good speaking, writing, and record-keeping skills; a good working aptitude for math; and the capability to do highly detail-oriented, highly classified work. Their responsibilities include: - Monitorin
As a computer scientist, you will conduct forensic analysis; perform reverse engineering; and develop software solutions using advanced programming languages like Python, Java, Swift, C++, and C. We employ individuals who are not only ready to enhance their technical proficiency in areas such as pen
Seeking Motivated Individuals To Participate In National Focus Groups Studies.
Since 2010 SynergisticIT has helped Jobseekers get employed in the tech Job market by providing candidates the requisite skills, experience and technical competence to outperform at interviews and at
Our high-profile technology Client is seeking an Annotator for a REMOTE contract assignment. As a Data Annotation Analyst - Korean Language, you will be part of the Data Quality...
Write complex Structured Query Language (SQL) to extract, transform, and analyze data from databases. Conduct regular system testing and troubleshoot BI tools. Maintain current knowledge of emerging BI tools, cloud platforms, and industry trends, proactively recommending new technologies and methods
As a computer scientist, you will conduct forensic analysis; perform reverse engineering; and develop software solutions using advanced programming languages like Python, Java, Swift, C++, and C. We employ individuals who are not only ready to enhance their technical proficiency in areas such as pen
Cloud Security Engineer – AWS Vulnerability Misconfiguration Management Chicago, Illinois;Charlotte, North Carolina; Denver, Colorado; Jacksonville, Florida; Boston, Massachusetts To proceed with you
School Base Career Fair Tuesday September 9th, 2025 9:00AM to 2:00PM 20612 NW 27 Ave, Miami Gardens, FL 33056 We are hiring...
Make extra cash taking surveys, testing products and participating in paid studies.
Under the direction of the Port Manager and Operations Manager, the Boarding Agent is responsible for the coordination of all agency, husbandry, and administrative functions associated with individual vessel calls assigned to the Port...
Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews. Analyze DISA Security Technical
Why Deliver with DoorDash? DoorDash is the #1 category leader in food delivery, food pickup, and convenience store delivery in the US, trusted by millions of customers every day. As a Dasher, you'll stay busy with a variety...
About the RoleAs a Package Handler at FedEx, you'll play a crucial role in ensuring that packages are efficiently sorted, loaded, and unloaded for delivery. You'll work in a fast-paced environment, ha
Technician, Field Svc I- Gainesville, FL US-FL-Jacksonville Job ID: 33583 Type: Full-Time # of Openings: 1 Category: Field Service FL - Jacksonville About the Role...
Candidates seeking an Officer position in this community must have a bachelor's degree from a regionally accredited institution in a technical field, preferably in one of the following fields: Information Systems, Electrical Engineering, Computer Engineering, Information Operations, Computer Science
Generate and update test plans; conduct testing of the system components using the Assured Compliance Assessment Solution (ACAS) tool, implement Security Technical Implementation Guides (STIG), and conduct Information Assurance Vulnerability Management (IAVM) reviews. System Hardware/Software/Inform