Find Your Job
Land your next skilled labor or traveling craftsman job with NSC. Start your search today.
Job Title: Travel Security Technician Location: Monroe, LA Pay rate: $20-$35/hr Company Summary: Our client is a proven leader in the Low Voltage industry, offering a high level of professional expertise to their partners. Position Summary: Anistar is seeking experienced CCTV security technicians for an opportunity aiding…
Job Title: Communications Systems Technician Pay Rate: $25-30/HR Location: Bowling Green, KY Position Summary: Anistar Technologies is seeking a Field Technician to perform maintenance/installation of two way radios, base stations, repeaters, mobile devices, portable devices, wireless broadband devices, and CCTV equipment. Responsibilities: Familiarity with antennas, necessary cabling and grounding, and…
Job Title: Cable Technician Location: Bowling Green, KY Company Summary: Our client is a proven leader in the communications industry, offering a professional level of cabling expertise to their partners. Having been around for over forty years, our client provides the resources necessary for their team members to…
Job Title: Security Technician Location: Louisville, KY Salary: $25 - $30+ Position Summary: Anistar Technologies is seeking a Security Technician to install and service access control, CCTV, and surveillance systems.The position supports the security solutions business by installing and troubleshooting newly installed electronic security encompassing intrusion detection, access…
Job Title: Network Engineer Location: Honolulu, HI Salary: $90-140k Company Summary: Our client is a proven leader in information technology, innovative strategic technical planning, and program management offering a professional level of expertise to their partners. Having been around for over twenty years our client provides…
Job Title: Cyber Security Analyst Location: Honolulu, Hawaii Secret required but TS preferred. Salary: $100K/yr - $120K/yr (onsite full time) Responsibilities: Monitors systems and networks for unauthorized infiltration, modification, destruction, exfiltration, or disclosure. Analyzes volumes of logs, network data, and output from firewalls, intrusion detection…