The Administrative Assistant (IT Department) identifies and records, maintains, monitors, audits, and
documents all Technology Assets in the Asset Management System.
Not exact matches
Specifically, the SEC's action alleges that a registered fund manager invested fund
assets in two high - risk private
technology companies he founded without disclosing the attendant conflicts of interest to investors, and in contravention of fund offering
documents which stated that he would invest fund
assets primarily in publicly traded securities.
The agency denied a Times Union public records request for the
document, arguing its release could «impair imminent contract awards,» endanger «life and safety» and compromise the state's ability to «guarantee the security of its information
technology assets.»
In the
document filed for Google's IPO, they stated that they intended to use the money for «general corporate purposes», and «for acquisitions of complementary businesses,
technologies or other
assets»; i.e., to buy stuff that would help them grow their business.
This transaction work includes advising on purchase agreements, intellectual property portfolios, performing due diligence relating to intellectual property and
technology assets, and preparing and negotiating various intellectual property
documents and agreements.
That being said, a public
document released prior to the meeting noted that «the
technology behind crypto
assets has the potential to promote financial inclusion,» but noted that the impact on financial stability and potential uses in tax evasion and illegal activities needed to be understood first.
Public
documents also show that the main agenda will be to discuss the
technology behind crypto
assets and its potential in promoting inclusion.
The public
document with the meeting agenda indicates that the finance ministers and central bank governors are going to discuss the digital
assets and the underlying
technology.
Although currently the
technology is largely used to verify financial transactions within digital currencies, in theory, and practice it is possible to code and insert any type of
document or digital
asset into the blockchain.
• Balancing money transfer transactions and order receipts • Verifying and preparing deposits and inputting sales and item counts • Compiling and sorting
documents such as invoices, checks and account statements using manual calculators and sophisticated
technology • Maintaining confidentiality of proprietary information and protecting company
assets
• Conducted quantitative analysis, modeling and system approaches •
Documented activities and designed systems with the
technology department • Developed tactical plans for strategic direction • Used independent review and testing on primary market models in the BoA Investment division • Evaluated hedging in the Mortgage Serving Rights
assets
Information
Technology Security Manager — Duties & Responsibilities Manage IT security, customer service technicians,
assets and finances, and client training Responsible for ensuring that multiple IT groups meet finance, audit, and compliance requirements Serve as primary point of contact for customer contracts, technical support, and end - user training Utilize interpersonal and technical skills as liaison between clients, technicians, and subcontractors Train large staffs ensuring they understand the brand and adhere to corporate policies and procedures Oversee the implementation of
asset management processes and procedures Coordinate activities with desktop leads to ensure SOX compliance Validate
asset information, manage defect reports, and submit correct action recommendations Design and implement enterprise - wide security protocols, mainframe / pc policies, & software / hardware packages Collaborate with department managers to identify and address security concerns through IT Security policies Reduce corporate information ricks through implementation of sensitive
document control processes Utilize RACF and Windows / LAN measures to greatly improve user, administrator, and application security Establish and oversee regular system security audits for employers and clients Author and present added value reports, optimization reviews, and overall audit presentations Enhance employee productivity and accountability through the implementation of firewall and tracking software Perform all duties with positivity, professionalism, and integrity Consistently recognized and promoted for excellence in team leadership, customer service, and technical skills
Professional Experience Air Force Office of Special Investigation (AFOSI) 6/2001 — Present Special Agent, Counterintelligence / Criminal Investigator 12th Field Investigations Squadron — Buckley AFB, CO (8/2004 — Present) • Support national security objectives by organizing and conducting sensitive counterintelligence (CI) operations and investigations, achieving USAF, DOD, and US intelligence community strategic objectives across 21 bases in 20 states • Manage sensitive cover
documents for nine agents with zero deficiencies found during an annual audit, ensuring highest level of operational security and directly facilitating the engagement of FIS targets through enhanced trade craft • Conduct background investigations of potential AFOSI applicants to grow department by 15 personnel • Improve AFOSI operations while deployed by mentoring and training agents and providing effective liaison with other federal agencies and Component Command (COCOM) CI representatives • Provide threat awareness briefings to all traveling personnel, safeguarding all research /
technology contracts in area • Recruit and utilize operational
assets to counter multiple FIS threats to the US Strategic Command and national security • Oversee detachment evidence program by implementing 100 % accountability for all items corresponding to investigations impacting the DOD, earning an «excellent» rating during a spot unit compliance inspection