Appointment Setter
Onsite training, Fully Remote pending performance after – Columbus, OH (Training onsite)
Responsibilities:
Qualifications:
ABOUT EIGHT ELEVEN:
At Eight Eleven, our business is people. Relationships are at the center of what we do. A successful partnership is only as strong as the relationship built. We’re your trusted partner for IT hiring, recruiting and staffing needs.
For over 16 years, Eight Eleven has established and maintained relationships that are designed to meet your IT staffing needs. Whether it’s contract, contract-to-hire, or permanent placement work, we customize our search based upon your company's unique initiatives, culture and technologies. With our national team of recruiters placed at 21 major hubs around the nation, Eight Eleven finds the people best-suited for your business. When you work with us, we work with you. That’s the Eight Eleven promise.
...consistent results. If you have experience selling into Dental practices and have established contacts in the industry, this... ...fit for you! Territory: Greater Montreal area Work Place: Work from home and occasional visits to the downtown Montreal office...
Join to apply for the City Walk Security Officer role at Allied Universal2 weeks ago... ..., North Americas leading security and facility services company, offers rewarding careers... ...Other, Information Technology, and ManagementIndustriesProfessional Services#J-1...
...recruiter to learn more.Base pay range $70.00/hr - $75.00/hrJob Description: 10 - 12 Years of ExperienceExperience in implementing Data Governance OrganizationExcellent knowledge of various DG Operating models, roles, and responsibilities for DG RolesExperience with DG...
...working alongside some of the sharpest and most creative minds around, pushing the boundaries of B2B marketing? If you work well in an agency environment where growth is the norm, collaboration is king, and autonomy is encouraged, then youll thrive here. Even when...
...and infrastructure are designed and implemented to the highest security standards. Performs technical security assessments, code reviews... ...DREAD, KILL CHAIN, CAPEC, Mobile Application threat model, Cyber Threat Tree, and data flow diagram Subject matter expert in...