We are the largest home cleaning company in Georgia with multiple locations around Atlanta. You're a real W-2 employee, paid every Friday, benefits, paid time off, and more.
1+ YEARS Verifiable PROFESSIONAL HOME CLEANING EXPERIENCE required.
If you have 1+ years of verifiable professional home cleaning experience, this will be the best cleaning job you've ever had. We provide you with all the equipment, supplies, and a full schedule to work from home.
Pay rates:
And it goes beyond the highest pay in the metro area as a real W-2 employee. We take care of our people better than any maid company, in everything we do. We treat you like a professional, with the highest regard. And that is why our employee turnover is almost zero for this position. Our cleaners love us, find out why.
...Leading writer of Property & Casualty Reinsurance seeking an IT Lead/ Manager IT Support Services in their NY office managing strategic initiatives and workflows, communications and team requirements for the global operations team. I have been supporting this client...
...collide. Why Join Us You want to work on problems that actually matter ... ...schematics, harness drawings, CAD models, assembly docs, and anything else needed to build... ...support, downtown SF workspace with full electronics/mech prototyping tools, 401(k), high-spec...
...Able to work independently Strong attention to detail Professional attitude and appearance Ability to perform physical tasks, including lifting up to 25 lbs Cleaning experience preferred but not required Why Join Mass Commercial Cleaning? Consistent...
...Independent International Travel Specialist Are you passionate about travel and helping others explore the world? Do you have a keen eye for detail and excellent organizational skills? If so, we're looking for you! Join our team as a Independent International Travel...
The Cybersecurity Analyst is responsible for monitoring, documenting, and supporting the cybersecurity posture of client's IT and OT environments. This role focuses on reviewing and analyzing security alerts, identifying vulnerabilities, maintaining cybersecurity configurations...