Sort by
Refine Your Search
-
infrastructure Respond and remediate to complex/escalated system and network security vulnerabilities Implement, test, and support new and emerging technologies while applying security best practices, and required
-
The Penn State Information Technology (PSU IT) Infrastructure Division is seeking a Wireless Technical Lead Network Engineer (Principal Professional) to provide senior-level technical leadership, direction
-
, who jointly oversee a broad and dynamic team that include: major gift officers corporate and foundation relations team alumni relations professionals Children’s Miracle Network: team of community and
-
, and working parameters for hardware/software compatibility and maintenance of system security Design, configure, and maintain network infrastructure; including routers, switches, firewalls Implement
-
academic needs. Capacity to create inclusive learning environments for all students and explain complex concepts in accessible, student‑friendly ways. Skilled in envisioning and implementing strategies
-
material and software purchases by maintaining records, monitoring order status, and coordinating with vendors Build and maintain networks across the office, the lab, and Penn State Additional
-
commercialization campaigns to increase licensing, partnerships, and sponsored research. Event planning and coordination: Support and manage logistics for commercialization-focused events including networking
-
the Data Curation Network, to maintain current, well‑aligned repository services and practices. Data Curation, Metadata, and Preservation Services Lead data curation and preservation for ScholarSphere
-
recommending policy or procedural changes Office Leadership Establish and manage the Penn State Ombuds Office Represent Penn State in national and regional Ombuds networks Hire and manage staff and oversee
-
and Cybersecurity Oversee all aspects of COM IT infrastructure, including cloud strategy, networking, storage, identity management, and endpoint security. Maintain a proactive cybersecurity posture