Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
, installation, project coordination, and technical support for network (LAN/WAN) and telecommunications (phone, video conference, etc) services and associated hardware and software systems to support University
-
Posting Details Position Information Job Title Adjunct in Business Computer Information Systems Position Number 999201 Department Accounting, Economics & Finance Salary Commensurate Remote No Job
-
Answer and route telephone calls in a professional manner Greet and assist visitors to the office Check and distribute campus and post office mail Assist office personnel with special projects and day-to
-
practices; knowledge of spelling, grammar and punctuation; knowledge of word processing and spreadsheet applications and software. Picks up and distributes mail to appropriate personnel. Serves as secondary
-
; knowledge of spelling, grammar and punctuation; knowledge of word processing and spreadsheet applications and software. Skilled in the operation of a personal computer, as appropriate to the assignment
-
and software. Picking up and distributing mail to appropriate personnel. And other duties as assigned. Required Qualifications Must be a currently enrolled student and registered for classes. Must be
-
Description The Regional Security Operations Center (RSOC) Cybersecurity Analyst position is an excellent opportunity to gain hands-on cybersecurity experience. The RSOC monitors security tools, analyzes
-
indexing documents, computer data entry, filing, copying, and answering phones Assisting with picking up and distributing office mail to appropriate personnel Other duties as assigned Required Qualifications
-
practices; knowledge of spelling, grammar and punctuation; knowledge of word processing and spreadsheet applications and software. Skilled in the operation of a personal computer, as appropriate
-
, application security testing, vulnerabilities, and exploit techniques Network and security architecture principles, including firewalls, IDS/IPS, endpoint security, and other protective/detective systems