263 computer-security "https:" "https:" "https:" "https:" "https:" "Brookhaven National Laboratory" uni jobs at Georgetown University in United States
Sort by
Refine Your Search
-
-functional teams towards achieving program goals. Work Mode Designation This Position reports to the Portfolio and Project Manager under the Office of the CIO in University Information This position has been
-
mode of work designation. Complete details about Georgetown University’s mode of work designations for staff positions can be found on the Department of Human Resources website: https
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three Residential Custodial
-
service Perform scheduled preventative maintenance and unscheduled or special work Use all standard tools, equipment, materials and supplies of the trade Observe all safety rules, regulations and
-
mission and goals of Georgetown University. Requirements and Qualifications Bachelors in Computer Science or relevant experience 2+ years of software engineering experience (Java or Python preferred, but
-
for keeping our community proficient in the latest software, hardware, and IT procedures, improving productivity, security and user experience. They will report directly to the Director of IT Communications and
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others. The incumbent will perform
-
, event security, investigation, understand access control systems, circulation and safety systems, effect arrests, and emergency response as outlined in General Orders and Special Orders, as directed by
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three Residential Custodial
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about