265 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dr" "Dr" uni jobs at Georgetown University in United States
Sort by
Refine Your Search
-
Operations, the chief information security officer and the AVP of Enterprise services. This role is responsible for mobilizing their teams to provide solutions and resolve issues for research technology
-
management software. The incumbent manages the student locker registration program, processes guest parking requests, and maintains all department Safety Data Sheet (SDS) binders to comply with OSHA guidelines
-
and observe all safety rules, regulations and precautions in performing duties. Work Interactions This position reports directly to the Building and Structures Supervisor and works along with other
-
of work designations for staff positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range: The projected salary or hourly pay range
-
. The incumbent must coordinate all project design issues with Georgetown clients as well as appropriate staff counterparts in the other Planning and Facilities Management areas, the Department of Public Safety
-
economical manner. The EM must maintain high quality and safety standards for their work, keep accurate records, and manage the supplies and equipment in the shop. Additional duties include, but are not
-
to zone office. Workers use all standard tools, equipment, materials and supplies of the trade and observe all safety rules, codes, regulations and precautions in performing their duties. The Electrician
-
is a laboratory and academic support position. Responsibilities: ● Completing training and learning about the program to understand how to best support the student experience. ● Meeting
-
. The position involves implementing study protocols, managing data collection and analysis, coordinating study participants, and ensuring regulatory compliance, as well as supporting the activities of the Program
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about