328 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dr" "Dr" positions at George Mason University in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Mason University provides a comprehensive and competitive benefits package that supports your well-being, financial security, and career growth. Highlights include: employer-supported retirement plans
-
Department: Auxiliary and Business Services Classification: Computer Ops Tech 1 Job Category: Classified Staff Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk) Location: Fairfax, VA
-
: Auxiliary and Business Services Classification: Computer Ops Tech 1 Job Category: Classified Staff Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk) Location: Fairfax, VA Workplace Type
-
policy, standards, and practices, and guide the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting
-
) certifications. Preferred Qualifications: Undergraduate degree in exercise science or related subject, or an equivalent combination of education and experience; Proven skills in program design, fitness testing
-
services including, but not limited to, Academic Units, University Police, Physical Security, Facilities and Space Management, University Life, Mail and Print Services, RSR/Lab Safety, Parking, Housekeeping
-
Mason University’s Bachelor of Applied Science Degree (BAS) is a unique program created specifically for students who have earned an Associate of Applied Science (AAS) degree and seek to complete
-
Background Check: Yes About the Department: The Department of Psychology (https://psychology.gmu.edu/) boasts over 1,700 undergraduate majors (BS, BA), 330 graduate students (PhD, MA, MPS), and 50 full-time
-
, SQL Developer. Instructions to Applicants: For full consideration, applicants must apply for Application Analyst at https://jobs.gmu.edu/. Complete and submit the online application to include three
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between