276 computer-security "https:" "https:" "https:" "https:" "Keele University" positions at Georgetown University in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites. The role involves a mix of strategic planning, team leadership, and tactical
-
Georgetown University on a daily basis. The position will also coordinate with colleagues across the university, including Campus/School/Center/Institute/Program/Initiative communications/events staff and
-
, event security, investigation, understand access control systems, circulation and safety systems, effect arrests, and emergency response as outlined in General Orders and Special Orders, as directed by
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three Residential Custodial
-
service Perform scheduled preventative maintenance and unscheduled or special work Use all standard tools, equipment, materials and supplies of the trade Observe all safety rules, regulations and
-
, yield, and retain progressively higher quality prospective students to the MBA program and to engage alumni and students in the recruitment process. In addition, s/he will bring strategic vision and
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others. The incumbent will perform
-
and observe all safety rules, regulations and precautions in performing duties. Work Interactions This position reports directly to the Building and Structures Supervisor and works along with other
-
and documentation. Estate administration and life income program management. Planned giving training and education Work Interactions This position will report to either the Assistant Vice President
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about