276 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dr" "Dr" "Dr" positions at Georgetown University in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
. The incumbent must coordinate all project design issues with Georgetown clients as well as appropriate staff counterparts in the other Planning and Facilities Management areas, the Department of Public Safety
-
. Occasionally tasked with moving items weighing up to 100 lbs, and working from ladders and scaffolding Must have working knowledge of safety equipment: gloves, eye and ear protection, etc. Work Mode Designation
-
for keeping our community proficient in the latest software, hardware, and IT procedures, improving productivity, security and user experience. They will report directly to the Director of IT Communications and
-
details about Georgetown University’s mode of work designations for staff positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range
-
Operations, the chief information security officer and the AVP of Enterprise services. This role is responsible for mobilizing their teams to provide solutions and resolve issues for research technology
-
of work designations for staff positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range: The projected salary or hourly pay range
-
. The position involves implementing study protocols, managing data collection and analysis, coordinating study participants, and ensuring regulatory compliance, as well as supporting the activities of the Program
-
Management areas, the Department of Public Safety, the Office of University Information Services, and representatives from Student Affairs and Residential Living. Requirements and Qualifications Bachelors
-
unscheduled or special projects. Incumbents use all standard tools, equipment, materials and supplies of the trade and observe all safety rules, regulations and precautions in performing duties. Operates
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about