95 computer-security "https:" "https:" "https:" "https:" positions at Georgetown University in United States
Sort by
Refine Your Search
-
and observance of all safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors (one of four-night supervisors, one of three Residential Custodial
-
and adherence to ethical guidelines. Collaborate with multidisciplinary teams to optimize research execution and patient care. Maintain expertise in safety regulations and compliance with institutional
-
, and unit leaders to tailor messaging for various audiences. Requirements and Qualifications Bachelor's degree in Information Technology, Computer Science, or a related field; a Master's degree is a plus
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
and observance of all safety rules, regulations and precautions. Work Interactions This Custodian reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three
-
. This employee will aide in the perimeter security of campus-wide facilities reporting directly to the Electronic Door Access and Lock Shop Supervisor. The Locksmith II has the following duties that include but
-
all standard tools, equipment, materials and supplies of the trade and observe all safety rules, regulations and precautions in performing their duties. Work Interactions Depending upon area assigned
-
Public Safety, Audio Visual, and Facilities needs that accompany event scheduling requests. Given the large volume of space requests received by the Office of Scheduling in the course of an academic year
-
of university affiliated individuals and will partner closely with the university’s information security resources to ensure enterprise platforms are following fundamental cybersecurity concepts and practices