86 computer-security "https:" "https:" "https:" "https:" "https:" positions at Georgetown University in United States
Sort by
Refine Your Search
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
, and unit leaders to tailor messaging for various audiences. Requirements and Qualifications Bachelor's degree in Information Technology, Computer Science, or a related field; a Master's degree is a plus
-
and observance of all safety rules, regulations and precautions. Work Interactions This Custodian reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three
-
all standard tools, equipment, materials and supplies of the trade and observe all safety rules, regulations and precautions in performing their duties. Work Interactions Depending upon area assigned
-
of university affiliated individuals and will partner closely with the university’s information security resources to ensure enterprise platforms are following fundamental cybersecurity concepts and practices
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others. The incumbent will perform
-
. This employee will aide in the perimeter security of campus-wide facilities reporting directly to the Electronic Door Access and Lock Shop Supervisor. The Locksmith II has the following duties that include but
-
: Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field. Master's degree (MBA or equivalent) strongly preferred. Experience: 12+ years of progressive
-
and observance of all safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others
-
Public Safety, Audio Visual, and Facilities needs that accompany event scheduling requests. Given the large volume of space requests received by the Office of Scheduling in the course of an academic year