101 high-performance-quantum-computing-"https:"-"https:"-"https:"-"https:" positions at Nashville State Community College in United States
Sort by
Refine Your Search
-
Listed
-
Field
-
Title: Computer Technician Coordinator POSITION SUMMARY Supports the Technology Services Department by supervising a team of computer technicians and performing and coordinating complex computer
-
Title: Temporary, Program Development Specialist POSITION SUMMARY The Program Development Specialist (Temporary) supports the Deans and Associate Vice President for Academic Affairs in
-
Title: Instructor, Computer Information Technology – 9/10 Month (Term) POSITION SUMMARY This position is responsible for delivering quality instruction in computer information technology, including
-
Title: Adjunct Instructor – Health and Human Performance (Pool) POSITION SUMMARY This position is responsible for delivering quality instruction. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND
-
support to the Nashville State community. Answers questions about hardware/software configurations. Performs password resets. Records work in the Help Desk ticketing system. Assists computer lab technician
-
Title: Computer Technician POSITION SUMMARY Installs, repairs and maintains campus technology across all seven of the College’s campuses. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND RESPONSIBILITIES
-
Title: Adjunct Instructor – Computer and Information Science (Pool) POSITION SUMMARY This position is responsible for delivering quality instruction in Computer and Information Science. ESSENTIAL
-
Title: Adjunct Instructor – Computer Science (Pool) POSITION SUMMARY This position is responsible for delivering quality instruction in Computer Science. ESSENTIAL JOB FUNCTIONS/JOB DUTIES AND
-
Title: Adjunct Instructor – Computer-Aided Design (Pool) POSITION SUMMARY This position is responsible for delivering quality instruction in Computer-Aided Design. ESSENTIAL JOB FUNCTIONS/JOB DUTIES
-
Defender SIEM. Analyze network traffic, intrusion attempts, activity logs and system alerts for trends, anomalies and potential security breaches. Analyze compromised computing resources to improve security