421 computer-security "https:" "https:" "https:" "https:" "UCL" positions at New York University in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
integrity of the NYU enterprise application ecosystem in alignment with best practices and NYU’s Global Information Security Program. Act as a primary partner to Institutional Solutions Group (ISG
-
opportunities to bridge the skills development that takes place in the classroom, lab and studio environments with co-curricular efforts to assist students in demonstrating skills that will help them secure
-
The Programmer/Analyst is responsible for formulating and defining the scope and objectives of new or modified computer programs within the NYU Law School environment. The incumbent manages the full
-
The Administrative Manager is a key member of the Office of the CIO in NYU IT. The incumbent manages projects, program development, budgets, and strategic initiatives for NYU IT, and provides
-
the entire technical lifecycle of AI solutions, ensuring they are robust, secure, and aligned with institutional objectives. Leverage deep technical expertise in designing and optimizing data pipelines
-
visit https://shanghai.nyu.edu . You can also follow our official WeChat Account: NYUShanghaiRecruit for more updated news. We can recommend jobs specifically for you! Click here to get started.
-
critical NYU IT functions: the IT Resiliency program, Global Command Center operations, and Major Incident Management. The Director oversees the University’s IT Resiliency program for enterprise
-
Take film based and digital intra-oral and extra oral radiographic imaging (e.g. cone beam computed tomography, and bitewing, periapical, occlusal and panoramic views in analog/film and digital
-
/software management, security, network/Internet protocols. May require any of the following: problem identification/resolution, performance management/tuning. Knowledge of related large-scale computing
-
at least one of the following programming languages - Bash script and PowerShell. Knowledge of Active Directory, OSI network model, and information security best practices. Expertise in computer hardware