266 computer-security "https:" "https:" "https:" "https:" "https:" "Dr" uni jobs at Georgetown University
Sort by
Refine Your Search
-
and observance of all safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors (one of four-night supervisors, one of three Residential Custodial
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
all standard tools, equipment, materials and supplies of the trade and observe all safety rules, regulations and precautions in performing their duties. Work Interactions Depending upon area assigned
-
, and unit leaders to tailor messaging for various audiences. Requirements and Qualifications Bachelor's degree in Information Technology, Computer Science, or a related field; a Master's degree is a plus
-
policy analysis; leads long-term, complex, mixed-methods research projects; and produces shorter-term analyses on a wide range of issues relating to economic security and opportunity. Research methods may
-
and observance of all safety rules, regulations and precautions. Work Interactions This Custodian reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three
-
: Bachelor’s degree in Information Systems, Computer Science, or a related field. 5-8 years of experience in IT, with significant experience in application management, business analysis, and project management
-
, scheduling appointments, and maintaining front office organization and security. The EA works collaboratively with other Dean’s Office staff to ensure the front office is appropriately staffed and provides
-
of university affiliated individuals and will partner closely with the university’s information security resources to ensure enterprise platforms are following fundamental cybersecurity concepts and practices