268 computer-security "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" uni jobs at Georgetown University
Sort by
Refine Your Search
-
mission and goals of Georgetown University. Requirements and Qualifications Bachelors in Computer Science or relevant experience 2+ years of software engineering experience (Java or Python preferred, but
-
-functional teams towards achieving program goals. Work Mode Designation This Position reports to the Portfolio and Project Manager under the Office of the CIO in University Information This position has been
-
needed to drive initiatives to completion. The Director of Operations ensures timely and effective implementation of the team's priorities, work program, and strategic initiatives. The Director of
-
capture systems, electronic medical records, and other computer applications. Preferred Qualifications Experience with OnCore (Clinical Trials Management System). Certified clinical research certification
-
. Occasionally tasked with moving items weighing up to 100 lbs, and working from ladders and scaffolding Must have working knowledge of safety equipment: gloves, eye and ear protection, etc. Work Mode Designation
-
for keeping our community proficient in the latest software, hardware, and IT procedures, improving productivity, security and user experience. They will report directly to the Director of IT Communications and
-
to zone office. Workers use all standard tools, equipment, materials and supplies of the trade and observe all safety rules, codes, regulations and precautions in performing their duties. The Electrician
-
details about Georgetown University’s mode of work designations for staff positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range
-
supplies of the trade and observe all safety rules, codes, regulations and precautions in performing their duties. Work Interactions This position reports directly to the Low Voltage Electric Supervisor
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about