265 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dip" "Dip" uni jobs at Georgetown University
Sort by
Refine Your Search
-
for keeping our community proficient in the latest software, hardware, and IT procedures, improving productivity, security and user experience. They will report directly to the Director of IT Communications and
-
Operations, the chief information security officer and the AVP of Enterprise services. This role is responsible for mobilizing their teams to provide solutions and resolve issues for research technology
-
and observe all safety rules, regulations and precautions in performing duties. Work Interactions This position reports directly to the Building and Structures Supervisor and works along with other
-
of work designations for staff positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range: The projected salary or hourly pay range
-
economical manner. The EM must maintain high quality and safety standards for their work, keep accurate records, and manage the supplies and equipment in the shop. Additional duties include, but are not
-
. The incumbent must coordinate all project design issues with Georgetown clients as well as appropriate staff counterparts in the other Planning and Facilities Management areas, the Department of Public Safety
-
to zone office. Workers use all standard tools, equipment, materials and supplies of the trade and observe all safety rules, codes, regulations and precautions in performing their duties. The Electrician
-
is a laboratory and academic support position. Responsibilities: ● Completing training and learning about the program to understand how to best support the student experience. ● Meeting
-
. The position involves implementing study protocols, managing data collection and analysis, coordinating study participants, and ensuring regulatory compliance, as well as supporting the activities of the Program
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about