166 computer-security "https:" "https:" "https:" "https:" "https:" uni jobs at Northeastern University
Sort by
Refine Your Search
-
Listed
-
Field
-
university-sponsored activities, events, and programs. This role requires a commitment to safety, customer service, and adherence to university and state transportation policies. Key Responsibilities: Safely
-
business needs as they arise, including, but not limited to, responding to security incidents, supporting software deployments, resolving software issues or system breaks, and addressing other critical
-
, evaluation, management, and reconditioning of athletic injuries to nurture safety and well-being. Athletic trainers are expected to manage potentially catastrophic, acute, and chronic athletic injuries within
-
to overtime needs beyond the normal workday. Mandatory overtime, inclusive of weekends, as required or requested by Director of Building Services. Follow prescribed safety rules and regulations. Must have the
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 21-Dec-25 Location: Portland, Maine Type: Full-time Categories: Academic/Faculty Computer/Information Sciences
-
, Safety, Project Risk, & Quality management, Construction Law, and/or other courses included in the curriculum. Qualifications: Master's degree, professional certification (PMP, CCM, or similar credential
-
, Safety, Project Risk, & Quality management, Construction Law, and/or other courses included in the curriculum. Qualifications: Master's degree, professional certification (PMP, CCM, or similar credential
-
information to comply with appropriate protocols Qualifications: Eligible for and willing to obtain/maintain a DoD security clearance Bachelor's degree 3-5 years of successful high-level support and program
-
operational support: This role requires occasional availability outside of traditional working hours to address urgent business needs as they arise, including, but not limited to, responding to security
-
driving innovation in radar, electronic warfare, and secure communications systems. The role involves end-to-end system development, from conceptual design and modeling through laboratory validation and