318 computer-security "https:" "https:" "https:" "https:" "https:" "U.S" "U.S" "St" positions at George Mason University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
encouragement for interdisciplinary research. Instructions to Applicants: For full consideration, applicants must apply for the Open-Rank, Tenured/Tenure-Track Computer Science Faculty at https://jobs.gmu.edu
-
consideration, applicants must apply for the Federal Work-Study Program Assistant at https://jobs.gmu.edu/. Complete and submit the online application to include three professional references with contact
-
by U.S. News and World. In addition to BS and MS programs, the department also participates in a BAS program in Cyber Security, MS program in Data Analytics Engineering, and a PhD program in
-
facilities. The Assistant Facility Security Officer (AFSO) assists the FSO in managing the classified program at George Mason University, and acts as back-up. The AFSO provides onsite direct security support
-
. intelligence, defense, law enforcement, homeland security, and cybersecurity communities. About the Position: The National Security Institute’s (NSI) Program Assistant supports programming, events, and outreach
-
organization. Instructions to Applicants: For full consideration, applicants must apply for the Program Manager for Engaged Learning at https://jobs.gmu.edu/. Complete and submit the online application
-
, applicants must apply for Operations Program Manager at https://jobs.gmu.edu/. Complete and submit the online application to include three professional references, one of which must be a current supervisor
-
in shaping the future of secure-by-design systems. Home to the first undergraduate Cyber Security Engineering program in the United States and the first ABET-accredited program in this field, CYSE has
-
: For full consideration, applicants must apply for the Federal Work-Study Program Assistant & Workflow Developer at https://jobs.gmu.edu/. Complete and submit the online application to include three
-
policy, standards, and practices, and guide the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting