318 computer-security "https:" "https:" "https:" "UCL" positions at George Mason University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
: For full consideration, applicants must apply for the Federal Work-Study Program Assistant & Workflow Developer at https://jobs.gmu.edu/. Complete and submit the online application to include three
-
system (i.e. Canvas). Instructions to Applicants: For full consideration, applicants must apply for Program Coordinator, Internship Programs at https://jobs.gmu.edu/. Complete and submit the online
-
strong program of scholarly research, teaching, and service; To secure external funding; To participate in university, college, and departmental governance; and To contribute to professional and public
-
by U.S. News and World. In addition to BS and MS programs, the department also participates in a BAS program in Cyber Security, MS program in Data Analytics Engineering, and a PhD program in
-
engineering, AI, or computer game design. Instructions to Applicants: For full consideration, applicants must apply for Open-Rank, Term Computer Sciences Faculty at https://jobs.gmu.edu/. Complete and submit
-
to compete at their highest competitive potential. Additionally, it is a primary responsibility of the incumbent to be cognitive of all coaching and/or teaching duties associated with the program. This
-
. Provide analysis and decisions requiring engineering and constructability expertise as they affect life safety. The work shall be performed in a complex and fast-paced setting requiring professional
-
logistics, student communications, and graduate program marketing. This is a team-oriented role requiring strong organizational, interpersonal, and communication skills. Responsibilities: Academic Affairs and
-
, individuals, and organizations in furtherance of the mission of the University. The department delivers a comprehensive program in law enforcement to provide the highest level of safety, security, and service
-
policy, standards, and practices, and guide the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting