Sort by
Refine Your Search
-
systems, circulation and safety systems, and emergency exits in event of an emergency. Aware of and understands all special and general orders pertaining to area, building or functions of job. Inspects and
-
systems, circulation and safety systems, and emergency exits in event of an emergency. Aware of and understands all special and general orders pertaining to area, building or functions of job. Inspects and
-
systems, circulation and safety systems, and emergency exits in event of an emergency. Aware of and understands all special and general orders pertaining to area, building or functions of job. Inspects and
-
to the processing, storage, and transmission of information. The ISSO also manages and enforces government and corporate information security policies, provides training, and educates end users and program staff
-
Managing Director leads the development and execution of organizational strategy and oversees all aspects of internal operations, including finance, human resources, compliance, partnerships, and program
-
the University’s capital construction and renovation projects. The Program Manager ensures that technology requirements, including networking, audiovisual systems, and physical security, are integrated
-
to prioritize calls, depending on the level of the caller’s emergency. Communications Operators are CPR, Public Safety Tele-communicator trained through APCO, and Incident Command System (ICS) trained through
-
Resources website: https://hr.georgetown.edu/mode-of-work-designation.Requirements and QualificationsUse this section to indicate the minimum academic levels/program required to perform the work (i.e., High
-
the following of security procedures to prevent inventory losses Ensures the availability of uniforms and equipment for practice, and all home and away contests Transportation and allocation of on-field equipment
-
and applications (e.g., Computer-Aided Dispatch (CAD), Report Management Systems (RMS)). Strong technical knowledge of software, hardware, and network security principles as they apply to confidential