275 computer-security "https:" "https:" "https:" "https:" "UCL" "UCL" "UCL" "UCL" positions at Georgetown University
Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors (one of four-night supervisors, one of three Residential Custodial
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
. Required to have demonstrated computer skills and the ability to work with MS Windows and Database Software Work Mode Designation This position has been designated as On-Campus. Please note that work mode
-
of work designations for staff and AAP positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range The projected hourly pay range
-
observes all safety rules, regulations and precautions in performing their duties. Work Interactions The position reports directly to the Landscape and Grounds Supervisor along with eight other laborers
-
and observance of all safety rules, regulations and precautions. Work Interactions This Custodian reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three
-
. Must be able to multitask and should possess computer skills and documentation skills Ability to work with diverse populations and perform in a fast-paced environment Preferred Requirements Knowledge
-
, and unit leaders to tailor messaging for various audiences. Requirements and Qualifications Bachelor's degree in Information Technology, Computer Science, or a related field; a Master's degree is a plus
-
Bertrand Chair in Artificial Intelligence, Department of Computer Science Georgetown University: Main Campus: College of Arts & Sciences: Computer Science Location Washington, DC Open Date Nov 13
-
of university affiliated individuals and will partner closely with the university’s information security resources to ensure enterprise platforms are following fundamental cybersecurity concepts and practices