85 computer-security "https:" "https:" "https:" "https:" "https:" positions at Georgetown University
Sort by
Refine Your Search
-
The Head of Operations & Patient Experience will oversee special projects and program development for the Ruesch Center for the cure of Gastrointestinal Cancer; and contribute to financial management
-
Serves as Clinical Research Nurse 2 for the Cellular Therapy Program oncology clinical trials conducted in the Lombardi Clinical Trials Office of the Lombardi Comprehensive Cancer Center at Georgetown
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others. The incumbent will perform
-
and observance of all safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors (one of four-night supervisors, one of three Residential Custodial
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
, and unit leaders to tailor messaging for various audiences. Requirements and Qualifications Bachelor's degree in Information Technology, Computer Science, or a related field; a Master's degree is a plus
-
and observance of all safety rules, regulations and precautions. Work Interactions This Custodian reports directly to one of the Custodial Supervisors (one of four night supervisors, one of three
-
all standard tools, equipment, materials and supplies of the trade and observe all safety rules, regulations and precautions in performing their duties. Work Interactions Depending upon area assigned
-
of university affiliated individuals and will partner closely with the university’s information security resources to ensure enterprise platforms are following fundamental cybersecurity concepts and practices