537 computer-security-"https:"-"https:"-"https:"-"https:" positions at North Carolina State University
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
. For the remainder of the appointment, the position will be based on the main campus of NCSU, and employee will be responsible for securing their own housing. Work Schedule: 20-40/hrs per week between 8-5, M-F
-
and evolving priorities. Qualifications Minimum Experience/Education Completion of an accredited training program in the area of assignment; or equivalent combination of training and experience. Some
-
, students, and staff. The position monitors and troubleshoots patron computing, printing, and staff computing tools, resolves problems for clients, and assists in ensuring the safety and security of people
-
, and shutdown of plant equipment from outside the control room, strictly adhering to all safety and environmental rules and regulations to protect employees and public safety. Is Time Limited Yes If Yes
-
and decision- making that directly impacts life, health, safety, and/or the environment. Potential Oversight and Authority This position may be responsible for consultation, evaluation, planning, design
-
Accuracy: Ensure billing is correct, flow sheets are updated accurately, and communication remains seamless across all ancillary hospital services. 4. Safety & Compliance Bio-Security: Maintain strict
-
Accuracy: Ensure billing is correct, flow sheets are updated accurately, and communication remains seamless across all ancillary hospital services. 4. Safety & Compliance Bio-Security: Maintain strict
-
Accuracy: Ensure billing is correct, flow sheets are updated accurately, and communication remains seamless across all ancillary hospital services. 4. Safety & Compliance Bio-Security: Maintain strict
-
procedures, post-operative recovery, and strict adherence to infectious disease and safety protocols. This role also supports hospital operations through documentation, workflow coordination, and the training
-
integration of research computing infrastructure, through the use of data and database connectors, to meet the data analytics needs of the interdisciplinary projects. Assume a leading role in the security