43 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"LGEF" positions at Texas A&M University System
Sort by
Refine Your Search
-
campus network. This position is responsible for developing, maintaining, and evolving the campus-wide network architecture, ensuring performance, scalability, reliability, and security. The role provides
-
, computer science, or a related field. Other Requirements: This is a security-sensitive position and is restricted to U.S. citizens and legal permanent residents only. Only complete applications will be
-
Certification. - Active security clearance (SECRET or higher). - Bachelor’s degree in engineering, computer science, or a related field. Other Requirements: This is a security-sensitive position and is restricted
-
, immune treatments and biosample collection. The position also requires experience in independently conducting laboratory analysis including quantitative and computer skills, and abilities to use laboratory
-
physiological experiments to elucidate factors critical for nutrient transport and successful feeding. -Collection of data and keeping of detailed records of results, as well as utilizing computer programs and
-
schedules for all machine shop equipment and coordinates repairs. - May supervise assigned staff. 15%: Safety and Training - Ensures lab safety: Enforces all shop safety procedures and regulatory compliance
-
with institutional strengths, fostering strategic relationships with federal agencies and program officials, and positioning faculty and staff for success in securing competitive funding. Operating from
-
plan requirements, and the approved program and project authorizations. - Ensure project architect/engineer submits required design documents to appropriate authorities inside and outside of the A&M
-
program for the assigned Texas A&M University System (TAMUS) member. Evaluates portfolios of innovations in various stages of development, tangible research properties, and copyright materials developed
-
services and network configurations. Training and Documentation - Develop training materials and conduct one-on-one or group training for research users on secure computing, data workflows, software usage