507 computer-security "https:" "https:" "https:" "https:" positions at The University of Chicago
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
employee feedback, program effectiveness, and workforce trends; reports actionable insights and recommendations to leadership, particularly around retention and engagement. Partners with Advancement
-
that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: http://securityreport.uchicago.edu
-
of malignancies, blood disorders, and experimental therapies. Job Summary The Data Scientist will lead data science research efforts within breast cancer program in the Section of Hematology/Oncology in
-
Department Provost Research Computing Center About the Department The University of Chicago Research Computing Center (RCC), a unit in the Office of Research, provides high-end research computing
-
that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: http://securityreport.uchicago.edu
-
career events. These may include professional development workshops, career trek visits to employers, technical skill trainings, and career competitions. The Assistant Director will plan program content
-
generation of scientific leaders and entrepreneurs. Job Summary Reporting to the STAGE Assistant Director of Operations and Initiatives, the STAGE Center Program Manager is responsible for a wide variety of
-
orders supplies/equipment. Maintains laboratory equipment and experimental spaces. Trains and assists new laboratory personnel. Coordinates and conducts lab inspections (IACUC, Research and Lab Safety
-
on supporting student academic success, providing opportunities for personal growth and leadership development, developing community and engagement through the residential housing and dining program, and in areas
-
support and updates. Assists in conducting information security assessments and risk analysis of computing environment. Evaluates past and present technologies to help develop new tools. Ensures all the new