57 computer-security "https:" "https:" "https:" "https:" "UNIVERSITY OF NEW SOUTH WALES" positions
Sort by
Refine Your Search
-
technologies and applying them effectively in professional settings. Advanced level of computer literacy and skills in Microsoft Office applications, and experience with LMS. An understanding of and commitment
-
workplace technology products and services, including digital collaboration, learning and teaching technologies, research computing support, and multimedia services. Drive the transition toward a product-led
-
with the approved brief, budget, quality and program. The role of Minor Works Project Manager reports to the Senior Manager, Building Maintenance and Management and has nil direct reports. Key
-
work closely with the Team Leaders, Academic Program Authorities and Course Convenors to support the design and development of undergraduate and postgraduate programs and courses. The role of Teaching
-
oral communication skills. Demonstrated experience providing effective customer service and support to clients at all levels. Highly proficient computer literacy with excellent skills in Microsoft Office
-
For further details on the benefits, please visit https://www.jobs.unsw.edu.au/lifestyle-benefits Pre-Employment Checks Aligned with UNSW’s focus on cultivating a workplace defined by safety, ethical conduct
-
qualification in Data Science, Computer Science, Statistics, Engineering, or a related discipline; or an equivalent combination of education, training, and experience. Demonstrated experience applying machine
-
articulation as functional and logical designs. Contribute to the development of architectural methods, processes, standards that align with overall business, technology and cyber security strategies. Design
-
Infrastructure Program Manager will pick up and be responsible for the delivery of the education, security and research innovation work streams. Role can be based in Sydney or Canberra but regular travel
-
which meet business needs and is user friendly, which take into account target environment, performance and security requirements and existing systems. Analyse and document functional and non- functional