569 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"https:" positions at University of North Texas at Dallas
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
outreach, sponsor prospecting, follow-up, and coordination, helping to secure introductory- and mid-level sponsorships while laying the groundwork for long-term sponsor relationships. This role is ideal
-
regarded in his field, Dr. Silvey established during his tenure a nationally and internationally recognized water research program, and, in 1970, founded the Center for Environmental Studies, which became
-
. Athletics strives to conduct a competitive athletics program that promotes faculty, staff, student and community affiliation and participation with the North Texas Athletics. Provide facilities which attract
-
manages campaign activities including campaign volunteer meetings, campus-wide Campaign education summits and a comprehensive program of volunteer recruitment, training, and development. Assists with
-
, criminal justice, health disparities and public safety, and find solutions to challenges in public administration, public health, exercise physiology and urban design. We have eight academic departments with
-
processing, case and document management systems, file and record organization, transcription, designing forms, and other procedures. Familiarity with computer hardware and knowledge of software, including
-
confidential and sensitive information. * Proficient in the use of computer, human resource and enterprise information systems, to include proficient use of Microsoft Excel, Word and Power Point software
-
Doctoral degree program at UNT. This position is also responsible for data entry of application materials and transcripts into the Enterprise Information System (EIS), verification of authenticity
-
research on, working on, or having the ability to access critical organizational infrastructure and they must be able to maintain the security and integrity of the infrastructure related to this role
-
Technology courses, including but not limited to Foundations of Cybersecurity, Network Administration, Cloud Security, Computer Forensics, Computer Networks, and Programming. Preferred Qualifications • Academic