742 computer-security "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" positions at University of North Texas at Dallas
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
No Security Sensitive This is a Security Sensitive Position. Special Instructions Applicants must submit a minimum of two professional references as part of their application. If needed, additional references
-
procedures and security measures related to work performed and work supervised. Preferred Qualifications *Work experience involving multiple fund sources (e.g., state appropriations, federal funds, restricted
-
identifying opportunities for expansion. Responsibilities also include full oversight of cash handling, proper closing procedures for branded operations, and the security of all products, equipment, and assets
-
particles. Work Schedule M-F Driving University Vehicle No Security Sensitive This is a Security Sensitive Position. Special Instructions Applicants must submit a minimum of two professional references as
-
between 8:00 a.m. and 5:00 p.m. This is a fully remote position. Driving University Vehicle: No Security Sensitive: This is a Security Sensitive Position. Special Instructions: Applicants must submit a
-
program that promotes faculty, staff, student and community affiliation and participation with the North Texas Athletics. Provide facilities which attract the highest level of talent and allow student
-
. Employees in this job may be responsible for conducting research on, working on, or having the ability to access critical organizational infrastructure and they must be able to maintain the security and
-
of contributions while maintaining data integrity. Minimum Qualifications Bachelor's degree and 4 years of experience in donor relations/stewardship/alumni relations, communications, non-profit/program management
-
on, working on, or having the ability to access critical organizational infrastructure and they must be able to maintain the security and integrity of the infrastructure related to this role. Preferred
-
they must be able to maintain the security and integrity of the infrastructure related to this role. Knowledge, Skills and Abilities Knowledge of scientific research techniques, methods and procedures