Sort by
Refine Your Search
-
Category
-
Field
-
the Security Architect and system administrators to ensure secure operations and compliance with federal cybersecurity standards, including NIST SP 800-171 Rev. 3. This role is part of a small, embedded security
-
cybersecurity standards, including NIST SP 800-171 Rev. 3. This role is part of a small, embedded security & compliance team with ample opportunities for cross training and skill growth. Responsibilities Key
-
to potential security incidents and ensuring the integrity of regulated research environments. This role is part of a small, embedded security & compliance team with opportunities for cross training and skill
-
essential for identifying and responding to potential security incidents and ensuring the integrity of regulated research environments. This role is part of a small, embedded security & compliance team with
-
submitted at oeo.utah.edu For more information: https://www.utah.edu/nondiscrimination/ To inquire about this posting, email: employment@utah.edu or call 801-581-2300. The University is a participating
-
$75,000 - $95,000 Close Date 02/02/2026 Priority Review Date (Note - Posting may close at any time) 11/19/2025 Job Summary Workforce Operations Generalists This role is central to the recruitment, hiring
-
. This role coordinates with institutional offices (ISO, IRB, Privacy Office, GRC) and research teams to ensure secure and compliant operations across CHPC systems. This role is part of a small, embedded
-
secure and compliant operations across CHPC systems. This role is part of a small, embedded security & compliance team with ample opportunities for cross training and skill growth. Responsibilities Serve
-
. This role coordinates with institutional offices (ISO, IRB, Privacy Office, GRC) and research teams to ensure secure and compliant operations across CHPC systems. This role is part of a small, embedded
-
is part of a small, embedded security & compliance team with ample opportunities for cross training and skill growth. Responsibilities Deploy and manage security technologies such as endpoint