583 computer-security "https:" "https:" "https:" "https:" "BOCCONI UNIVERSITY" positions at University of Virginia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
experience in computer administration, FLIM, optical instrumentation development, and software code writing. The research associate should have an interest/ability to work independently as
-
Saved jobs (0) - - Interventional Radiology Technologist (Rad Tech) - Internal Traveler Program Location Charlottesville, Virginia, United States of America UVA Medical Center Job Id R0074367 Save Job
-
Saved jobs (0) - - Neurointerventional Radiologic Technologist (Rad Tech) - Internal Traveler Program Location Charlottesville, Virginia, United States of America UVA Medical Center Job Id R0074310 Save
-
to teaching excellence. Previous K-12 or higher education teaching experience in the course content area is strongly preferred. To apply, please submit an application online at https
-
. Additional duties as assigned. Position Compensation Range: $20-$22/hour based on education and experience Content Tutor program hours: Tutor hours vary based on course need and student availability. Evening
-
The University of Virginia’s School of Data Science invites applications for a Postdoctoral Research Associate to join the newly established National Security Data and Policy Institute
-
Cosmology Group and work with Prof. Satya Gontcho A Gontcho. The successful candidate will lead a research program in observational cosmology, making use of one or more of the following surveys: the Dark
-
have a strong commitment to teaching. To apply, please submit an application online at https://jobs.virginia.edu, search on requisition number R0018380 and attach a curriculum vitae and contact
-
wage) lecturer position(s) to develop a course and teach in the Certified Public Manager (CPM) program beginning in January 2026. The CPM program is hybrid, with the first and last modules in person in
-
security risk management program including assessment of cyber and IT risk management and exceptions, maintenance of a registry of significant IT risks, third-party risk management (TPRM), data governance