Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
standards Essential Skills & Experience Teaching & Assessment: Demonstrated experience in competency-based assessment Understanding of ICT and Cyber Security training packages Ability to diagnose learning
-
postgraduate modules related to Cyber Security. An evidenced track record is required within two or more of the following areas of Cyber Security: Pen-testing, Ethical hacking, Secure Programming (operating
-
equivalency formula. Preferred Qualifications Currently serve as an SPO supervisor or manager on a college campus. Associate of Arts (AA) degree in Criminal Justice, Business, Liberal Arts, Cyber Security
-
State University of New York University at Albany | Albany, New York | United States | about 12 hours ago
disclosures regarding the University's current campus security policies. The University at Albany's Annual Security Report is available in portable document format [PDF] by clicking this link http
-
to Operations Support is a student position to assist the RCRV Data presence, Engineering Support Center (R-DESC) with support in shipping, inventory, property management, sensor and cyber system packing and
-
, which aims to develop novel solutions for the detection and reaction to cyber attacks, we are recruiting a Post-doctoral fellow within our Network Systems, Cybersecurity and Digital Law (SRCD) department
-
strive to achieve this goal through partnerships, education and the balanced use of effective controls that align with the University's responsibilities and mission. About the Position: The IT Security
-
) in Business Intelligence and Data Analytics Cyber Security Management Digital Enterprise and Cloud Management Entrepreneurship Finance General Business Healthcare Management Health Informatics
-
related to one or more of the following areas: technology and crime, cyber security studies, fraud studies, artificial intelligence analysis, criminology, and criminal justice.