241 cloud-computing-"https:" "https:" "https:" "https:" "https:" "St" "St" "St" "St" positions at George Mason University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
: The Department of Computational and Data Sciences (CDS) (https://sciences.gmu.edu/cds) at George Mason University (GMU) is a rapidly growing department for data science and computing innovation. Part of
-
: For full consideration, applicants must apply for the Federal Work-Study Program Assistant & Workflow Developer at https://jobs.gmu.edu/. Complete and submit the online application to include three
-
for Project Management Estimator & Closeout Specialist at https://jobs.gmu.edu/. Complete and submit the online application to include three professional references with contact information, and provide a
-
, an on-campus 3T MRI facility, EEG, TMS and tES, eye-tracking, and animal housing facilities. In addition, researchers benefit from access to high-performance computing resources and Azure cloud infrastructure
-
degree in Telecommunications, Network Engineering, Cloud Engineering, Information Technology, Cyber Security Engineering, Computer Science, Computer Engineering, or a closely related field; and Solid
-
, applicants must apply for the Patriot Green Fund Program Manager at https://jobs.gmu.edu/. Complete and submit the online application to include three professional references with contact information, and
-
, Cybersecurity, Human Centered Computing (including Information Visualization, Human Computer Interaction, Social Computing, Pervasive & Ubiquitous Computing), Network Science, Cloud Computing, Information System
-
. The architect will lead the development of security frameworks, standards, and best practices across cloud and on-premise environments, while collaborating with stakeholders to integrate security into all phases
-
: For full consideration, applicants must apply for the Federal Work-Study Program Assistant & Workflow Developer at https://jobs.gmu.edu/. Complete and submit the online application to include three
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between