Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
of Georgetown Capitol Campus, UIS, Vendors and Integrators. Requirements and Qualifications Bachelor’s degree (Master’s Preferred) in Computer Science, MIS, masters in a computing field preferred or Commensurate
-
is a cloud-based system that hosts applications supporting one of Georgetown University’s primary missions of faculty research. These applications primarily support the research offices across all
-
to the processing, storage, and transmission of information. The ISSO also manages and enforces government and corporate information security policies, provides training, and educates end users and program staff
-
, such as program operations, and marketing and communications. It is essential that this individual be professional and knowledgeable about the MSB’s offerings to best guide prospects during
-
mission and goals of Georgetown University. Requirements and Qualifications Bachelors in Computer Science or relevant experience 2+ years of software engineering experience (Java or Python preferred, but
-
the delivery of a world class threat defense program that is positioned to address, contain, and drive successful resolution to any cybersecurity situation. Duties include but are not limited to: Oversee daily
-
, and unit leaders to tailor messaging for various audiences. Requirements and Qualifications Bachelor's degree in Information Technology, Computer Science, or a related field; a Master's degree is a plus
-
: Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field. Master's degree (MBA or equivalent) strongly preferred. Experience: 12+ years of progressive
-
community engaged in rethinking civic agency in the age of intelligent machines. Program Overview The fellowship will include: Research: Develop and pursue a research project at the intersection of AI
-
programs. Experience with change management principles (e.g., Prosci ADKAR) related to technology adoption. Familiarity with common enterprise IT systems (e.g., ERP, CRM, cloud platforms, cybersecurity