Sort by
Refine Your Search
-
across the university. As a senior technical expert, the role involves deep collaboration with stakeholders, key decision-makers, and subject matter experts to design and implement solutions that support
-
, collaborative, and able to work well with adversity and ambiguity. You should have strong problem-solving skills, excellent communication skills, a deep technical understanding of modern cybersecurity threats
-
& Influence: Strong leadership presence, capable of influencing stakeholders at all levels of the organization and driving adoption through effective communication and training. Adult Learning Principles: Deep
-
of external and internal cyber threats and vulnerabilities, ensuring alignment with GU’s broader cybersecurity strategy. This position requires deep collaboration across cloud engineering, IT infrastructure
-
marketing campaigns. Strong writing and editing skills with experience in following editorial style guidelines. Deep understanding of content metrics and analytics tools (e.g., Google Analytics, SEMrush, Moz
-
. Experience within a higher education or research institution. Deep knowledge of regulatory frameworks governing academic institutions and sponsored research. Work Mode Designation This position has been
-
years of supervisory experience), OR equivalent work experience, e.g., each year of work experience may be substituted for each year of education required Deep expertise in adult learning theory
-
. Deep expertise in IT Service Management (ITSM) principles and frameworks, particularly ITIL. Flexibility and skill in handling a wide range of management and organizational issues plus the ability
-
penetration testing tools ● Deep technical knowledge of computer networking concepts and protocols, network security methodologies, cyber threats and vulnerabilities, authentication, authorization, and
-
-solving abilities. Excellent communication, presentation, and interpersonal skills, capable of influencing stakeholders at all levels. Deep understanding of IT infrastructure, applications, and security