Sort by
Refine Your Search
-
Listed
-
Country
- United States
- United Kingdom
- Australia
- Sweden
- Germany
- Spain
- Denmark
- France
- Canada
- China
- Hong Kong
- Netherlands
- Belgium
- Singapore
- Poland
- Ireland
- Japan
- Finland
- Austria
- Luxembourg
- New Zealand
- Norway
- Italy
- Latvia
- Portugal
- Cyprus
- Estonia
- Greece
- Switzerland
- United Arab Emirates
- Czech
- Morocco
- Romania
- Bangladesh
- Bulgaria
- Fiji
- 26 more »
- « less
-
Field
- Medical Sciences
- Computer Science
- Economics
- Engineering
- Business
- Mathematics
- Science
- Biology
- Education
- Materials Science
- Social Sciences
- Arts and Literature
- Psychology
- Electrical Engineering
- Humanities
- Law
- Sports and Recreation
- Chemistry
- Environment
- Linguistics
- Earth Sciences
- Philosophy
- Design
- Physics
- 14 more »
- « less
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
. Experience in managing enterprise business application projects; understanding of IP networks and enterprise applications; knowledge of information security practices and accessibility compliance. Ability
-
follow instruction from Room Seniors in relation to Ofsted requirements and health and safety guidelines at all times. To have an understanding about the safeguarding procedures and be willing to undertake
-
support services. These include, but are not limited to, audiovisual and classroom support, digital signs, enterprise software, and network support. Work assignments encompass issues involving different
-
plays a critical role in staff engagement , the patient experience, quality and safety, and cost effective care. Position Summary: The Staff Nurse is responsible for managing and providing care
-
learn new networking technologies, protocols, cloud solutions, and security practices Solve complex network problems across campus and cloud infrastructure with curiosity and persistence Provide excellent
-
recording. Additional responsibilities include applying security patches, installing the latest software and applications, as well as resolving network security gaps. Work hours may be irregular to meet the
-
of network design and engineering, data cabling systems, door access controls, security cameras, or alarm systems. ● Demonstrated experience in network design, project management, or IT infrastructure planning
-
to providing reliable, high-performance and secure IT solutions and effective IT governance for the campus. Here at NUS IT, we aim to transform NUS into a borderless computing community providing knowledge
-
, crime reporting, and other related issues for the past three (3) calendar years. The FIU Annual Security report is available online at: https://police.fiu.edu/download/annual-security-fire-safety-report