119 security-"https:" "https:" "https:" "https:" positions at Georgetown University in United States
Sort by
Refine Your Search
-
safety rules, regulations and precautions in performing their duties. Work Interactions The position reports directly to the Landscape and Grounds Supervisor along with eight other laborers Gardener II and
-
spectrometry instrument operations and maintenance Data backup on a UIS drive Maintaining laboratory in compliance with safety procedures General laboratory upkeep that includes autoclaving Scheduling waste
-
safety rules, regulations and precautions. The incumbent represents the department with the University community and its visitors. The incumbent is expected to behave in a professional manner, keep
-
safety and control regulations. Keep abreast of changes and new developments in applicable codes and regulations. Dress in proper uniform and carry valid University identification at all times, setting up
-
will contribute to the intellectual life at the department and the university. See here for some of our theory group achievements: https://cstheory-georgetown.github.io/ Our faculty perform research in
-
professional goals. Support students throughout the study abroad process, including application, orientation, and while abroad, addressing academic, intercultural, health, safety, and adjustment issues. Serve as
-
security, investigation, and emergency response as outlined in general orders, special orders, providing information and assistance as directed by a supervisor, and as proscribed in the Consortium
-
being committed to various kinds of university community needs. Communications Specialists are CPR, NCIC, APCO, and Public Safety Telecommunicator certified through APCO, and Incident Command certified
-
safety rules, regulations and precautions. Work Interactions This position reports directly to one of the Custodial Supervisors. Incumbent will work alone or with others. The incumbent will perform
-
multiple objects using out of the box and packaged data loading tools. Experience developing and implementing user types, profiles, record types, and custom security configuration. Ability to write basic