204 security-"https:" "https:" "https:" "https:" positions at Northeastern University in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
, manuscript preparation, meeting with collaborators, etc. (10%) Secure sufficient and pertinent research funding to supplement finances by preparing research grant applications, delivering grant milestones, and
-
with Microsoft Excel, preferred; proficient experience required. Experience with database management and analysis preferred. Knowledge of information security and data management best practices preferred
-
activities. Also, he/she/they secure appropriate licensing rights for use of music or other intellectual property; scout and secure film shoot locations and props; review scripts, and hire technical personnel
-
experience focused on safety and security, meaningful connections and a sense of belonging, high student satisfaction, inclusive communities, assessment of learning experiences, and innovation. The Director is
-
that safeguard medical devices and both clinical and non-clinical networks. The work will directly impact patient safety and digital resilience in vulnerable healthcare settings. Success in this role will help
-
manage comprehensive and compelling solicitation strategies; and to cultivate, solicit, and steward university-wide prospects and donors, thus securing significant philanthropic revenue for the university
-
and responsibilities ADDITIONAL RESPONSIBILITIES Ensure safety of participants and monitor environmental (field/court/playing surfaces) conditions Ensure that Injury Reports are completed for each
-
working relationship with and support of KRI Senior R&D Engineers/Scientists for government and industry contracts will be required. The Kostas Research Institute was founded, focusing on homeland security
-
and CI/CD principles as applied to AI systems and data pipelines, including containerization, orchestration, and infrastructure as code. Security Awareness: Understanding of security best practices
-
with network service providers and hardware vendors to ensure high-quality service and support. Code Upgrades: Plan and execute network device code upgrades to maintain security and performance. Post