337 information-security "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" positions at Oak Ridge National Laboratory in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
strength of ORNL which is the U.S. Department of Energy’s largest Office of Science laboratory. ORNL is home to two user facilities in manufacturing – the Manufacturing Demonstration Facility (https
-
Qualifications Familiarity with relevant DOE regulations, applicable safety or security standards, and experience in a major experimental research facility or equivalent setting are highly desirable. Preference is
-
engineering. This position seeks a candidate with demonstrated experience in applied machine learning and computational data science for complex, safety-critical systems, with an emphasis on time-series anomaly
-
senior engineers and other IT and IA professionals to ensure the confidentiality, integrity, and availability of network services in compliance with government security regulations. As part of our team
-
Requisition Id 16116 Overview: The Laboratory Modernization Division (LMD) at Oak Ridge National Laboratory (ORNL) is seeking qualified applicants for the position of Construction Field
-
to meet the growing demand for radioisotopes. ORNL is the largest multi-program science and energy laboratory in the Department of Energy system. This role directly supports mission-critical nuclear
-
Requisition Id 16106 Overview: Oak Ridge National Laboratory is the largest US Department of Energy science and energy laboratory, conducting basic and applied research to deliver transformative
-
Requisition Id 16086 Overview: The Laboratory Protection Division (LPD) is seeking a detailed-oriented, customer focused professional for the position of Badging Specialist. This person will
-
platforms Excellent communication skills Visa sponsorship is not available for this position. Security, Credentialing, and Eligibility Requirements: This position requires the ability to obtain and maintain
-
, queue statistics, and resource usage to inform planning and continuous improvement. Security and Compliance: Apply basic cyber-security principles (e.g., SSH key hygiene, least privilege, firewall rules