Sort by
Refine Your Search
-
for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites. The role involves a mix of strategic planning, team leadership, and tactical
-
management software. The incumbent manages the student locker registration program, processes guest parking requests, and maintains all department Safety Data Sheet (SDS) binders to comply with OSHA guidelines
-
The CRM Security and Deployment Coordinator is in charge of all profile and permission set configuration for Salesforce in support of both the Advancement and University-wide CRM system. This position
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
, alumni, visitors, neighbors) and external agencies (MPD, DCFD, FBI, USSS, etc). The incumbent is often the fact of university safety. Incumbent interacts routinely with students, faculty, staff, parents
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
for keeping our community proficient in the latest software, hardware, and IT procedures, improving productivity, security and user experience. They will report directly to the Director of IT Communications and
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job
-
Officers and Specialists, Security Officers, and Student Guards. This position is considered as essential under the University Personnel policy guidelines and therefore is subject to be on call when
-
-solving abilities. Excellent communication, presentation, and interpersonal skills, capable of influencing stakeholders at all levels. Deep understanding of IT infrastructure, applications, and security