266 information-security "https:" "https:" "https:" "https:" "UCL" "UCL" uni jobs at Georgetown University
Sort by
Refine Your Search
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Position
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
Operations, the chief information security officer and the AVP of Enterprise services. This role is responsible for mobilizing their teams to provide solutions and resolve issues for research technology
-
and algorithms, (ii) artificial intelligence, machine learning, information retrieval, and data mining, (iii) security, cryptography, and privacy, and (iv) systems, networking, and architecture, with
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range: The projected salary or hourly pay range for this position which represents the full range of anticipated compensation is
-
responsibilities, shepherding stakeholders through the UIS security review process. The Engagement Manager will represent and be an advocate for the IT organization, gain compliance with established policies, and
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about