618 security-"https:" "https:" "https:" "https:" "Keele University" uni jobs at Northeastern University
Sort by
Refine Your Search
-
Listed
-
Field
-
preferred. Advanced experience with Microsoft Excel, preferred; proficient experience required. Experience with database management and analysis preferred. Knowledge of information security and data
-
, infrastructure management, and serving as the primary liaison with the College Computer Center and university IT services and security offices. The Associate Director is responsible for helping researchers in
-
, governance structures, and integration patterns, ensuring that data is trustworthy, discoverable, interoperable, secure, and prepared for advanced use cases such as RAG, vector search, semantic layers, and
-
, vision, dental, paid time off, tuition assistance, wellness & life, retirement- as well as commuting & transportation. Visit https://hr.northeastern.edu/benefits/ for more information. All qualified
-
software is a systems engineering challenge rather than a coding problem. See website for details of programs: http://www.coe.neu.edu/graduate-school/multidisciplinary Responsibilities: Teach selected
-
Snowflake data platform. This role requires deep expertise in Snowflake's core capabilities-including data modeling, performance tuning, ELT pipelines, security controls, and orchestration-while also
-
business continuity: This role requires occasional availability outside of traditional working hours to address urgent business needs as they arise, including, but not limited to, responding to security
-
, wellness & life, retirement- as well as commuting & transportation. Visit https://hr.northeastern.edu/benefits/ for more information. All qualified applicants are encouraged to apply and will receive
-
. Further information about the School and Center can be found online at http://www.northeastern.edu/cssh/sccj/ . Our preferred availability is for classes to take place between the hours of 8:00am and 9
-
occasional availability outside of traditional working hours to address urgent business needs as they arise, including, but not limited to, responding to security incidents, supporting software deployments