286 information-security "https:" "https:" "https:" "https:" "UCL" "UCL" uni jobs at Oak Ridge National Laboratory
Sort by
Refine Your Search
-
the High Flux Isotope Reactor (HFIR) and Cold Neutron Source plant systems. HFIR is a category 1 nuclear facility and requires that a high degree of rigor be applied to HFIR nuclear procurement processes
-
knowledge of strategic finance and financial data analysis with experience in operating facilities. Visa Sponsorship: Visa sponsorship is not available for this position. Security, Credentialing, and
-
tools to support reporting, data analysis, or process automation. SHRM-CP or PHR certification. Visa Sponsorship: Visa sponsorship is not available for this position. Security, Credentialing, and
-
of emerging architectures and performance for advanced computing. This position resides in the Architectures and Performance Group in the Advanced Computer Systems Research (ACSR) / Comuter Science Mathematics
-
Requisition Id 16086 Overview: The Laboratory Protection Division (LPD) is seeking a detailed-oriented, customer focused professional for the position of Badging Specialist. This person will
-
, and project teams to define work scopes, understand work controls, and execute tasks aligned with program objectives. Apply ORNL safety, security, and quality requirements in all work activities
-
work in compliance with quality assurance processes, configuration management requirements, and applicable safety standards. Lead small to medium EI&C design work packages, ensuring coordination
-
improvements, tool adoption, cross-functional collaboration, or any new ways to better serve our program’s mission. This position resides in the Research Application Development in the Secure and Digital
-
-leading capabilities of ORNL to deliver groundbreaking advancements with a variety of applications, from national security to life-saving medical treatments. ESED is the national steward for the research
-
, queue statistics, and resource usage to inform planning and continuous improvement. Security and Compliance: Apply basic cyber-security principles (e.g., SSH key hygiene, least privilege, firewall rules