312 computer-programmer-"https:" "https:" "https:" "KU LEUVEN" positions at George Mason University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
cybersecurity operations program across colleges, research labs, and central IT with both authority and influence; Hands on leadership supporting research computing (e.g., HPC clusters, secure research enclaves
-
Department: Col of Engineering and Computing Classification: Education Support Spec 3 Job Category: Classified Staff Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk) Location
-
Plan; Company-provided tools and equipment; Patriot Perks discounts to restaurants, events, and more! For you and your family… Health/dental/vision benefits; and Tuition dependent benefit (restrictions
-
, client responsiveness, and alignment with institutional standards; Designs and implements a robust training program and ensures subordinates deliver effective training on equipment operation, venue
-
by serving as George Mason University's facility, program, and support services management department for the Johnson Center, Student Union Building I, and The Hub. The department aims to support and
-
Transit Benefit (monthly benefit to cover the cost of commuting by public transit or vanpool); Virginia Retirement System Hybrid Plan; Company provided uniforms, tools, and equipment; Patriot Perks
-
in shaping the future of secure-by-design systems. Home to the first undergraduate Cyber Security Engineering program in the United States and the first ABET-accredited program in this field, CYSE has
-
Department: The mission of the Enterprise Applications (EA) department is to plan, implement and maintain integrated central and distributed information systems and associated databases that support the
-
selected for employment, contingent upon a favorable review; and EIT or demonstrated movement toward professional registration. May be substituted with approval from the Director of Program Management based
-
communications skills, especially in writing and presentation; Demonstrated leadership across decentralized or federated IT environments; Ability to lead a cybersecurity operations program across colleges