337 computer-security "https:" "https:" "https:" "The University of Manchester" positions at George Mason University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
engineering, AI, or computer game design. Instructions to Applicants: For full consideration, applicants must apply for Open-Rank, Term Computer Sciences Faculty at https://jobs.gmu.edu/. Complete and submit
-
. The MCO also administers the meal plans for the entire campus community (students, faculty/staff). Oversight of voluntary debit programs, Mason Money program, subsidiary programs, and services. Auditing
-
principles and compliance standards; Knowledge of computing support requirements and IT security management principles; Ability to work collaboratively and lead successful technology teams; Ability to exercise
-
of varying technical experience; and Must be eligible to work in secure computing environments including International Traffic in Arms Regulations (ITAR) and Controlled Unclassified Information (CUI
-
of varying technical experience; and Must be eligible to work in secure computing environments including International Traffic in Arms Regulations (ITAR) and Controlled Unclassified Information (CUI
-
the Patriot Success Survey and other relevant student surveys to ensure students have access to food, housing, safety, and academic support. Training and Technology Participates in university-wide foundational
-
preferred. Instructions to Applicants: For full consideration, applicants must apply for Administrative Assistant at https://jobs.gmu.edu/. Complete and submit the online application to include three
-
principles and compliance standards; Knowledge of computing support requirements and IT security management principles; Ability to work collaboratively and lead successful technology teams; Ability to exercise
-
by U.S. News and World. In addition to BS and MS programs, the department also participates in a BAS program in Cyber Security, MS program in Data Analytics Engineering, and a PhD program in
-
policy, standards, and practices, and guide the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting