119 information-security "https:" "https:" "https:" "U.S" "U.S" positions at Georgetown University
Sort by
Refine Your Search
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
Operations, the chief information security officer and the AVP of Enterprise services. This role is responsible for mobilizing their teams to provide solutions and resolve issues for research technology
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about
-
project design issues with Georgetown clients as well as appropriate staff counterparts in the other Planning and Facilities Management areas, the Department of Public Safety, the Office of University Information
-
, scheduling appointments, and maintaining front office organization and security. The EA works collaboratively with other Dean’s Office staff to ensure the front office is appropriately staffed and provides
-
President for Classroom and Shared Space Support. The Director of Endpoint Management is a critical leadership role that collaborates extensively with other IT leaders, including the Information Security
-
(or equivalent experience) 5-7 years of experience advancing effective and just policies in the United States, plus a commitment to GCPI’s mission is required Deep knowledge of economic security, racial
-
The Senior Physical Security Specialist provides informed and researched assessments, analysis, recommendations, and logical recommendations with respect to security countermeasures and mitigation