122 information-security-"https:" "https:" "https:" positions at Georgetown University
Sort by
Refine Your Search
-
The Senior Physical Security Specialist provides informed and researched assessments, analysis, recommendations, and logical recommendations with respect to security countermeasures and mitigation
-
device rollouts, and system integrations. Collaborate with UISO to ensure all endpoint solutions comply with university information security policies and standards. Mentor junior technical staff
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Position
-
Security Operations Center (SOC) Manager, University Information Systems/University Information Security Office - Georgetown University The SOC Manager is a self-starter, a natural problem solver
-
community is a close-knit group of remarkable individuals driven by intellectual inquiry, a commitment to social justice, and a shared dedication to making a difference in the world. Requirements Job Overview
-
Operations, the chief information security officer and the AVP of Enterprise services. This role is responsible for mobilizing their teams to provide solutions and resolve issues for research technology
-
(or equivalent experience) 5-7 years of experience advancing effective and just policies in the United States, plus a commitment to GCPI’s mission is required Deep knowledge of economic security, racial
-
with all UIS teams (Help Desk, Network, Security, Infrastructure etc) to understand their specific needs and configure the ITSM platform to support their unique processes. Their interaction is about