117 information-security "https:" "https:" "https:" "https:" "https:" "U.S" positions at Georgetown University
Sort by
Refine Your Search
-
of network design and engineering, data cabling systems, door access controls, security cameras, or alarm systems. ● Demonstrated experience in network design, project management, or IT infrastructure planning
-
The Center for Security and Emerging Technology, under the School of Foreign Service, is a research organization focused on studying the security impacts of emerging technologies, supporting academic
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
security. A fully detailed outlining of tasks specific to the position should be reserved for the Responsibilities section below. Work Interactions The work performed by this team is essential for ensuring
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
designations for staff positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation. This is an emergency designated position given its key role in
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
of university affiliated individuals and will partner closely with the university’s information security resources to ensure enterprise platforms are following fundamental cybersecurity concepts and practices