Sort by
Refine Your Search
-
enforcement data. Experience managing or supporting physical security systems (e.g., campus video monitoring, electronic key management, alarm systems). Skills and Requirements: Must be a U.S. citizen and at
-
Systems Security Officer, University Information Systems/University Information Security Office - Georgetown University. The ISSO will be responsible for managing the authorizations and risks related
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
-solving abilities. Excellent communication, presentation, and interpersonal skills, capable of influencing stakeholders at all levels. Deep understanding of IT infrastructure, applications, and security
-
. The position exists to provide expert physical and technical assistance for network systems, ensuring the reliability, efficiency, and security of IT services across all campuses and international sites
-
for keeping our community proficient in the latest software, hardware, and IT procedures, improving productivity, security and user experience. They will report directly to the Director of IT Communications and
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
The Georgetown Institute for Women, Peace and Security (GIWPS), School of Foreign Service is looking for a dynamic and enthusiastic Research Coordinator to support the Hillary Rodham Clinton (HRC) Oral
-
minutes from the U.S. Capitol and U.S. Supreme Court, Georgetown University offers rigorous academic programs, a global perspective, and unparalleled opportunities to engage with Washington, D.C. Our
-
President for Classroom and Shared Space Support. The Director of Endpoint Management is a critical leadership role that collaborates extensively with other IT leaders, including the Information Security