Sort by
Refine Your Search
-
Systems Security Officer, University Information Systems/University Information Security Office - Georgetown University. The ISSO will be responsible for managing the authorizations and risks related
-
Technical Operations Manager, Public Safety Georgetown University Police Department - Georgetown University. This specialized, emergency-essential role is responsible for the oversight and management of all
-
The Senior Physical Security Specialist provides informed and researched assessments, analysis, recommendations, and logical recommendations with respect to security countermeasures and mitigation
-
of the university's enterprise endpoint environment. This includes configuration, security, and lifecycle management for all Windows, macOS, and mobile devices. The Senior Engineer establishes best practices for a
-
, secured, and maintained to support the university's academic and administrative functions. This role exists to create a stable, reliable, and secure computing environment that enhances the productivity and
-
Security Operations Center (SOC) Manager, University Information Systems/University Information Security Office - Georgetown University The SOC Manager is a self-starter, a natural problem solver
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
visitor passes, and enforcing parking and safety regulations to support space availability and public safety. Provides information and assistance to visitors and members of the Georgetown Law community
-
The Center for Security and Emerging Technology, under the School of Foreign Service, is a research organization focused on studying the security impacts of emerging technologies, supporting academic
-
policy analysis; leads long-term, complex, mixed-methods research projects; and produces shorter-term analyses on a wide range of issues relating to economic security and opportunity. Research methods may