49 security-"https:"-"https:"-"https:"-"https:"-"Leeds-Beckett-University" positions at Texas A&M University System
Sort by
Refine Your Search
-
Job Title Security Engineer II Agency Texas A&M University System Offices Department Cyber Engineering Proposed Minimum Salary Commensurate Job Location Bryan, Texas Job Type Staff Job Description
-
Job Title Security Analyst I P68 Agency Texas A&M University System Offices Department Cyber Operations Proposed Minimum Salary Commensurate Job Location Bryan, Texas Job Type Staff Job Description
-
to promote work/life balance. Salary: Commensurate with experience. Job Description Summary: Performs complex information security program management work. Performs risk analysis, planning and budgeting, and
-
platforms used in secure and innovative research settings and at times will be expected to engage with partners internal to the Texas A&M University System and external partners (e.g., government
-
, reliability, security, and reproducibility. - Design and oversee the implementation of generative AI, large language model (LLM), natural language processing (NLP), agentic AI, and intelligent automation
-
campus network. This position is responsible for developing, maintaining, and evolving the campus-wide network architecture, ensuring performance, scalability, reliability, and security. The role provides
-
communication skills. - Planning and organizational skills. - Ability to multi-task and work collaboratively with others. Other Requirements: This is a security-sensitive position and is restricted to U.S
-
maintain inventory. ·Maintain laboratory equipment. ·Oversee laboratory safety. ·Assist the principal investigator and other laboratory methods with preparing reports, figures, invoices, cataloging records
-
oversee the monitoring and maintenance of network security. - Coordinates the evaluation of new technologies. - Makes recommendations based on the evaluation of new technologies for their applicability
-
. - Collaborates with Network Security to discreetly locate and isolate compromised, lost, stolen, or malicious devices, and report to team leader and the requesting entity. - Assists with on-site firewall