176 information-security-"https:"-"https:"-"https:"-"https:"-"https:" positions at The University of Arizona
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
-based criminal background check (non-security sensitive) Number of Vacancies 1 Target Hire Date Expected End Date Contact Information for Candidates College of Medicine-Phoenix, Office of Human Resources
-
report with information on fire statistics and fire safety systems, policies, and procedures. Paper copies of the Reports can be obtained by contacting the University Compliance Office at cleryact
-
(non-security sensitive) Number of Vacancies 1 Target Hire Date 2/27/2026 Expected End Date Contact Information for Candidates Talent Acquisition, Office of Human Resources talent@arizona.edu Open Date 2
-
of criminal background check required: Fingerprint criminal background check (security sensitive due to title or department) Number of Vacancies 1 Target Hire Date Expected End Date Contact Information for
-
), each year the University of Arizona releases an Annual Security Report (ASR) for each of the University’s campuses. These reports disclose information including Clery crime statistics for the previous
-
Student Services Type of criminal background check required: Name-based criminal background check (non-security sensitive) Number of Vacancies 1 Target Hire Date Expected End Date Contact Information for
-
equivalency (FTE) Type of criminal background check required: Name-based criminal background check (non-security sensitive) Number of Vacancies 2 Target Hire Date Expected End Date Contact Information for
-
Statistics Act (Clery Act), each year the University of Arizona releases an Annual Security Report (ASR) for each of the University’s campuses. These reports disclose information including Clery crime
-
of Arizona releases an Annual Security Report (ASR) for each of the University’s campuses. These reports disclose information including Clery crime statistics for the previous three calendar years and
-
compliance with data security and privacy standards. Develop and maintain architectural approaches and frameworks for the organization’s IT infrastructure, including documentation. Take part in a rotating on