795 information-security-"https:"-"https:"-"https:"-"https:"-"https:" positions at University of British Columbia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Compensation Range $6,747.50 - $9,701.42 CAD Monthly The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately halfway between
-
judgment in verifying data accuracy and in maintaining security and confidentiality of information. Supervision Received Works with considerable latitude with regard to methods and procedures. Work is
-
. - Documents opportunities for students, including partner and discipline-specific information, awards, scholarships, health insurance, immigration, housing and safety. - Ensures that information about the
-
of Management Compensation Range $7,622.83 - $11,886.67 CAD Monthly The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately
-
Operations Compensation Range $7,622.83 - $11,886.67 CAD Monthly The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately
-
of the portfolio includes enterprise application modernization projects across the institution, including applications, infrastructure, cloud platforms, integrations, and components within the information security
-
practical skills required to keep HR issues confidential and personal data secure. Ability to exercise judgment, tact, discretion and diplomacy. Highly effective interpersonal and organizational skills
-
knowledge of HSE, WHMIS, WorkSafe BC and all aspects of safety regulations related to working with chemicals and hazardous materials. - Proficiency in computer applications with working knowledge in Microsoft
-
accepted until 11:59 PM on the Posting End Date. Job End Date January 31, 2027 At UBC, we believe that attracting and sustaining a diverse workforce is key to the successful pursuit of excellence in research
-
. The incumbent will use high security, technology-enabled processes to ensure the security of the data requiring protection. They will develop sufficient expertise to support the team during high peak demand