892 information-security "https:" "https:" "https:" "https:" "https:" "UCL" positions at University of British Columbia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
judgment in verifying data accuracy and in maintaining security and confidentiality of information. Supervision Received Works with considerable latitude with regard to methods and procedures. Work is
-
. Job End Date March 31, 2027 The possibility for an extension depends on funding. At UBC, we believe that attracting and sustaining a diverse workforce is key to the successful pursuit of excellence in
-
attention to detail is required to identify and correct equipment problems that could result in serious safety, financial and or loss of service to the University. The Refrigeration Mechanic must be able
-
. - Documents opportunities for students, including partner and discipline-specific information, awards, scholarships, health insurance, immigration, housing and safety. - Ensures that information about the
-
Compensation Range $6,747.50 - $9,701.42 CAD Monthly The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately halfway between
-
of Management Compensation Range $7,622.83 - $11,886.67 CAD Monthly The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately
-
Operations Compensation Range $7,622.83 - $11,886.67 CAD Monthly The Compensation Range is the span between the minimum and maximum base salary for a position. The midpoint of the range is approximately
-
of the portfolio includes enterprise application modernization projects across the institution, including applications, infrastructure, cloud platforms, integrations, and components within the information security
-
practical skills required to keep HR issues confidential and personal data secure. Ability to exercise judgment, tact, discretion and diplomacy. Highly effective interpersonal and organizational skills
-
. The incumbent will use high security, technology-enabled processes to ensure the security of the data requiring protection. They will develop sufficient expertise to support the team during high peak demand