637 information-security-"https:"-"https:"-"https:"-"https:"-"https:"-"UCL" positions at University of Florida
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Lead UF’s research security program in alignment with federal guidance, including NSPM-33 requirements. Conduct research security risk assessments for international engagements, data sharing, and
-
Resource Planning; Data Platform and Analytics; Information Security Office; Infrastructure and Communication Technology; and Research Computing. UF Information Technology (UFIT) enables teaching, learning
-
; Applications, Development, and Integrations; Business Center; Customer Experience and Resource Planning; Data Platform and Analytics; Information Security Office; Infrastructure and Communication Technology; and
-
seamless data flow across systems while maintaining data integrity, security, and compliance standards. This role requires deep expertise in Workday integration tools including Enterprise Interface Builder
-
handling, security, and utility for research and innovation. This position is time-limited and soft-funded. The University of Florida Lastinger Center for Learning’s mission is to improve the quality
-
are: Academic Technology; Applications, Development, and Integrations; Business Center; Customer Experience and Resource Planning; Data Platform and Analytics; Information Security Office; Infrastructure and
-
UFIT are: Academic Technology; Applications, Development, and Integrations; Business Center; Customer Experience and Resource Planning; Data Platform and Analytics; Information Security Office
-
Resource Planning; Data Platform and Analytics; Information Security Office; Infrastructure and Communication Technology; and Research Computing. UF Information Technology (UFIT) enables teaching, learning
-
, and classroom teaching. The Department of Electrical & Computer Engineering at the University of Florida (https://ece.ufl.edu/) has 60 faculty members working in all aspects of electrical & computer
-
any related personal and health protected information into designated and secure lockboxes, or cabinets based on guidelines. Additionally, Collects, enters, and stores clients’ electronic data and any