148 information-security "https:" "https:" "https:" "https:" "https:" positions at University of Michigan
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
. For more information about ITS, visit: https://its.umich.edu/about Why Work at Michigan? In addition to a career filled with purpose and opportunity, The University of Michigan offers a comprehensive
-
2:1 Match on retirement savings Responsibilities* Knowledge of all 8 competency domains is expected: Scientific Concepts and Research Design Ethical Participant Safety Considerations Investigational
-
trusted enablers of technology for the U-M community. ITS works together to provide cohesive digital experiences and seamless support to the U-M community. For more information about ITS, visit: https
-
Apply Now How to Apply A successful applicant will submit a cover letter in addition to a resume. This will include whether the applicant is interested in serving as a Student Research Mentor in
-
Apply Now How to Apply We require a cover letter for consideration, and you must attach it as the first page of your resume. In your cover letter, let us know how your experience, career aspirations
-
the "Apply Now" button to begin the application process. Your salary will be determined by your qualifications, experience, and education. Job Summary *This is a full-time, hybrid position. During your 6-month
-
. Please visit the Michigan LARA website for more information about Pharmacy Technician licensing: http://www.michigan.gov/lara/0,4601,7-154-72600_72603_27529_27548-340669--,00.html Newly hired pharmacy
-
Apply Now How to Apply A cover letter is required for consideration for this position and should be attached as the first page of your resume. The cover letter should address your specific interest
-
in the position and outline skills and experience that directly relate to this position. Job Summary The Test Security Manager is responsible for overseeing the comprehensive operations related
-
Description The course provides a graduate-level introduction to (1) infrastructure system design principles, operations, and security and (2) how these systems are modeled and analyzed. It is intended