602 information-security-"https:"-"https:"-"https:"-"https:"-"https:" positions at University of North Texas at Dallas
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
temperatures. Exposure to moving mechanical parts or vibration. Noisy environments. Work Schedule M - F, 8am to 5pm Driving University Vehicle No Security Sensitive This is a Security Sensitive Position. Special
-
of all IT assets, including immediate installation of highly critical security patches or ensuring that proper workarounds are implemented.. Work with the ITSS Information Security team to ensure proper
-
opportunities. Driving University Vehicle No Security Sensitive This is a Security Sensitive Position. Special Instructions Applicants must submit a minimum of two professional references as part of
-
The Department of Medical Education and Health Systems Science is seeking a detail-oriented patient safety Administrative Specialist to provide outstanding administrative, and operations support to support the
-
quality assessments, and emergency planning assistance for events. Position Overview The Fire Safety Technician is responsible for the operation and maintenance of life safety systems, including but not
-
special events in Transportation Assist the Cross Funct IT Support Supervisor in ensuring proper firewall and security operations for all systems within the primary area. Follow best practices guidelines
-
users/desktops and servers. Ensure proper firewall and security operations for all systems within the primary area. Follow best practices guidelines to ensure security of all IT assets, including
-
security and compliance services. As a department, we strive to provide the most professional personnel possible to serve our campus constituents. The University of North Texas is a state employer offering
-
. Environmental Hazards No adverse environmental conditions expected. Work Schedule M-F, 8-5 Driving University Vehicle No Security Sensitive This is a Security Sensitive Position. Special Instructions Applicants
-
Administration, Cloud Security, Computer Forensics, Computer Networks, and Programming. An earned master’s degree in Cybersecurity, Information Technology, Computer Science, or a related discipline. Demonstrated