Computer Security Specialist Job Description Sample
Senior Computer Security Systems Specialist Lead (Government)
The Cybersecurity Analyst is a member of the Defensive Cyber Operations team (on the DISA GSM-O program). This team
supports network assurance activities within DISA.
Candidate will perform the following duties:Responsible for maintaining the integrity and security of enterprise-wide cyber systems and networks
Supports cyber security initiatives through both predictive and reactive analysis
Articulates emerging trends to leadership and staff
Coordinates resources during incident response efforts, driving incidents to timely and complete resolution
Performs network traffic analysis using raw packet data, net flow, IDS data, and custom sensor output
Reviews threat data and develops custom signatures
Correlates actionable security events and develops unique correlation techniques
Uses attack signatures and tactics, techniques and procedures (TTPs) to aid in Zero-Day detection
Uses attack signatures and TTPs associated with Advanced Persistent Threats to identify new threats and attacks
Conducts basic malware analysis of attacker tools, identifying indicators of compromise, and reverse engineer attacker
Interfaces with external entities, including law enforcement and intelligence community organizations
Provides analysis of incidents for customers by:
determining the incident's nature and formulating responses
identifying and providing the ability to surge during emergencies
correlating event and incident data
determining possible effects on the DODIN, customer networks, and other organizations
Ability to work independently and within a team as required
Monitors Computer Network Defense (CND) security-relevant network components
Performs infrastructure monitoring, performance assessment, new requirement analysis and support
Prepare and disseminate CND reports, trends, responses, mitigations, analysis, and information
Provide support to leadership for CND applicable activities within Protect, Detect, Respond, and Sustain
Support a performance-based environment with pre-determined Acceptable Levels of Performance (ALPs)
Support the development, documentation, and tracking of metrics relevant to the ALPs
Interface with government counterparts and leadership
Master's degree from an accredited college in a related discipline, with three (3) years of professional experience; or Bachelor's degree from an accredited college in a related discipline, with five (5) years of professional experience; or ten (10) years professional experience in Information Security, with at least four (4) years specializing in security, vulnerability mitigation techniques, and exploitation methods within enterprise networks
DoD 8570 Compliant for IAT Level II: Possess a CASP, CCNA-Security, CISSP, CSA+, GICSP, GSEC, Security+CE, or SSCP certification
DoD 8570 Compliant for CSSP Analyst within 90 days of employment: Possess a CEH, CFR, CSA+, GCIA, GCIH,
GISCP, or SCYBER certification
In-depth understanding of TCP/IP protocols, ports, and services
Strong communication skills, both written and verbal
Desired Experience, Education, and Certifications:
Department of Defense experience
Command Line Scripting skills (PERL, Python, PowerShell scripting) to automate analysis task
Knowledge of hacker TTPs
Be able to conduct basic malware analysis
Demonstrated hands on experience with various static and dynamic malware analysis tools
Knowledge of advanced threat actor TTPs
Understanding of software exploits
Ability to analyze packed and obfuscated code
Comprehensive understanding of common Windows APIs and ability to analyze shellcode
Required Clearance: TS/SCI
Job ID 1921784 Date posted 04/19/2019
Computer Security Incident Response (Csirt) Analyst
- Provide remedial recommendations and produce consistent comprehensive reports on findings.
- Traffic analysis (at the packet level) and reconstruction of network traffic to discover anomalies, trends, and patterns affecting the customer's networks
- Analysis and recommendation of hardware and/or software tools that will assist in traffic analysis
- Implementation, training, and SOP development and maintenance of implemented solutions
- In-depth Web log analysis to determine trend, patterns, and suspicious activity Pattern analysis, trend analysis, behavior analysis, and other specialized analysis. Reporting results of all analyses to the SOC GWO and PM
- Coordinate and advise on incident response actions taken by Incident Response Handlers for incidents affecting their areas.
- Assist in providing 24x7x365 monitoring of the customer's SPAM”mailbox(s) for suspicious messages submitted by government and contractor personnel.
- Assist in monitoring all SOC mailboxes (not individual user mailbox contents) to detect phishing attacks as well as any suspicious outbound messages.
- Provide weekly, monthly, and quarterly reports of monitoring and analysis activities. Respond to email attacks by:
- Identifying users who may have received malicious messages.
- Identifying any infections that occurred as a result of the message and initiate a block request to customer.
- Alert effected customer users of malicious email attempts and providing resolution within time frame established in the current SOP
- Collaborate with the Focused Operations (FO) team to dissect Targeted Spear Phishing attacks from general mass email attacks.
- Familiarity with the following security applications is desired: Splunk, McAfee EPO, FireEye
- Must have or be able to obtain at least one of the listed certifications prior to starting: Network +, Security + or CISSP
- US Citizenship with an active DoD Top Secret Clearance is required
- Must be able to obtain an agency specific Entry on Duty (EOD) clearance
Conservation Branch Computer System Analyst, Security & Management Specialist - Ft Polk, LA
Posting Detail Information
Working Title Conservation Branch Computer System Analyst, Security & Management Specialist - Ft Polk, LA Position Location Fort Polk, LA Research Professional Position No Posting Number 201900256AP Position Type Admin Professional/ Research Professional Number of Vacancies 1 Work Hours/Week 40 Proposed Annual Salary Range $40,000 - $55,000 Desired Start Date 05/20/2019 Position End Date (if temporary) To ensure full consideration, applications must be received by 11:59pm (MT) on 04/29/2019 Description of Work Unit
CEMML is a research, education and service unit within the Warner College of Natural Resources at CSU. CEMML applies the latest and most appropriate science to promote the sustainable management of natural and cultural resources on Department of Defense (DOD) and other public lands. We provide technical support, conduct applied research, and offer career development and learning opportunities to support resource stewardship. We collaborate with our sponsors and within CSU to resolve complex environmental issues, leaving a legacy of science-based decisions that sustain our resources for future generations.
To learn more about CEMML's contributions to land management, our mission, vision, and values, visit http://www.cemml.colostate.edu/.
As an independent cooperator, provide support to the Fort Polk Conservation branch in implementing management guidelines of Computer security, training, maintenance, and requisition.
Required Job Qualifications
This is an entry level position for individuals with less than 3 years of professional, post-baccalaureate (or equivalent) experience. 3 years of equivalent IT experience may be substituted for a bachelor's degree.
2 years of experience providing IT support
Ability to set up and troubleshoot computer systems
1-year networking experience
1-year system administration experience
The successful candidate must be legally eligible to work in the United States by the proposed start date. CEMML will not provide visa sponsorship for this position.
Preferred Job Qualifications
Degree or certification in computer science or information technology
More than 2 years of providing IT support
2 years of experience supporting a military installation
Experience with fleet management
Experience working at Fort Polk
Reflecting departmental and institutional values, candidates are expected to have the ability to advance the Department's commitment to diversity and inclusion.
RF & Computer Forensics Specialist
- Requires 10 to 12 years with BS/BA or 8 to 10 years with MS/MA or 5 to 7 years with PhD.
- Bachelor’s degree (or equivalent) in Cybersecurity, Information Technology (IT), Electrical Engineering (EE), Computer Science, Computer/Digital Forensics, Engineering, Math, Physics.
- Demonstrated 4 to 6 years’ experience in three or more of the following: analysis, RF analysis, RF engineering, computer forensics, network engineering, networking security, penetration testing, red teaming, hardware engineering, software reverse engineering, computer exploitation.
- Proven proficiency with at least three (3) or more of the following: mobile security, telecom protocols, operating systems (Windows, iOS, Android, or Linux), reverse engineering, forensics, network analysis, vulnerability assessment or malware forensics.
- Demonstrated familiarity with Wireshark, Fiddler, EnCase, Sleuthkit and/or other forensic tools.
- Demonstrated familiarization with waveform engineering and analysis.
- Demonstrated familiarity with RF testing and RF analysis.
- Demonstrated experience in drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis.
- Demonstrated experience in performing post-incident computer forensics while maintaining proper chain of custody and without destruction of critical data.
- TS/SCI with poly.
- Experience within Intelligence Community (IC).
- Experience employing advanced forensic tools and techniques for attack reconstruction, including dead system analysis and volatile data collection and analysis.
- Law Enforcement/Cyber Forensics experience.
- Desired experience ensuring quality assurance and the spreading of best practices.
- Relevant Certifications: CCFP, GCIA, OSCP, CEH, CISSP, or Security+.
- Publications in peer-reviewed journals.
Computer Systems Security Specialist
Computer Systems Security Specialist – Rural Sourcing
Bringing IT jobs back to the United States – that's what Rural Sourcing does. Getting the opportunity to work on Fortune 1,000 client projects in a fun, collaborative environment while continuously sharpening your technical skills – that's what you'll do when you work here!
So who are we, you ask? We are Rural Sourcing, and we believe there is a simple formula for our success; Colleagues, Clients, and Community. We know that without great Colleagues on our team, we can't provide the stellar Client services we're known for in the Communities in which we are located. If you are ready to kick off your loafers and join a company with a refreshing culture and great career opportunities, Rural Sourcing could be your new home!
A Day in the Life of a Rural Sourcing Cyber Security Specialist:
Develop custom security tools to improve coverage and validate findings
Work with Agile, GIT and release planning
Networking technologies and protocols such as SSL/TLS, SSH, TCP/IP, VPN, VLAN, firewalls, WAFs
Enterprise services such as LDAP, SAML, API Gateways, secure web services
Computer architecture, operating systems, assembly language and reverse engineering
Expertise a Rural Sourcing Colleague will need:
Minimum ten (10) years of experience
Strong knowledge of software implementation best practices
Good interpersonal, written and verbal communication skills
Ability to work in a team environment
Why you will enjoy Mondays again:
Collaborative, Fun, Creative Culture – because who wants to be bored at work?
Tuition Reimbursement – "Much to learn, you still have" –Yoda, Star Wars
Work from Home Days – sometimes it's just nice to stay in your PJ's
Ongoing Training and Development – learning from others and sharing your two cents!
Room for Growth and Progressive Career Path
Casual Dress – jeans welcome!
Competitive Salary + Bonus Opportunities
Robust Medical, Dental, and Life Insurance Package – because we all need that peace of mind.
401(k) Plan – don't we all have that retirement dream home?
Substantial Paid Time Off
Equal Employment Opportunity Policy: Rural Sourcing is committed to offering equal employment opportunity without regard to age, color, disability, gender, gender identity, genetic information, marital status, military status, national origin, race, religion, sexual orientation, veteran status, or any other legally protected characteristic.
Senior Computer Security System Specialist
The Alaka'ina Foundation Family of Companies (FOCs) is looking for Senior Computer Security Specialists to provide computing environment services across multiple mission areas for a customer in Honolulu, HI.
Administering the Coalition Electronic Key Management (CEKMS) and Regional COMSEC Account.
Managing COMSEC inventory, including receiving, storing, and transferring COMSEC inventories and managing transaction files in accordance with NSA CSS Policy Manual 3.16.
Documenting quarterly inventories and inspections of all stored COMSEC equipment, KEYMAT documents, and materials using the NSA Central Office of Record (COR) website.
Performing routine destruction of COMSEC materials when required by NSA COR keying material Controlling Authority (CONAUTH).
Conducting semiannual inventories by sighting all COMSEC material charged to the account, and reconcile inventory with the Central Office of Record (COR).
Providing documentation for the following: the current status of COMSEC related issues; status reports concerning new requirements and modifications to existing requirements; accounting records, meeting minutes, status of COMSEC devices and keys, inventory reports, after action reports, travel reports, and transfer/destruction/possession reports.
Develop Standard Operating Procedures (SOPs) for all issues concerning COMSEC equipment, KEYMAT, and associated information from coalition countries.
Provide the technical assistant with monthly status reports to include lists of accomplishments and any task issues/problem areas requiring government action.
REQUIRED SKILLS AND EXPERIENCE:
Must have at least two (2) years of experience as a COMSEC manager.
Must have direct experience with the requirements detailed within NSA CSS Policy Manual 3.16 and KMI 5110 Version 1.
Must have a strong background in C4I System and Networks.
Must be experienced in COMSEC equipment and system to include Secure Communications Internet Protocol (SCIP) devices, Secure Analog and Data Service devices, SECTERA Wireline Terminal (SWT), Secure Telephone Equipment (STE), and SECTERA VIPER phone.
Must be able to clearly articulate COMSEC concerns, including recommended courses of action both verbally and in writing, to U.S. and Host Nation Senior Leadership.
Must be able to complete KMI operations training provided by NSA/DoD Service sponsored agency.
- Must meet IAM I baseline requirements per DoD 8570.01-M.
Must be a US citizen.
Must have a secret clearance.
ina Foundation Family of Companies (FOCs) is comprised of industry-recognized government service firms who are designated as Native Hawaiian Organization (NHO)-Owned and fall into the respective categories of standard Small Business, 8(a) certified Small Disadvantaged Business (SDB), and HUBZone. The FOCs includes Keaki Technologies, Laulima Government Solutions, Kūpono Government Services, Kāpili Services, and Po
okela Solutions. Alakaina Foundation activities under the 501(c)3 principally benefit the youth of Hawaii through charitable efforts which includes providing innovative educational programs that combine leadership, science & technology, and environmental stewardship.
For additional information on the Alaka'ina Foundation Family of Companies, please visit www.alakainafoundation.com.
We are an Equal Opportunity/Affirmative Action Employer of individuals with disabilities and veterans. We are proud to state that we do not discriminate in employment decisions on the basis of race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status. If you are a person with a disability and you need an accommodation during the application process, please click here to request accommodation. We E-Verify all employees.
Computer Network Operator Support Specialist
In this position you will utilize graph and other specialized database tools to store, retrieve and evaluate cyber mission information and knowledge. This information and knowledge includes adversary cyber capabilities, intentions, and supporting infrastructures in order to improve SIGINT and/or other intelligence collection opportunities, and assist in protection/recovery from cyber-attacks.
In addition you will:
* Assist technical personnel in the development of automated analysis tools by providing specific information about targets and techniques. Support the creation of modular and re-usable applications for routine or periodic cyber mission functions.
* Conduct engineering to attain cyber mission effects. Develop detailed specifications for end-to-end, knowledge-driven cyber mission capabilities. Develop technical implementations that enable system integration to streamline and expedite the creation of cyber mission effects.
* Understand legal compliance policy and mission risk factors that affect mission decisions and ensure that technical solutions incorporate appropriate decision points and mitigation capabilities.
*Assisting with the development of databases and other knowledge repositories on adversary information warfare and hacker capabilities, intentions and supporting infrastructures.
*Compiling and correlating data sets to determine levels of threats and vulnerabilities to U.S. network systems.
* Producing threat vulnerability assessments.
* Performing risk and opportunity assessments through synthesis of information across intelligence disciplines and open-source information.
* Supporting efforts to partner with other organizations on the identification of vulnerabilities and corresponding threats with the goal of influencing mitigation strategies and solutions.
Lead the Way
Belay wants you to lead the way - push boundaries, offer ideas, create solutions, and be a part of something great with Team Belay! Our team is full of technology pioneers who take the smartest approach, never accept the status quo, and are excited about making a difference!!
Our team leads:
- Ideas; white papers, new technologies, improving existing infrastructure and introducing solutions...Belay was built on ideas
- Growth; Be the Captain of your Fate! Share your aspirations and Belay will pave the way with conferences, education, mentorship and hands-on exposure to new and exciting things
- Development; step up, be instrumental in our growth and business efforts and you will be met with an open door to new experiences as leaders in a growing company
- Benefits; your feedback determines our offerings, which improve constantly based on your needs
- Giving: You tell us what is important to you and Belay will support your personal cause and charitable efforts, we’ve paid donations and volunteered to causes special to our team
- Fun; You give us ideas and we deliver in a big way, with go-kart racing, rock climbing, swanky casino nights, skeet shooting, happy hours and more!
Shall have a minimum of eight (8) continuous years of work experience in information assurance or computer network operations, or a combination of a minimum of five (5) continuous years of work experience in information assurance or computer network operations and a Bachelor’s degree in an applicable field. Work experience shall include five (5) years of Intelligence Community experience in information assurance, developing, analyzing and implementing countermeasures to assist in the protection of U.S., Allied, and friendly networks of interest. Shall have demonstrated leadership skills and the ability to research, analyze, and report on adversary computer network operations, trends and use of tools and techniques, with an overall objective of producing indications and warning reports on impending network attacks against the Defense and National Information Infrastructure systems
Perks and Benefits
Belay Technologies offers an extensive benefits package, including:
- Up to 8 weeks in paid leave (4 weeks of personal leave, 3 days of Yay! leave, 10 paid holidays, and optional leave up to 6 days through Belay's volunteer program)
- 6% matching in 401(k) contributions vested on day one
- $5,000 annual training/tuition or the option to use that money to pay off student loans
- Rich medical coverage (100% coinsurance, no copays) with a fully funded Health Savings Account with up to $3000 in annual contributions from Belay
- Dental coverage including orthodontia
- Up to $420,000 in life insurance, life insurance and disability premiums covered 100% by Belay
- Pet insurance, generous referral bonus program, company sponsored lunches and events, and many more!
Think you know someone who might be right for the job? Refer them to LeadTheWay@belaytech.com and you may be eligible for a referral reward up to $10,000!
What We Do
Belay Technologies provides leading technology and engineering solutions to the DoD, as well as state-of-the-art commercial products. We are a certified Service Disabled Veteran Owned Small Business in the Baltimore/Washington area, and we are an Equal Opportunity Employer. We hire software engineers, web designers, test engineers, systems engineers, systems administrators, database engineers and other tech services.
Key words: Full Clearance, Fort Meade, SDVOSB, Service-disabled veteran owned small business, DoD, CNOSS2; FFlam
Sr. Computer Programmer W/ Security Clearance
CSSI, is a leading provider of transportation and mobility solution to government and commercial clients. We are currently seeking a Sr. Computer Programmer for an opportunity in Orlando, FL for an upcoming opportunity.
1.An active DOD security clearance is REQUIRED.
2.Must have at minimum 7 years of experience with computer programming.
3.Experience with software development and diagnostic tools. Experience in engineering and scientific disciplines that include: modeling and simulations (M&S), Distributed Interactive Simulation (DIS), High Level Architecture (HLA), systems design, and math model development.
4.Ability to apply the Federal Acquisition Regulations, Military Standards, and Navy policy.
5.Programming languages will include Assembly, C, C++, Microsoft .Net (C#, Visual Basic (VB)), and Java. Operating Systems will include Microsoft Windows, as well as various UNIX flavors, such as Linux.
CompTIA A+ certification, GSEC, Security+CE, and SSCP
B.S. degree in Computer Engineering, Modeling and Simulation, or Computer Science. Formal training in Modeling and Simulation preferred. Master's degree preferred.
CSSI, Inc. is a technical and engineering services company headquartered near L'Enfant Plaza in Washington, DC, with additional offices along the Eastern Seaboard. CSSI has been solving challenging problems for the FAA, the DoD and NASA for over 25 years. With nearly 200 employees, CSSI offers challenging work, a comprehensive benefits package, and a collegial environment.
CSSI is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, ethnic background, religion, sex, sexual orientation, marital status, age, physical impairment, veteran status, or other characteristic protected by law.
This position is located in Orlando, FL and relocation compensation is not available for this position.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
Please view Equal Employment Opportunity Posters provided by OFCCP here.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
Computer Network Specialist Supervisor
LOCATION OF POSITION
MDH, Office of Enterprise Technology, Baltimore MD
Main Purpose of Job
The main purpose of this position is to perform team leadership duties for End User Technical Support Team within IND to ensure maximum availability and foster maximum utilization of information technology resources by MDH employees in their pursuit of the Department's mission.
Education: Bachelor's degree in computer information technology, management information systems, or other information technology related field, to include course work in local or wide area computer networks, from an accredited college or university.
Experience: Three years of experience planning, integrating and maintaining software and hardware for local or wide area computer networks.
Notes: 1. Candidates may substitute completion of high school or high school equivalency certificate and eighteen months of experience converting data from project specifications by preparing program code using generally accepted computer programming languages or other developmental tools; planning, installing and maintaining data communications network lines and devices; or evaluating, implementing and maintaining computer hardware and software for the required education.
2.Candidates may substitute completion of high school or high school equivalency certificate and fifteen credit hours from an accredited college or university in systems analysis and applications programming using generally accepted computer programming languages or other developmental tools for the required education.
3.Candidates may substitute completion of high school or high school equivalency certificate and completion of a certification program in Network Administration, such as Certified Novell Administrator (CNA), Microsoft Certified Product Specialist NT 4.0 Administrator equivalent certification program for the required education.
4.Candidates may substitute experience in one of the following areas on a year-for-year basis for a high school education: operating computer systems, scheduling, controlling input and output or maintaining backups or data storage, processing data on computer systems, evaluating, implementing and maintaining computer hardware and software or converting data from project specifications by developing programs using generally accepted computer programming languages or other developmental tools.
5.Candidates may substitute U.S. Armed Forces military service experience as a commissioned officer in Network Analyst classifications or Network Integration and Management specialty codes in the Information Technology field of work on a year-for-year basis for the required experience and education.
DESIRED OR PREFERRED QUALIFICATIONS
The desired candidate should have experience with the administration of Microsoft System Center Configuration Manager.
Applicants who meet the minimum qualifications will be included in further evaluation. The evaluation may be a rating of your application based on your education, training and experience as they relate to the requirements of the position.
Therefore, it is essential that you provide complete and accurate information on your application. Please report all related education, experience, dates and hours of work. Clearly indicate your college degree and major on your application, if applicable. For education obtained outside the U.S., any job offer will be contingent on the candidate providing an evaluation for equivalency by a foreign credential evaluation service prior to starting employment (and may be requested prior to interview).
Complete applications must be submitted by the closing date. Information submitted after this date will not be added.
Incorrect application forms will not be accepted. Resumes will not be accepted in lieu of a completed application.
Candidates may remain on the certified eligible list for a period of at least one year. The resulting certified eligible list for this recruitment may be used for similar positions in this or other State agencies.
STATE OF MARYLAND BENEFITS
Online applications are highly recommended. However, if you are unable to apply online, the paper application (and supplemental questionnaire) may be submitted to MDH, Recruitment and Selection Division, 201 W.
Preston St., Room 114-B, Baltimore, MD 21201. Paper application materials must be received by 5 pm, close of business, on the closing date for the recruitment, no postmarks will be accepted.
If additional information is required, the preferred method is to upload. If you are unable to upload, please fax the requested information to 410-333-5689.
Only additional materials that are required will be accepted for this recruitment. All additional information must be received by the closing date and time.
For questions regarding this recruitment, please contact the MDH Recruitment and Selection Division at 410-767-1251.
If you are having difficulty with your user account or have general questions about the online application system, please contact the MD Department of Budget and Management, Recruitment and Examination Division at 410-767-4850 or Application.Help@maryland.gov.
Appropriate accommodations for individuals with disabilities are available upon request by calling: 410-767-1251 or MD TTY Relay Service 1-800-735-2258.
We thank our Veterans for their service to our country.
People with disabilities and bilingual candidates are encouraged to apply.
As an equal opportunity employer, Maryland is committed to recruitment, retaining and promoting employees who are reflective of the State's diversity.
Click on a link below to apply for this position:
Fill out the Supplemental Questionnaire and Application NOW using the Internet. View and print the Supplemental Questionnaire.
This recruitment requires completion of a supplemental questionnaire. You may view and print the supplemental questionnaire here. Apply via Paper Application. You may also download and complete the Paper Application here.
45 Calvert Street, Annapolis, MD 21401
300-301 West Preston Street, Baltimore, MD 21201
Toll Free (800) 705-3493
MD Social Media Directory
Computer Support Specialist I
The Gatton College of Business and Economics is recruiting for a Technical Support Assistant to play a key role in the college's help desk and web development. This position will provide end user support to faculty, staff, and graduate students; assist in maintaining hi-tech spaces such as classrooms, event space, etc.; create and maintain Windows images; support various technologies such as Windows, Deep Freeze, Zoom, Sysprep, Mersive Solstice; and more.
Over the last 95 years, UK's Gatton College of Business and Economics has been preparing principled leaders for the global economy, producing high quality, influential research, and supporting economic growth in Kentucky and beyond. Accredited by the AACSB, Gatton proudly offers a full range of undergraduate, graduate and professional business and economics degrees and certificates.
We are housed in a recently renovated 220,000 square foot state-of-the-art facility where the college accommodates the fastest growing enrollment on UK's campus, expected to reach over 4,000 Students by fall of 2019. Through teaching, research, and outreach, the Gatton College has a direct, tangible influence on the lives of Kentucky's citizens and people around the world. We are looking for professionals who embody the College's tagline of "Blue Means Business". Please consider joining our team.
Skills / Knowledge / Abilities
Does this position have supervisory responsibilities? No Preferred Education/Experience
BS in field related to technology.
Deadline to Apply 04/28/2019 University Community of Inclusion
The University of Kentucky is committed to a diverse and inclusive workforce by ensuring all our students, faculty, and staff work in an environment of openness and acceptance. We strive to foster a community where people of all backgrounds, identities, and perspectives can feel secure and welcome.
We also value the well-being of each of our employees and are dedicated to creating a healthy place to work, learn and live. In the interest of maintaining a safe and healthy environment for our students, employees, patients and visitors the University of Kentucky is a Tobacco & Drug Free campus.
As an Equal Opportunity Employer, we strongly encourage veterans, individuals with disabilities, women, and all minorities to consider our employment opportunities.
Any candidate offered a position may be required to pass pre-employment screenings as mandated by University of Kentucky Human Resources. These screenings may include a national background check and/or drug screen.
Making better hires starts with building better job descriptions
- Browse 100s of templates across 40+ industries
- Customize your template with your company info & job requirements
- Post it to 20+ job boards in seconds – for FREE!