|
Computer Operator II |
Operates and monitors computer equipment. Uses established procedures to perform routine tasks to maintain required performance standards of computer equipment and its peripherals. Observes peripheral equipment and error... view job details |
|
Alternate job titles: Computer Operations and Monitoring Specialist II , Computer Support Operations Specialist II , Intermediate Computer Operator |
|
|
Computer Operator III |
Operates and monitors computer equipment. Uses established procedures to perform routine tasks to maintain required performance standards of computer equipment and its peripherals. Observes peripheral equipment and error... view job details |
|
Alternate job titles: Computer Operations and Monitoring Specialist III , Computer Support Operations Specialist III , Senior Computer Operator |
|
|
Assoc. Professor - Computer Science |
Teaches courses in the discipline area of computer science. Develops and designs curriculum plans to foster student learning, stimulate class discussions, and ensures student engagement. Provides tutoring and academic counseling... view job details |
|
Alternate job titles: College Associate Professor - Computer Science , University Associate Professor - Computer Science |
|
|
|
|
|
Asst. Professor - Computer Science |
Teaches courses in the discipline area of computer and information sciences. Develops and designs curriculum plans to foster student learning, stimulate class discussions, and ensures student engagement. Provides tutoring and... view job details |
|
Alternate job titles: College Assistant Professor - Computer Science , University Assistant Professor - Computer Science |
|
|
Computer Forensics Analyst I |
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other... view job details |
|
Alternate job titles: Computer Forensics Analyst I |
|
|
Computer Forensics Analyst II |
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other... view job details |
|
Alternate job titles: Computer Forensics Analyst II |
|
|
Computer Forensics Analyst III |
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other... view job details |
|
Alternate job titles: Computer Forensics Analyst III |
|
|
Computer Forensics Analyst IV |
Performs forensic analysis on computer systems and servers. Investigates cybersecurity incidents using digital forensic techniques and tools. Collects, preserves, and analyzes digital evidence. Recovers emails, databases, and other... view job details |
|
Alternate job titles: Computer Forensics Analyst IV |
|
|
Computer Numeric Control Machine Programmer I |
Programs and sets up CNC milling, lathe, or other machinery according to blueprint specifications. Reads and interprets technical blueprints and design models and inputs the product design into the computer modeling software.... view job details |
|
Alternate job titles: CNC Machine Programmer I , CNC Programmer, Entry , CNC Programmer/Set-Up I , Numeric Control Programmer, Entry |
|
|
Computer Numeric Control Machine Programmer II |
Programs and sets up CNC milling, lathe, or other machinery according to blueprint specifications. Reads and interprets technical blueprints and design models and inputs the product design into the computer modeling software.... view job details |
|
Alternate job titles: CNC Machine Programmer II , CNC Programmer, Experienced , CNC Programmer/Set-Up II , Numeric Control Programmer, Experienced |
|
View More Job Titles >> |