Job Seekers, Welcome to MORS Career Center
Search Filters
Use this area to filter your search results. Each filter option allows for multiple selections.
Search Results: 148 Jobs
Create Alert
Loading... Please wait.
Cornell University Logo
Cornell University

Ithaca, New York

University of California Los Angeles Logo
University of California Los Angeles

Los Angeles, California

California State University, San Bernardino Logo
California State University, San Bernardino

San Bernardino, California

Skadden, Arps, Slate, Meagher & Flom LLP Logo
Skadden, Arps, Slate, Meagher & Flom LLP

Washington, D.C.

University of the Pacific Logo
University of the Pacific

Stockton, California

University of the Pacific Logo
University of the Pacific

San Francisco, California

San Diego State University Logo
San Diego State University

San Diego, California

Public Utilities Commission of Ohio

Columbus, Ohio

New York University Logo
New York University

New York, NY, US, 10001

New York University Logo
New York University

New York, NY, US, 10001

WA State Department of Ecology Logo
WA State Department of Ecology

Lacey or Shoreline, Washington

California State University, Monterey Bay Logo
California State University, Monterey Bay

Seaside, California

University of Rochester

Rochester, New York

Mount Saint Mary's University Logo
Mount Saint Mary's University

Los Angeles, California

Mount Saint Mary's University Logo
Mount Saint Mary's University

Los Angeles, California

University of California, Berkeley Logo
University of California, Berkeley

Berkeley, California

Loading... Please wait.
Cyber Security Analyst
Cyber Security Analyst Exempt Summary To monitor and protect the Cooperative’s network(s), computers systems, and data from security issues, install/maintain security software, establish baseline configurations, document any security issues or incidents found and promote cyber-safety awareness and best practices. The Cyber Security Analyst is expected to stay up to date on the latest intelligence, including hackers’ methodologies. To perform assigned functions according to standardized policies and procedures. Reporting Reports to: Director of Security and Enterprise Infrastructure Directs: None Responsibilities Develop, implement, and maintain the company’s


This job listing is no longer active.

Check the left side of the screen for similar opportunities.
Loading. Please wait.