- University of Michigan (Ann Arbor, MI)
- Research Security Officer Apply Now **How to Apply** A cover letter is required for consideration for this position and should be attached as the first page ... the highest standards of ethics, compliance, and integrity. OVPR is seeking a Research Security Officer , reporting to the Associate Vice President for … more
- Allied Universal (Ypsilanti, MI)
- …office near you, please visit: www.aus.com/offices . **Job ID:** 2025-1333807 **Location:** United States-Michigan-Ypsilanti **Job Category:** Security Officer ... Allied Universal(R), North America's leading security and facility services company, provides rewarding careers...+ Immediate Opening for a Full time Bank Protection Officer + Must have at least 1 year of… more
- University of Michigan (Ann Arbor, MI)
- …from principal investigators and other central administrative offices, such as Research Information Security , Export Controls, IRB, IACUC, Innovation ... Contract Officer Apply Now **How to Apply** A cover...a victor for the greater good. The Office of Research and Sponsored Projects (ORSP) safeguards and advances U-M's… more
- University of Michigan (Ann Arbor, MI)
- …from principal investigators and other central administrative offices, such as Research Information Security , Export Controls, IRB, IACUC, Innovation ... Sr. Contract Officer Apply Now **How to Apply** A cover...a victor for the greater good. The Office of Research and Sponsored Projects (ORSP) safeguards and advances U-M's… more
- Allied Universal (Ann Arbor, MI)
- …under their direct supervision + Oversee staffing, scheduling and on-site training for security officer assigned to his/her shift. + Ensure that contract ... visit: www.aus.com/offices . **Job ID:** 2025-1334452 **Location:** United States-Michigan-Ann Arbor **Job Category:** Security Supervisor, Security Officer more
- University of Michigan (Ann Arbor, MI)
- …Assurance (IA) team. This position will report to the Interim Chief Information Security Officer . This BSA position will require analysis of business processes ... limited to, risk management, vulnerability management, sensitive data discovery, security advising, advanced endpoint protection, and incident response. Positions… more