Information Security
Information Security provides security engineering, risk management, design, access and identity control, operational support, and consultation. Provides policy and governance oversight; security operational services; set-up, verification, and audit of user access and authorizations; and risk analysis and response.
Individual Contributor
In an individual contributor role, the positions work is primarily achieved through individual efforts or by participating as part of a team. Individual contributors may: Coordinate, influence, or review the work of others. Be the authority on a given program or process. Lead teams. A range of knowledge, complexity, autonomy, and impact may be needed to achieve results at certain levels. Individual contributor roles are reflected in the Academic Administration, Development, General Administration, Technical/STEM, and C1-C4 of the Clinical tracks.
Level 2
Intermediate: These positions require some experience and education but are not expected to act independently.
T - Technical/STEM
Technical roles, including technology and research.