Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
Provides technical support for the operation and maintenance of University’s automation and data acquisition systems to ensure continuous, effective temperature and humidity control in University’s buildings
-
tasks simultaneously, Ability to work with large data sets Strong knowledge and familiarity of Microsoft Office applications Ability to create and document procedures for training materials Excellent
-
donors and the identification and engagement of potential major gift donors. The team will work with key partners and leverage sophisticated data analysis to identify their target population. While
-
Reporting to the Head Baseball Coach, the Assistant Coach recruits, retains, supervises, and coaches NCAA Division I student-athletes, under the guidelines of Georgetown, the BIG EAST Conference and NCAA
-
Reporting to the Head Tennis Coach, the Assistant Coach recruits, retains, supervises, and coaches NCAA Division I student-athletes, under the guidelines of Georgetown, the BIG EAST Conference and NCAA
-
enhancements. Leveraging data analytics to ensure all P2P decisions and performance monitoring are data-driven. Work Interactions and Work Mode Designation This role operates as a key member of the CFO’s
-
, ensuring timely graduation. Detailed knowledge and understanding of NCAA Compliance Rules and Regulations, including Big East and Patriot League Legislation, especially as they pertain to athletic
-
closely with a wide range of stakeholders across the clinical research enterprise. This includes daily interaction with principal investigators, study coordinators, data managers, clinical trial sponsors
-
research enterprise. This includes daily interaction with principal investigators, study coordinators, data managers, and clinical trial sponsors. The role also requires frequent communication with
-
leaders at the University. In conjunction with the Vice President for Public Safety and University Chief Information Officer, oversees management, coordination and implementation of enterprise security