Sort by
Refine Your Search
-
Listed
-
Field
-
computers; configuring and maintaining instrument interfaces; and ensuring compliance with IT security and safety standards. The individual will work independently and coordinate with other members
-
Job Description This position is located in the City of Newport News Unit Office. The 4-H Youth Development Agent is a professional educator who provides leadership to the local 4-H program and
-
subject to external pressure and frequent interruptions with an ability of training users in applications and operating system. Required Qualifications • Bachelor’s degree in IT, computer science or related
-
good computer skills. Responsibilities may include: - Answer patron questions about performances, ticketing processes, performance seating, gallery exhibits; engage and assist patrons as appropriate
-
possess: Required Qualifications -Demonstrated knowledge of standard office practices and procedures -Strong computer skills to include data entry -Some knowledge of query language, programs and office
-
on the VT campus. Incumbent will also maintain satisfactory grades in their related instruction throughout the 4-year program. Incumbent will be required to test for either journeyman HVAC or plumbing license
-
relevant to academic performance; • Oversee the onboarding, continuing education, and evaluation of the Assistant Learning Specialist position (LAP Intern Program); • Serve as a resource to the advising and
-
communication, interpersonal, organizational and team skills • Capable of working independently and as part of a team • Demonstrated computer skills and experience using Microsoft applications • Demonstrated
-
, and scheduling. Ability to read, interpret and apply established policies and procedures to purchasing, travel and inventory processes. Demonstrated computer proficiency with Microsoft Outlook
-
program analysis for detecting violations of safety and security properties, techniques for verified operating system kernel extensions, logic frameworks for automatic reasoning of security vulnerabilities