Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
technology, computer administration, etc. Meanwhile, she/he will also develop a working knowledge and proficiency that spans the expertise of the entire team; supervise the activities of students and other
-
are passionate about Data Science, with an emphasis in Computational Social Science, with a starting date of September 1, 2026. Some of the possible research topics include: (i) social media analysis, (ii
-
experience in academic, policy, or think tank leadership. Proven record of strategic program leadership and global engagement. Demonstrated expertise in international affairs, economic development
-
Career Lab (CCL) students–on campus and through internship opportunities. Design curriculum, provide instructional support, and manage the College and Career Lab internship program. Serve as a primary
-
written and verbal communications skills, good interpersonal skills. Basic knowledge/familiarity with computer applications such as email.Positive attitude, willingness to collaborate and team with others
-
are passionate about Data Science, with an emphasis in Computational Social Science, with a starting date of September 1, 2026. Some of the possible research topics include: (i) social media analysis, (ii
-
specialized knowledge in one or more areas of admissions, e.g. international recruitment, etc. May have project or program responsibility. The Office of Undergraduate Admissions aims to develop, support, and
-
live self-determined lives. NYU's Prison Education Program (PEP) aims to expand access to higher education with communities impacted by the criminal legal system. Through PEP, faculty across NYU teach
-
: 278242247 Associate Director, Endless Frontier Labs US-NY-New York Job ID: 2025-14721 Type: Stern School of Business (SB1071) # of Openings: 1 Category: Academic Program Support New York University Overview
-
security for cloud-native, distributed computing, and architectural solutions with the principle of 'Secure by Design. Experience delivering information security expertise through a deep understanding of the