Sort by
Refine Your Search
-
Listed
-
Field
-
Applicants: Position is eligible for hybrid work subject to University policy . Job Summary: The Information Security Compliance Analyst III develops, implements, and maintains information security policies
-
requirements of the University’s academic programs and on the goal of achieving and maintaining excellence in its teaching, research, and service/academic citizenship activities. Detailed Position Information
-
assistance under moderate supervision. Dispatches appropriate personnel in an efficient and timely manner. Operates various on-line systems to enter, update and retrieve data. Maintains a variety of logs and
-
Job Summary: The Database Coordinator supports the processing of data. Oversees data verification and data authenticity. Ensures that the delivery of student aid is conducted accurately, expediently
-
professional. Efficient and accurate computer and data entry skills. Excellent communication, public relations, customer service, and telephone etiquette skills. Willingness to learn and consistently deliver
-
Knowledge: Ability to design surveys, interviews, or focus groups and analyze resulting data. Strong verbal, written, and visual communication skills, including the ability to present technical data to non
-
development, data management, and reporting tools. Comfortable navigating student information systems and learning management platforms, with the ability to quickly adapt to new software and digital tools
-
Apply now Job no:527362 Work type:On-Campus Graduate Location:Tuscaloosa Categories:Student Pay Grade/Pay Range: $15.00/hour Department/Organization: 209601 - Test & Data Mgt Services Normal Work
-
Position Information The Department of Political Science at the University of Alabama invites applications for a renewable contract Instructor position in Public Administration. This is a one-year
-
to security related events. Leverages relevant tools, technologies, processes, and procedures. Ensures the safe and secure operation of UA systems and networks. Responds to information security incidents and