Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
range of software applications. Demonstrated office technology skills and aptitude for learning new software where appropriate. Must be comfortable with database management systems. Proven
-
for Mental Health, including two recently funded clinical trials led by Dr. Heather Nuske in the Center for Mental Health. The first will test digital technology designed to improve data collection quality in
-
or minor in Data Science, Computer Science, Engineering, or a related field or an equivalent combination of education and experience. Domain expertise, including course work, in human movement, machine
-
/contribute to research. The division provides care to children with a diverse spectrum of pulmonary and sleep disorders including through the Cystic Fibrosis Center, Sleep Center, Technology Dependence Center
-
business development, fund management and technology acceleration efforts being led on behalf of the University by the OCIO. In this role, the SED will work towards strengthening the interactions between
-
technology designed to improve data collection quality in aides who work 1:1 with children requiring behavioral support in schools. The second will test the feasibility of inclusion and social-emotional
-
the Multi Media Services (MMS) team to support classroom technology, operate AV equipment, and work on media production tasks. The position may also serve as a recording engineer in our recording studio, as
-
collaborates closely with the Program, Technology, and Finance Teams to achieve the department's financial and customer service objectives. Additionally, the incumbent partners with various University
-
Coordinator Job Profile Title Administrative Coordinator Job Description Summary Reports directly to the Executive Director of Information and Security Technology . Provides administrative assistance and
-
-quality support and consultation to clients. This role involves exploring new technology, recommending service changes, and implementing security initiatives to protect sensitive information. In addition