Sort by
Refine Your Search
-
Listed
-
Field
-
, communications, or related field Demonstrated administrative/programmatic support experience Strong written communication skills, including experience creating program materials, web content, and messaging
-
, of which two years must be working with high voltage (over 600 volts) or successfully completed the site-specific high voltage training program for the High Voltage Electrician I. Preferred Qualifications
-
operator Water Distribution License, within first 6 months of employment. Preferred Qualifications: Experience installing or operating steam systems. Experience operating domestic water systems. Experience
-
to elastic wave propagation and scattering from complex microstructures Experience with large scale computational problems including distributed computing Experience with the creation of synthetic
-
, knowledgeable, and timely support. Example of Duties • Composes, reviews, edits, produces, and duplicates audio, visual, video, and/or printed program materials for distribution to target audiences. • Reviews and
-
internal team and external consultants Oversee website development, updates, and digital content management Manage the project’s social media presence and outreach campaigns Develop and distribute marketing
-
evaluation of cyber-physical system security solutions for distribution power grid with renewable energy sources Development of simulation models and integration of CPS security algorithms into hardware-in
-
Management Receive and organize early morning food and supply deliveries. Monitor inventory, rotate stock, and ensure all items are accurately stored and well-maintained. Order fulfillment to distribute across
-
operator Water Distribution License, within first 6 months of employment. Preferred Qualifications: Experience installing or operating steam systems. Experience operating domestic water systems. Experience
-
solutions for distribution power grid with renewable energy sources Development of simulation models and integration of CPS security algorithms into hardware-in-the-loop testbed environment and conduct