Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
process, we recommend that you are prepared to attach electronic copies of your resume/ curriculum vitae, cover letter or any other documents within the application process. It is recommended that you
-
of the position and be in good performance standing. Before you begin the process, we recommend that you are prepared to attach electronic copies of your resume/ curriculum vitae, cover letter or any other
-
for the position as an internal candidate, departmental staff must meet minimum requirements of the position and be in good performance standing. Before you begin the process, we recommend that you are prepared
-
problems and recommends and implements appropriate solutions Analyzes, processes, inputs, maintains, and secures enrollment information into student records Scan and link documents to student¿s account on
-
maintaining records and entering data), or a variety of other tasks Assist the department by aiding users having computer or networking problems via phone, email or in-person Open, close and follow up
-
appropriate departments, Screens calls to determine appropriate routing (Answers simple questions: such as important dates, hours of operation, etc), transfer calls to appropriate staff and departments Schedule
-
operational processes through functional roles or system security access (Information technology related functions, e.g., Web/Application Developer, IT Technician, Data/Systems Analysts etc.)? NO Will
-
cards and/or credit/debit cards to include making and/or receiving payments? No Will the position have control over university-wide operational processes through functional roles or system security
-
-wide operational processes through functional roles or system security access (Information technology related functions, e.g., Web/Application Developer, IT Technician, Data/Systems Analysts etc
-
/debit cards to include making and/or receiving payments? No Will the position have control over university-wide operational processes through functional roles or system security access