Sort by
Refine Your Search
-
Listed
-
Field
-
the budget and process requisitions for the Ivy Cares department, ensuring resources are allocated effectively and efficiently 15. Demonstrate a strong commitment to student development and success by
-
Center information to visitors and direct them to locations across the Ivy Tech campuses as needed Assist students in starting the application process, and have a general understanding of enrollment steps
-
to various education institutions, as well as those donated to the School. Maintain donation records, process and distribute appropriate paperwork. ● Assist in the coordination of School of Arts, Sciences
-
interventions to include communication with students, tutoring and other academic supports, and referrals to appropriate college resources. Maintain posted office hours and student engagement hours in accordance
-
: • Empathy: We stand with our students, partners, and communities. • Integrity: We treat all with dignity and respect. • Accountability: We deliver on our commitments. • Agility: We innovate, iterate, and
-
empowers all students to learn and succeed. We are “higher education at the speed of life!” Our Values: • Empathy: We stand with our students, partners, and communities. • Integrity: We treat all with
-
, assessments, and activities. Ensure that the course design processes follow digital accessibility standards and guidelines to ensure inclusivity for all learners. Create and maintain processes and procedures
-
posted office hours and student engagement hours in accordance with campus expectations and the faculty loading policy in the Academic Support and Operations Manual (ASOM 7.2). Promote and assist in
-
resources. •Maintain posted office hours and student engagement hours in accordance with campus expectations and the faculty loading policy in the Academic Support and Operations Manual (ASOM 07.02.00
-
Professor of Cyber Security. The responsibilities of the position of Assistant Professor of Cyber Security are to 1) Prepare and teach post-secondary classroom courses in the theory and practice of Cyber