Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
, division) and ability to perform calculations accurately. Knowledge of computer keyboard operation and general office equipment. Skills Skilled in the operation of office equipment and computer keyboards
-
, including bicycles, in violation of university parking regulations. Uses computer hardware & software to upload and maintain ticket, person and vehicle information. Places “auto cuffs” and or tows vehicles
-
. Oversees the operations of office supply purchases as well as Amazon approvals. Assists with administering the University PCard and Travel Card Program. Vendor onboarding process (PaymentWorks/USAS/Banner
-
. Oversees the operations of office supply purchases as well as Amazon approvals. Assists with administering the University PCard and Travel Card Program. Vendor onboarding process (PaymentWorks/USAS/Banner
-
/Description Teach undergraduate and graduate courses relevant to Social Work; conduct research; advise students; and provide service to the Social Work program, department, university, and community
-
the Liaison Program Coordinator and Assistant Director of Liaison Programs and Residential Cohorts. Work directly with Education Reach for Texas staff to learn, practice, and document use of a peer coaching
-
processing and spreadsheet applications and software. Skilled in the operation of a personal computer, as appropriate to the assignment; skilled in oral and written communication; skilled in interpersonal
-
confidentiality and documenting procedures; generate reports as needed; proficient in Microsoft Office and possess general computer knowledge. Greet and assist students, faculty, staff, and other visitors; answer
-
. The department currently hosts a BSME and BSCE program and is in the process of developing an M.S. in Mechanical Engineering program. The teaching responsibilities will encompass both lecture and laboratory
-
processes and essential security program functions, including: Event monitoring and SIEM technologies Risk management Vulnerability scanning and management Access controls and authentication measures