169 computer-programmer-"https:"-"FEMTO-ST"-"Inserm"-"https:"-"https:"-"https:" positions at Cardiff University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
operations of the school. MAIN DUTIES & RESPONSIBILITIES Participate actively within the work team, setting an example and showing a flexible approach to delivering team results Plan and manage small projects
-
the highest levels of professionalism. The ability to explore the needs of customers: identifying solutions and clearly communicating a clear plan of action. Able to work as part of a large division team
-
to escalate where necessary. Ability to plan and organise your own workload within agreed timelines as set by your Line Manager. Ability to use your initiative to solve problems and respond to queries, finding
-
, manage own workload and priorities, to plan and undertake project work, and to meet specified deadlines. Evidence of ability to monitor the work of others, to ensure consistent application of policies and
-
where there are a range of potential options available. Proven ability to work on own initiative, planning, organising and setting priorities for own work appropriately and to plan and manage small
-
overall team goals and the ability to prioritise tasks Familiarity with basic computer packages i.e. Microsoft Outlook, word, excel ect Good interpersonal skills and the ability to communicate appropriately
-
of professionalism. The ability to explore the needs of customers: identifying solutions and clearly communicating a clear plan of action. Able to work as part of a large division team: collaborating with colleagues
-
Advert This post is currently open to employees of Cardiff University only. Please do not apply if you do not have a current contract of employment with the University. Internal Applicants Only - Security Systems Officer Cardiff University is an ambitious and innovative University with a bold...
-
their Wellbeing Plan. How would you identify the best experts to work with us on this project? What potential barriers might you encounter in securing their input and how would you overcome these? How would you