305 computer-programmer-"https:"-"U"-"UCL" "https:" "https:" "https:" "https:" "https:" "Dr" "P" positions at George Mason University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
, client responsiveness, and alignment with institutional standards; Designs and implements a robust training program and ensures subordinates deliver effective training on equipment operation, venue
-
for planning, implementing, and administering the program of legal education; selection, retention, promotion and tenure of faculty; and determining educational policy. Responsibilities: Teaching Designs course
-
Knowledge of higher education budgeting best practices. Instructions to Applicants: For full consideration, applicants must apply for the Data Analyst at https://jobs.gmu.edu/. Complete and submit the online
-
Retirement System Hybrid Plan; and Patriot Perks discounts to restaurants, events, and more! For you and your family… Health/dental/vision benefits; and Tuition-dependent benefit (restrictions apply). We think
-
earning a salary; Commuter Choice Transit Benefit; Virginia Retirement System Hybrid Plan; and Patriot Perks discounts to restaurants, events, and more! For you and your family… Health/dental/vision
-
development. Yes, you can earn a college education while earning a salary. Commuter Choice Transit Benefit Virginia Retirement System Hybrid Plan; and Patriot Perks discounts to restaurants, events, and more
-
, and oceanographers. For more information about the department, visit us on the web at https://cos.gmu.edu/aoes/. For more information about the College of Science, go to https://science.gmu.edu . About
-
communications skills, especially in writing and presentation; Demonstrated leadership across decentralized or federated IT environments; Ability to lead a cybersecurity operations program across colleges
-
success by via gaining stakeholder alignment from project ideation to implementation; Supports a continuous improvement program for project management by incorporating best practices in “post-mortem” review
-
cybersecurity operations program across colleges, research labs, and central IT with both authority and influence; Hands on leadership supporting research computing (e.g., HPC clusters, secure research enclaves