Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
programs and computers including instrument tracking program, email, spreadsheets, and word processing software. Ability to apply policy and procedure when making decisions. Ability to identify, analyze and
-
of computer systems and the skills to effectively utilize software applications (MS Office and Outlook) and applicable statistical software applications. Knowledge of medical terminology. Good problem-solving
-
and test complex software packages. Plan, install and administer critical Energy Management Systems (EMS) including operating systems, database servers, communication protocols, network LAN security and
-
Integration Network (ROBIN) Center. This cross-disciplinary center aims to integrate genomics, proteomics, metabolomics, and radiomics to understand the impact of radiation treatment on the tumor
-
a network of backyards, nature centers, community gardens, and parks in the United States and Canada. When tens of thousands of FeederWatchers count birds in community and send their tallies
-
overcome. Equipment Utilized Beyond Microsoft Office suite (or similar) software, the Assistant Dean must be familiar with database and statistical software, social networking web applications, as
-
, enrollment, grades, degrees, Bruin Learn integrations, voter registration, UCAN advocacy network, and cybersecurity training.• Application Development and Integration: Build and maintain web applications
-
to workstations, software, peripherals, network, and/or AV technology. Applicants must demonstrate an ability to develop inclusive and equitable relationships within our diverse campus community Applicants must
-
for this position. Required Knowledge, Skills, and Abilities Experience with CAD software and GIS systems for design and planning. Possess the ability to correctly identify and diagnose common networking system
-
of security toolsets for both on-premise and public-cloud resources; active monitoring of vulnerability scans; assist in working with peers and/or security vendors in defining the scope of internal/external