Sort by
Refine Your Search
-
as “Essential Personnel.” All essential personnel employees are required to report for snow removal or other emergencies when assigned; Oversees the operation of heating equipment; multi-fueled, large
-
and comprehensive logistical guidance to internal and external clients, including cost estimates and information on support services and university policies; Coordinates with internal partners-A/V
-
the responsibility for architecting, designing, and developing software application using web technologies, distributed computation and storage frameworks, data collection nodes, and sophisticated
-
: The Software Systems Engineer will have the responsibility for architecting, designing, and developing software application using web technologies, distributed computation and storage frameworks, data collection
-
interests and objectives and aides them to develop long-range academic and career plans. Provides academic advising for a large population of undergraduate business students. Develops quality programs
-
applicants, and assist with marketing and recruitment materials; Hosts weekly prospective student phone calls and bi-weekly application information sessions; Serves as the lead tour guide in the summer and
-
threats. The position is responsible for monitoring open-source and law enforcement information to identify and communicate emerging risks that could impact the university community or campus events. By
-
coordination with budget manager(s); and Provide resume review support and shortlist candidates for internship positions with large applicant pools (100+). Program Outreach and Onboarding Provide outreach
-
, corporate and foundation relations, information systems and management, and infrastructure services. Advancement's mission is to build strong, lifelong relationships with George Mason University's alumni and
-
are available at http://ist.gmu.edu/students/current-students/course-syllabi/) : Graduate Big Data Analytics Natural Language Processing Machine Learning Data Mining Cybersecurity Cyber-Human Systems Artificial