Sort by
Refine Your Search
-
periodic user access reviews in systems such as Workday. Threat-Cloud and Third-Party Risk Track higher-ed–relevant threat actor tactics and translate intelligence into detections, controls, and tabletop
-
driving innovation in grid-interactive power systems, decentralized energy integration, and EV charging infrastructure. Required Minimum Qualifications: Bachelor's degree in electrical engineering, electric
-
progressively responsible experience in financial analysis, fiscal, or budget management (typically three to five years); Experience managing complex budgets and financial systems in a large, decentralized
-
progressively responsible experience in financial analysis, fiscal, or budget management (typically three to five years); Experience managing complex budgets and financial systems in a large, decentralized
-
to translate complex financial information for non-financial audiences Experience leading complex organizational, systems, or process change in decentralized environments MBA, CPA, or deep expertise in fund
-
repairer with the U.S. Army; Or 4. Must have been an enlisted gas turbine systems technician, submarine nuclear propulsion plant operator reactor control, utilities man, machinist mate, or engine man with
-
Accounting in Workday governance, system enhancements, and institutional initiatives Program Development/Management (Accounting, Reporting & Internal Controls) Oversee capital asset accounting, reconciliations
-
safeguards. While federal systems have traditionally been seen as offering protection against the concentration of power, recent trends show that populist regimes can also use them as instruments
-
repairer with the U.S. Army; Or 4. Must have been an enlisted gas turbine systems technician, submarine nuclear propulsion plant operator reactor control, utilities man, machinist mate, or engine man with
-
for Innovation, and the Office of Clinical Research, and coordinate needed action plans if there are situations where the ability to comply with contractual data security requirements is unclear. The role will