Sort by
Refine Your Search
-
without notice by either the District or the employee. Additionally, when filling a vacancy, substitute employees may not work more than the period of time set forth in the applicable collective bargaining
-
. Compiles periodic analytical reports requiring research, estimates, and presentations that integrate text and presentation graphics. Prepares reports for State and local agency requirements. 13. May train
-
, analyzes, develops, tests, and documents computer systems and purchased integrated applications for academic and/or business purposes. Consults with staff and coordinates projects for the design and
-
filling a vacancy, substitute employees may not work more than the period of time set forth in the applicable collective bargaining agreement. REPRESENTATIVE DUTIES: Human Resources Generalist Senior
-
custodial and general maintenance within the custodial organization. Ensures high levels of staff productivity by reviewing inspections, reports, and physically observing work performed. Develops and conveys
-
, cloud-based services, virtual infrastructure, and applications. This position acts as a technical bridge between internal department teams and vendor partners for development, engineering, service
-
workstation hardware installs including software imaging, user data backups, transfers and restores. 10. Develops and maintains up-to-date documentation supporting assigned and related areas of responsibility
-
American Pacific Islander-Serving Institution (AANAPISI). GWC engages in regular professional development opportunities and partnerships so that we can best serve disproportionately impacted groups
-
the displacement of Classified personnel. *Retired CalPERS Annuitants: may not exceed 960 hours in a fiscal year (July 1 through June 30)* REPRESENTATIVE DUTIES: Works directly with management in the development
-
are required to write programs, develop network security plans, install tools in the field of network security, build and maintain secure networks, defend computer networks from outside attacks, and demonstrate