Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
management. Instructions to Applicants: For full consideration, applicants must apply for Social Media Assistant at https://jobs.gmu.edu/. Complete and submit the online application to include, a resume
-
. Required Qualifications: Master’s degree in related field, or equivalent combination of education and experience; ALA-accredited Master’s degree in Library or Information Science, or an equivalent certified
-
relationships with key partners, and will contribute to the implementation of a strategic vision for a highly effective philanthropy program at George Mason University. This position is expected to work non
-
University. The mission of the Center for Collision Safety and Analysis is to advance collision safety though scientific research using sophisticated computational methods that provide a means to establish a
-
by serving as George Mason University's facility, program, and support services management department for the Johnson Center, Student Union Building I, and The Hub. The department aims to support and
-
Department: Col of Engineering and Computing Classification: Education Support Spec 3 Job Category: Classified Staff Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk) Location
-
of failure or malfunction by observation and testing of mechanical, electrical, pneumatic components, and application-specific computer programs; Maintains cooling towers, hot water and chilled water piping
-
' program goals and are compliant with the project's authorization criteria, Mason's HECO manual, Campus Master Plan, and Design Guidelines and Construction Standards; Ensures that design submittal, review
-
financial data to support decision-making and long-term planning for facilities investments. Supervision and Oversight of the Teams Provides strategic leadership and direction over Program Management, Space
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between