Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
are Learning & Development, Experience & Engagement, Community & Inclusion, Student-Centered Service, and University Pride & Excitement. We are committed to fostering a welcoming space, connecting students
-
Criminal Background Check: Yes About the Department: The primary purpose of GMU's Systems Engineering and Operations Research (SEOR) program is to develop leaders who can solve complex, real-world problems
-
. The emerging class of opportunity/research universities is rarified territory, and George Mason is in search of its next provost to advance its further development as a leader in the higher education sector
-
science (CSS); (b) Develop, conduct, and disseminate rigorous cutting-edge externally funded research in a range of application areas in which computational science, data science, modeling, and simulation
-
Create and maintain standard operating procedures for all research activities; Maintain up-to-date training on all research instruments; Train and onboard new research staff; and Communicate and coordinate
-
the holiday season is not regularly guaranteed and is subject to annual approval); Free tuition, up to 12 credit hours during the academic year, and professional development. Yes, you can earn a college
-
the daily protection of the Mason enterprise by developing secure business processes, monitoring cyber threats, and responding to security incidents. The Director executes the strategic cybersecurity goals
-
, the department builds awareness and support for the university, develops the brand, protects the reputation of the university, and shares important and timely information with the George Mason community and its
-
year, and professional development. Yes, you can earn a college education while earning a salary. Commuter Choice Transit Benefit Virginia Retirement System Hybrid Plan; and Patriot Perks discounts
-
Cybersecurity Operations is responsible for ensuring the daily protection of the Mason enterprise by developing secure business processes, monitoring cyber threats, and responding to security incidents