Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Intelligence Undergraduate Databases Cybersecurity Networking and Telecommunication Programming Web Application Development Cloud Computing Artificial Intelligence Courses are offered in the daytime, evening
-
-Rank, Tenured/Tenure-Track Electrical and Computer Engineering Faculty at https://jobs.gmu.edu/. Complete and submit the online application to include three professional references with contact
-
to work independently and as part of a collaborative team; and Ability to work effectively with systems technical staff and business users. Preferred Qualifications: Experience with the MicroStrategy Cloud
-
Intelligent Cloud Services (IICS) iPaaS (integration Platform as a Service) platform, and programs and services implemented on other platforms, as needed; Responsible for researching and resolving production
-
Work-Study Program & Workflow Coordinator to support the administration and automation of the Federal Work-Study (FWS) program. This part-time role merges program operations with workflow development
-
must apply for Program Coordinator, Capital Pathways at https://jobs.gmu.edu/. Complete and submit the online application to include three professional references with contact information, and provide a
-
policy, standards, and practices, and guide the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting
-
proposals; and Maintains organized records to support compliance and transparency. Required Qualifications: Bachelor’s degree in health sciences, computer/data science, social sciences, or a closely related
-
, an on-campus 3T MRI facility, EEG, TMS and tES, eye-tracking, and animal housing facilities. In addition, researchers benefit from access to high-performance computing resources and Azure cloud infrastructure
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between