Sort by
Refine Your Search
-
. For program details and eligibility information, please visit https://physics.georgetown.edu/reu . The online application consists of: 1. Standard cover sheet for AcademicJobsOnline.org. Enter information
-
are required, including the ability to interact effectively with faculty and students. Computer proficiency is a must, including registration systems, databases, and analysis tools such as MS Excel. Preferred
-
Taylor and to Dr. Randi Williams. To learn more, please see our website https://lunghealth.georgetown.edu/ . Requirements and Qualifications Bachelor's or Master's degree in pre-med, psychology, public
-
Description The Department of Mathematics and Statistics at Georgetown University (https://mathstat.georgetown.edu/ ) invites applications for a postdoctoral researcher in Mathematics. The position will start
-
applications (e.g., Computer-Aided Dispatch (CAD), Report Management Systems (RMS)). Strong technical knowledge of software, hardware, and network security principles as they apply to confidential law
-
capture systems, electronic medical records, and other computer applications. Preferred Qualifications Experience with OnCore (Clinical Trials Management System). Certified clinical research certification
-
, preferably in acute care; research experience preferred Proficiency in MS Word and Excel; computer literacy essential for daily tasks BCLS required; ACLS preferred; chemotherapy certification beneficial
-
of electronic regulatory systems and clinical trial management systems (e.g., OnCore, REDCap) Work Mode Designation This position has been designated as On-Campus. Please note that work mode designations
-
their teams, communities and across campus. The Community Director lives in the assigned residential area. Primarily desk work in an office or workspace using a university issued laptop computer. Some meetings
-
penetration testing tools ● Deep technical knowledge of computer networking concepts and protocols, network security methodologies, cyber threats and vulnerabilities, authentication, authorization, and