Sort by
Refine Your Search
-
requires skill in operating and maintaining heavy farm equipment, precisely following safety and research protocols, communication with colleagues and scientists, and detail-oriented record keeping
-
, collaboration platforms (e.g., M365), artificial intelligence tools, endpoint management, and operational security platforms. The Deputy CTO is expected to foster a culture of transparency, accountability, and
-
, collaboration platforms (e.g., M365), artificial intelligence tools, endpoint management, and operational security platforms. The Deputy CTO is expected to foster a culture of transparency, accountability, and
-
independently as well as collaboratively within a team. Ability to use discretion regarding disclosure/dissemination/security of confidential/sensitive information. Proficiency in Microsoft Word, Excel and
-
, secure, and scalable network services that support academic, research, and administrative functions across campus. Key responsibilities include: supervisory leadership of the Network Engineering team
-
requested. Promote a work place that encourages safety within the shop and in the field. May input/retrieve work-related data using appropriate desk top applications. Operate University vehicle. Minimum
-
through wider and deeper adoption of modern work practices and collaboration tools and services. Assist departments and employees make more effective use of AI and modern work tools, in secured UVM managed
-
through wider and deeper adoption of modern work practices and collaboration tools and services. Assist departments and employees make more effective use of AI and modern work tools, in secured UVM managed
-
budgets, securing grant funding, and ensuring compliance with University and state policies. If you’re a collaborative leader committed to inclusion for students with disabilities and supporting
-
the security of personal health information within the electronic health record (EHR). Provide leadership, set priorities, and optimize utilization, customer service, and security within the EHR and all other