Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
student engagement. Additionally, the position develops and oversees a comprehensive Coordinator program and provides leadership to staff to support team performance and growth. Candidates are encouraged
-
! We’re seeking an all-star Marketing Manager to oversee strategic marketing efforts and drive enrollment for Georgetown University’s School of Continuing Studies. Reporting into the Director of Program
-
Georgetown University on a daily basis. The position will also coordinate with colleagues across the university, including Campus/School/Center/Institute/Program/Initiative communications/events staff and
-
experience in health related field preferred Must have computer experience with word processing, advance oral and written communication skills, and strong interpersonal skills. Must have the ability to work
-
-level support for the university's classroom and desktop computing environments. The Specialist II is responsible for handling a wide range of complex and escalated technical issues that require root
-
transactions Experience interacting with research subjects or interfacing with the public in a previous role Excellent computer skills, including proficiency in word processing, database, and spreadsheet
-
experience, including at least one year of related experience, or equivalent in education, training and experience. Graduate education is preferred. Computer fluency with Microsoft Suite, Google Workspace
-
, preferably in acute care; research experience preferred Proficiency in MS Word and Excel; computer literacy essential for daily tasks BCLS required; ACLS preferred; chemotherapy certification beneficial
-
, equivalent combination of education and experience may be substituted for degree. 1-2 years combination of work and educational experience in health related field preferred Computer experience with word
-
and applications (e.g., Computer-Aided Dispatch (CAD), Report Management Systems (RMS)). Strong technical knowledge of software, hardware, and network security principles as they apply to confidential