Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Applicants: Position is eligible for hybrid work subject to University policy . Job Summary: The Manager of IT Desktop Operations oversees and coordinates the daily operations of the desktop technicians and
-
Applicants: Position is eligible for hybrid work subject to University policy . Job Summary: The Information Security Compliance Analyst III develops, implements, and maintains information security policies
-
Department Computer Science Rank Instructor Position Summary The Computer Science Department is seeking a qualified and enthusiastic instructor to teach ENGR 104: Introduction to Engineering. This
-
Applicants: Position is eligible for hybrid work subject to University policy . Job Summary: The IT Project Manager II serves as an Office of Information Technology (OIT) liaison and mentor for OIT operational
-
Department/Organization 207401 - School of Library and Info Studies Rank Assistant Professor Position Summary Appointments to the faculty of The University of Alabama are based on the personnel
-
: 600150 - Intercollegiate Athletics Normal Work Schedule: Flexible Job Summary: The Student Assistant supports various tasks within Athletics Information Technology systems. Enters service requests
-
- Computer Science Normal Work Schedule: Varies; Monday - Friday 8:00am to 4:45pm Job Summary: The Undergraduate Student Assistant provides general office support for the Department of Computer Science. Assists in a
-
Department Electrical and Computer Engineering Rank Research Assistant Professor Position Summary The Department of Electrical and Computer Engineering at The University of Alabama is recruiting a
-
College IT Support Technician I provides service to faculty, staff, and students utilizing college computer systems. Performs basic on-site troubleshooting, repair, and maintenance involving computer
-
Applicants: Position is eligible for hybrid work subject to University policy . Job Summary: The Information Security Compliance Analyst III develops, implements, and maintains information security policies