32 algorithm-development-"LIST"-"Meta" positions at Auckland University of Technology in New Zealand
Sort by
Refine Your Search
-
learning experiences and graduate success, as well as supporting professional staff to meet their development goals. Te Whiwhinga mahi | The opportunity Based in the CBD, the AUT Accounts & Support
-
can provide and display data to influence positive change. You'll be working on a variety of projects, including CO2 emissions reporting, development of a sustainability dashboard, monitoring and
-
. Handle cash transactions accurately and efficiently. Prepare and serve quality coffee and beverages. Merchandise displays and manage stock effectively. Assist with sandwich preparation and other food
-
Opportunities for professional development and free study Flexible working options to support your work-life balance Full-time, permanent role based in Auckland CBD About AUT Auckland University
-
Te Whiwhinga mahi | The opportunity This position is responsible for leading the development and delivery of projects associated with the Disability Action Plan, with a focus on the efficiency and
-
academic teams to shape and support AI project implementation including identification of AI-related risks (including data sovereignty, cybersecurity and research ethics) and support mitigation. Develop
-
architecture across AUT, guiding the development of consistent standards while working alongside ICT teams who own architecture within their domains. You'll provide expert oversight, alignment, and leadership
-
campuses. Te Whiwhinga mahi | The opportunity We are seeking a skilled Learning Designer to join our Organisational Development team on a six-month fixed-term contract. In this role you will play a key part
-
worth over $1.5 billion, with further growth planned over the next 4-5 years. Te Whiwhinga mahi | The opportunity The Estates Facilities Management Specialist is a development role offering the
-
in software and firmware development for robotics, IoT, and HPC using C, C++, and Python. Identify performance bottlenecks and implement security best practices across computing infrastructures