132 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "Dr" "Keele University" uni jobs at Wayne State University in United States
Sort by
Refine Your Search
-
Research. It is expected that the successful candidate will conduct independent research including maintaining a strong record of accomplishments and the ability to secure external cancer-focused funding
-
Research. It is expected that the successful candidate will conduct independent research including maintaining a strong record of accomplishments and the ability to secure external cancer-focused funding
-
Technology Program or LATG level AALAS certification is required. Bachelor's degree in a related science field is preferred. Experience: Considerable experience and knowledge in the care, feeding and handling
-
not mentioned that are of similar kind or level of difficulty. Minimum Qualifications: Graduation from or presently enrolled in an accredited Veterinary Technician training program, LAT level AALAS
-
products, and create interactive visualization tools. Administrate High-Performance Computing (HPC) servers. Lead cross-functional research teams while contributing to grant writing, manuscript preparation
-
and services program to include affinity partnerships, program contracting, marketing and promotion, revenue generation, and engagement reporting.15% Serve as building coordinator for the Tierney Alumni
-
either a public or technical service unit in the University Library System. Work activities necessitate familiarization with basic library methods and procedures and the ability to utilize on-line computer
-
University‘s Elaine L. Jacob and Art Galleries. Oversee the installation and de-installation of exhibitions, ensuring proper handling, security, and preservation of objects. Collaborate with the Gallery and
-
team • Foster a culture of safety, accountability and continuous improvement Strategic Planning, (10%): • Identify and manage facility capital upgrades and improvements with a focus on reduction and
-
or are expanding their capabilities in a second technology. They may also have specific assignments in areas such as performance tuning, security, disaster recovery, and the like to broaden their overall knowledge