293 computational-physics "https:" "https:" "https:" "https:" "Simons Foundation" uni jobs at George Mason University
Sort by
Refine Your Search
-
Listed
-
Field
-
Accelerator budgets and expenditures with the College of Science; Pursues funding opportunities that will increase the capacity of the Accelerator; Manages the LA (Learning Assistants) program; Supervises
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between
-
committees or task forces). Proven ability to: Lead strategic, high-level initiatives (e.g., program launches, cross-unit collaborations, institutional planning efforts) with demonstrable positive outcomes
-
the successful completion of this process. Instructions to Applicants: For full consideration, applicants must apply for Lifeguard at https://jobs.gmu.edu/ . Complete and submit the online application to include
-
. This position will develop, implement, and manage the institution’s physical security systems. This position is responsible for supervision of the Card Access Security Office (CASO) team and assist the Director
-
. Instructions to Applicants: For full consideration, applicants must apply for Business Intelligence (BI) Architect at https://jobs.gmu.edu/. Complete and submit the online application to include three
-
in a technology-related field (e.g., information technology, computer science, instructional technology, assistive technology, etc.) or an equivalent combination of education and experience (some
-
of Banner and Patriot Web applications, VAOnce, or equivalent computer systems. Instructions to Applicants: For full consideration, applicants must apply for Third Party Billing Specialist at https
-
demonstrated movement toward professional registration. May be substituted with approval from the Director of Program Management based on knowledge, skills, and experience. Certified by the Department of Housing
-
policy, standards, and practices, and guide the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting