274 data "https:" "https:" "https:" "CMU Portugal Program FCT" uni jobs at Georgetown University
Sort by
Refine Your Search
-
, problem solving, and manipulation of data base information for development of reports as well as oral and written presentations Performs special project activities requiring application of technical
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
consistent in-person coverage during business hours, while also supporting administrative functions such as handling correspondence, coordinating information flow, and assisting staff as needed. Duties include
-
Academic Technology Support Specialist II, University Information Services - Georgetown University. This position serves as a senior technical resource and project coordinator, providing advanced, expert
-
applications and supporting materials must be submitted through the following Interfolio link: https://apply.interfolio.com/177768 . Faxed, emailed, or mailed applications will not be accepted. Review
-
of which 1 year was specifically dealing with alumni relations, event planning, or a related area preferably in higher education. Must be proficient with standard computer applications including Microsoft
-
, investigation, and emergency response as outlined in general orders and special orders, as directed by superior officers. They support the university community by providing information and assistance, and is
-
defined in GU Policy_________________ and DOT Regulations 391.11 (4) – Medical Card/Certificate and 390.5 (1) – Commercial Motor Vehicles (10K+) Definitions ( http://www.fmcsa.dot.gov ). Requirements and
-
study team members by participating in recruitment and selection of study participants; document and collect data to support protocol screening and determine compliance with eligibility requirements
-
, and customer satisfaction. Integrating the ITSM platform with other business and IT systems, such as monitoring tools or HR systems, to create a seamless flow of information. Work Interactions This role