277 data "https:" "https:" "https:" "https:" "I.E" "UCL" "UCL" uni jobs at Georgetown University
Sort by
Refine Your Search
-
on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Pay Range: The projected salary or hourly pay range for this position which represents the full range of anticipated
-
follow regulatory, compliance, data, and storage best practices. Helping the community identify and adopt emerging and enriched research IT resources is an important aspect of this position, as is helping
-
and or analyzing data; supervising undergraduate research assistants; and contributing to research meetings and administration (e.g., IRB protocols). The Research Specialist will also have opportunities
-
position’s mode of work designation. Complete details about Georgetown University’s mode of work designations for staff positions can be found on the Department of Human Resources website: https
-
campaign fundraising goal is $3 billion through 2026. The Office of Gift Administration is responsible for 120,000+ annual gift and pledge transactions. Ensures the data integrity of charitable donation
-
defined in GU Policy_________________ and DOT Regulations 391.11 (4) – Medical Card/Certificate and 390.5 (1) – Commercial Motor Vehicles (10K+) Definitions ( http://www.fmcsa.dot.gov ). Requirements and
-
participating in recruitment and selection of study participants; document and collect data to support protocol screening and determine compliance with eligibility requirements. Interface with study participants
-
registration information; maintaining wait lists; and generating and issuing maintenance, engineering and custodial work orders to staff using the WebTMA / Maintenance Connection facility and asset maintenance
-
, problem solving, and manipulation of data base information for development of reports as well as oral and written presentations Performs special project activities requiring application of technical
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and