285 data-"https:" "https:" "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" uni jobs at Georgetown University
Sort by
Refine Your Search
-
Georgetown University’s mode of work designations for staff and AAP positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work-designation . Current Georgetown
-
while maintaining professional relationships with internal and external partners. The incumbent thinks logically/critically to solve problems, evaluate the relevance of information/data, make sound
-
applications and supporting materials must be submitted through the following Interfolio link: https://apply.interfolio.com/177768 . Faxed, emailed, or mailed applications will not be accepted. Review
-
to technologists and policymakers. CSET currently focuses on artificial intelligence, advanced computing and biotechnology. Important Note: Please visit CSET’s career page for more detailed information on role
-
. Complete details about Georgetown University’s mode of work designations for staff and AAP positions can be found on the Department of Human Resources website: https://hr.georgetown.edu/mode-of-work
-
, and customer satisfaction. Integrating the ITSM platform with other business and IT systems, such as monitoring tools or HR systems, to create a seamless flow of information. Work Interactions This role
-
having many meetings fully virtual or hybrid to include remote employees, using Zoom. The Beeck Center’s TTA offering focuses on building the capacity of digital + data-focused public service professionals
-
the trial lifecycle. Collaborate with investigators and more senior study team members by participating in recruitment and selection of study participants; document and collect data to support protocol
-
marshal, GUPD, facilities management, and project management as necessary to provide essential system information and status. The incumbent will collaborate with project management, facilities management
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and