318 computer-science-intern "https:" "https:" "https:" "https:" "UNIVERSITY OF HELSINKI" positions at George Mason University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
, VA Workplace Type: On Site Required Salary: Salary commensurate with education and experience Criminal Background Check: Yes About the Department: The Forensic Science Program at George Mason
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 27-Jan-26 Location: Other, Virginia Internal Number: 10003688 Department: College of Science Classification: 12-month
-
performances for a range of occasions and venues, including athletic contests, university ceremonies, student recruitment events, and national and international competitions. It is a multidisciplinary education
-
financial and budget activities, directing donor stewardship, managing and analyzing reports for the team, Department Chairs, and Center Directors, coordinating internal technology and CRM updates
-
excellence in event design, audiovisual execution, and logistical coordination. This role serves as the primary production lead for high-stakes and VIP events, cultivating key relationships across internal
-
, student mentoring, committee membership, and interfacing with the business community. Information about our Program Offerings: Undergraduate Program Offerings: https://business.gmu.edu/undergraduate
-
Department: Information Technology Classification: Info Technology Spec 3 Job Category: Classified Staff Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk) Location: Fairfax, VA
-
of training the next generation of social workers using evidence-based practices and leveraging cutting-edge methodologies, including digital technology, computing techniques, creative arts, and trauma-informed
-
and is one of the largest facilities of its type in Northern Virginia. Located on the Science and Technology campus in Prince William County of George Mason University, the 110,000 square foot facility
-
policy, standards, and practices, and guide the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting