Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
the Department of Environmental Science and Policy, the School of Systems Biology, the School of Integrative Studies, and the STEM Accelerator Program also contribute to the Biology Department through courses and
-
Department: Col of Engineering and Computing Classification: Administrative Faculty Job Category: Administrative or Professional Faculty Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs
-
needs in our region and beyond. The position will establish an extramurally funded research program whose results are published in the peer-reviewed literature, and to provide mentorship to graduate and
-
, client responsiveness, and alignment with institutional standards; Designs and implements a robust training program and ensures subordinates deliver effective training on equipment operation, venue
-
University. The mission of the Center for Collision Safety and Analysis is to advance collision safety though scientific research using sophisticated computational methods that provide a means to establish a
-
by serving as George Mason University's facility, program, and support services management department for the Johnson Center, Student Union Building I, and The Hub. The department aims to support and
-
of the dean, faculty, and students at the college and the university as a whole. Responsibilities: Maintains Personal Portfolio and Supports Comprehensive Fundraising Program Successful execution of a
-
program rooted in the arts, comprising student, community, and professional musicians, dancers, dramatists, composers/arrangers, visual artists, choreographers, poets/lyricists, cultural philosophers, arts
-
Vehicle Use Policy 1411 https://universitypolicy.gmu.edu/policies/vehicle-use/ . The Office of Risk Management reserves the right to review the driver’s licenses and Motor Vehicle Reports (MVRs) of all
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between