Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
The Part Time Data Analyst for Infectious Diseases Clinical Trials Unit will work with and assist the Clinical Research Coordinator, Regulatory Specialist, and Clinical Trial Manager by entering data
-
independent research with technology policy and design, with a focus on the online information environment. The Research Analyst will play a cross-functional role on the KGI team, synthesizing academic findings
-
engineers, data analysts, and research fellows to maintain CSET’s data infrastructure, make data analytically useful through extraction, classification, clustering, annotation, and entity resolution, and
-
critical for facilitating a successful relationship between Cluster 4 and GU Athletics. The Expense Analyst is part of a team responsible for the effective and efficient review and monitoring of all
-
high-performing functional teams: Payables Systems, Accounts Payable, and Supplier Management including direct supervision of Associate Directors and Managers, and oversight of operational analysts
-
movement leaders, we provide timely, evidenced-based ideas to impact decision-making, increase economic well-being, and advance racial and gender equity. The Senior Policy Analyst conducts highest level
-
Security Operations Center (SOC) Manager, University Information Systems/University Information Security Office - Georgetown University The SOC Manager is a self-starter, a natural problem solver
-
information sharing, and managing stakeholder expectations. The position will be responsible for communicating UIS policies, procedures and updates on central services, which includes, among other
-
having many meetings fully virtual or hybrid to include remote employees, using Zoom. The Beeck Center’s TTA offering focuses on building the capacity of digital + data-focused public service professionals
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and