74 programming-"LIST"-"Humboldt-Stiftung-Foundation"-"U"-"U.S" positions at The Ohio State University
Sort by
Refine Your Search
-
qualifies for Remote Work Program for a portion of the typical work week (20%-40% Remote) Note: The above statements are intended to describe the essential functions and related requirements of persons
-
Educators and program staff, as well as front line customer service to clientele; perform various front office duties and back up on phones; provide technical assistance to Educators/program staff, including
-
meeting developmental goals. Minimum Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below
-
Management Oversee day-to-day operations, including staff hiring, supervision, and service assignments. Collaborate with faculty and the Dean to plan and implement forward-looking academic programs. Ensure
-
| Administrative Office The Financial Analyst will support the cancer research program within the Comprehensive Cancer Center at the Ohio State University. Key Responsibilities: Perform complex financial analysis
-
Technologist duties as needed. The RRA may perform imaging procedures for which he/she receives privileges within The Ohio State University Health System. The following procedures are listed as core privileges
-
processes and procedures. The position will also require strong written and editorial skills to support program staff in producing written marketing materials. The position will be using the most current
-
Resources Program, focusing on the needs of Ohio, particularly southern Ohio. Responsibilities include conducting greenhouse, laboratory, and field research, as well as collaborating within
-
| Dental Public Health The Ohio State University College of Dentistry seeks an Office Administrative Associate to join its Division of Dental Public Health. The Dental Public Health Program aims to equip
-
, switches, firewalls). Provide guidance to Implement techniques such as network segmentation, access control lists (ACLs), encryption, VPNs, intrusion detection/prevention systems (IDS/IPS), and security