148 data-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"L2CM" positions at University of Delaware
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
regularly with internal offices to ensure student account information is accurate and discrepancies related to charges, payments, and refunds are resolved promptly. Communicate with Third-Party billing
-
focus on data collected with in-situ AUV systems and airborne, water-penetrating LiDAR systems. Specifically, the postdoc will partner with both biological oceanographers (Matthew Oliver, Jon Cohen) from
-
health care providers to ensure timely completion and updates of forms to process leave, update employment status, and leave tracking. Performs data entry into HRIS system including daily and periodic
-
, verifying, and documenting information of a specialized nature with additional emphasis on performing a variety of clerical processing tasks including verification, input, retrieval and routine reconciliation
-
Security Architecture is a senior leadership role responsible for governing the organization’s information security risk, compliance, and architectural security posture. This role provides enterprise-wide
-
by providing information, directions and assistance; Supervises other police officers, security officers and/or miscellaneous wage and/or student employees; Participates in training and certification
-
coupled with the dissemination of these results and additional information to Sussex County residents as well as to the state and region. The University of Delaware Extension Vegetable and Fruit Program
-
assistive and instructional computer technologies, for university students and employees with disabilities. The position provides campus-wide leadership for students, faculty, supervisors and University staff
-
-health student advising. Collect and analyze data on Center programs, including advising, efficacy and student success. Contribute to the Center’s student experiential learning opportunities. Engage in
-
, Security Operations and SOC, reports to the Chief Information Security Officer (CISO).