Sort by
Refine Your Search
-
entailing: 25%: Collaborate with Assistant Director of Experiential Learning and student leaders to create, plan, and implement events; develop marketing strategies, materials, and website content for SSLC
-
, staff and administrators. Villanova’s most precious asset is our people. As an employee, you will receive a holistic benefits package, generous paid time off, a competitive retirement savings plan
-
aided dispatch (CAD) paperwork/programs for supervisory approval; lists all incidents and their resolution, notes unusual occurrences, accounts for all members of the shift and their assignment. Issues
-
improving digital services for library users. Contributes to programs, goals, and strategic initiatives of the Library Technology department, Falvey Library, Villanova University, and professional
-
that are aligned with the University’s Strategic Plan and designated by the leadership of the Office of Undergraduate Admission. Extensive travel*, weekend, and evening hours are required. * Designated territory
-
cryptographic engineering, trusted computing, system networking, etc., as evidenced by the recent multiple national and industrial grants. In addition, the College of Engineering has six research centers
-
coordinates & facilitates training sessions and offers software support tailored to college specific needs, and may partner with UNIT to develop new training programs, enhance existing ones, or offer them
-
dental insurance with multiple health plan options. Generous vacation plan and holiday schedule. Flexible schedule in the summer months. Health and wellness resources plus discount programs. Opportunities
-
Developer, you will be responsible for designing and developing cutting-edge applications that support the University’s marketing and recruitment of online and multi-modality credit and non-credit programs
-
this inventory is accurate. Participate with programming to support procedures and automation of processes within the department. Threat Management and Analysis Aid with threat hunting by leveraging data from key