Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
under the supervision of the University Building Official. Required Qualifications: An ABET accredited Bachelor of Engineering Degree; Must be able to use computer-based applications, including, but not
-
Department: Col of Engineering and Computing Classification: Education Support Spec 3 Job Category: Classified Staff Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk) Location
-
Department: Academic Affairs Classification: GMU Worker Job Category: Part-Time / Hourly Wage Job Type: Part-Time Location: Fairfax, VA Workplace Type: Hybrid Eligible Sponsorship Eligibility: Not eligible for visa sponsorship Salary: Salary commensurate with education and experience Criminal...
-
tool, in conjunction with the Graduate Program Administrator and the 5 Program Directors and MA Program directors. Approximately 30-40 offers sent during the admissions cycle. These are tracked
-
, student mentoring, committee membership, and interfacing with the business community. Information about our Program Offerings: Undergraduate Program Offerings: https://business.gmu.edu/undergraduate
-
; and Facilitates A/E dispute resolution. Programming/Design Phase Manages programming and design of assigned capital projects to ensure that A/E design submittals maximize the users' program goals and
-
Services (EIS) is responsible for the design, installation, operation, and maintenance of George Mason University?s network, compute, storage, and cloud infrastructure. This includes all inside and outside
-
, VA Workplace Type: On Site Required Sponsorship Eligibility: Salary: Salary commensurate with education and experience Criminal Background Check: Yes About the Department: The Forensic Science Program
-
Department: Col of Engineering and Computing Classification: Education Support Spec 3 Job Category: Classified Staff Job Type: Full-Time Work Schedule: Full-time (1.0 FTE, 40 hrs/wk) Location
-
the acquisition of advanced security technology; Provide guidance and influence the university with regard to network and computing security needs in selecting hardware and software technologies, choosing between