Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. Ensure site compliance with research protocols by reviewing all regulatory requirements to confirm implementation of appropriate methods, practices, and procedures for all research activities. Coordinate
-
special populations, as well as behavioral methods. Current research projects include behavioral and brain imaging investigations of altruism, generosity, empathy, social learning, and antisocial behavior
-
, integrated tools, and other software integrated with the CRM. Position responsibilities include managing the university’s Salesforce infrastructure, developing testing and implementing patches and upgrades
-
areas will be considered: human subjects research (e.g., working in a lab or on studies for PhD candidates at an academic institution), social work, nursing, occupational health, Emergency Medical
-
Management System (EMS) software program. This process includes coordinating with the A/V and Facility Departments in order to resolve scheduling conflicts. The Coordinator processes A/V and Facilities
-
programming or other programs in an academic, non-profit, or professional setting Proficiency with office and event management software (e.g., Microsoft Office Suite, Google Workspace, project management
-
, Zotero, and statistical software (SPSS or R preferred). Excellent verbal and written communication Excellent interpersonal and organizational skills Ability to work well in a team. Attention to detail Must
-
of research methods Speak and Write Spanish preferred, but not essential Attention to detail and organization skill are essential Work Mode Designation This position has been designated as On-Campus. Please
-
using data management and statistical software (e.g. REDCap, Microsoft Excel, SPSS, SAS) Work Mode Designation This position has been designated as Hybrid. Please note that work mode designations
-
and applications (e.g., Computer-Aided Dispatch (CAD), Report Management Systems (RMS)). Strong technical knowledge of software, hardware, and network security principles as they apply to confidential