Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
the area of controlled environment agriculture. Responsibilities include: domain research, user research; usability studies; designing new features; writing code; and testing software. Development platforms
-
; provide outreach, programming, and resources for students, faculty, and staff to enhance belonging Articulate and promote the benefits of diversity and advocate for an inclusive environment that engages
-
commitment to the achievement of excellence and diversity among its faculty and staff, and strongly encourages candidates to apply who will enrich our academic and culturally inclusive environment
-
projects Maintain accurate records of experimental data and assist with data interpretation Help maintain a clean and organized work environment in the greenhouse, laboratory, and field settings
-
. JOB DESCRIPTION AND POSITION REQUIREMENTS: The Pennsylvania Housing Research Center (PHRC), housed in the Department of Civil and Environmental Engineering at the Penn State University Park campus, is
-
the use of internet searches, file formatting, document retrieval, and e-mail is strongly preferred. Have experience in a team environment with excellent team skills is required. Be able to work
-
seeking Cyber Security Systems Engineers for our high security Special Program environments. These roles will provide advanced systems engineering and administration, computing support, and specialized
-
to an USDA funded research program aimed at leveraging genotype-phenotype-environment associations to assist projections needed to make assisted population migration projections, ultimately laying a foundation
-
, students, and temporary employees. The supervisor’s primary responsibility is creating an environment for excellence in customer service through product and services oversight, effective personnel
-
of next generation firewalls, remote access VPNs, and technologies supporting WAN/LAN switching and routing Operating and leading technical teams/projects in a high-security research computing environment A