The page you were trying to view does not exists or may have expired. Below are the list of similar positions in our database.
Similar Posts
-
This post is full time (35 hours p/w) and open ended. Relocation assistance will be provided where appropriate. The University of Glasgow has been changing the world for more than 573 years, and
-
vacancy reference 138528. Previous applicants need not apply. The University of Glasgow has a responsibility to ensure that all employees are eligible to live and work in the UK. If you require a Skilled
-
Hours: Full Time (35 hours p/w) Contract type: Open Ended Interview date: expected week of 18th March University of Glasgow is looking for an experienced senior applications developer to join our
-
to teaching and student supervision at all levels; and to carry out senior administrative tasks. Term: Fixed Term (30 months) The Fraser of Allander Institute is seeking an experienced analyst to play a leading
-
Job Purpose The Insights Analyst will support the work of the Careers Employability & Opportunity and Planning, Insight and Analytics teams at the University of Glasgow. The team sits at the heart
-
Job Purpose The delivery of strategic projects across the finance directorate, working closely with stakeholders from across the University. To play a key role in the development and provision
-
Job Purpose The Data Analyst will work to the core objectives of the Economic Development and Innovation Teams, with a formal reporting line to the Planning, Insight and Analytics team. These teams
-
Job Purpose The Service Desk Analyst will work closely with the Service Desk Manager and within the Workplace Services Support Team. The two Senior Service Analysts will manage the Service Desk
-
Job Purpose As a Senior Analyst Developer you will design, develop, implement and maintain core corporate business information systems that operate across the administrative, teaching and research
-
Job Purpose The Cyber Operations Analyst will play a significant role in monitoring the institution for Cyber security attacks, be responsible for generating metrics on security effectiveness, and