Software Engineer Req number: R1530 Employment type: Full time Worksite flexibility: Remote Job Summary Job Profile Summary We are looking for Software Developer to develop, enhance, and...
POSITION SUMMARY: If you're looking for rewarding work with the opportunity to grow, read on to learn how you can bring your expertise to a firm that combines state-of-the-art technology with a history of success. The...
Title: Validation Engineer II (Pharma) Job Status: Full-time direct hire Location: Lakewood, New Jersey Onsite expectation: 5 days a week Compensation: $89,000 to $92,000 DOE Note: This role is not set up...
Job Overview: The OR Technician anticipates the surgeon's needs and expedites the procedure, minimizing the patient's exposure to trauma intra-operatively. Qualifications: Required: * High school diploma or...
Job Description Looking for an opportunity to join great Manufacturing team? We are currently seeking a Manufacturing Maintenance Engineer to join our Plant Operations team. This hands-on role combines engineering expertise...
External Applicant Instructions Please upload your resume/CV for automatic population of information to your Kean application.Your contact information, work experience and education will be...
*** Regional Search *** Role is located in the Midwest and will require relocation Tooling Engineer / Die Design Engineer MUST have Extrusion Die Design Experience PLASTICS...
This is an entry-level position for a detail-oriented, team player with strong communication, analytical, organizational, problem solving and time management skills. The Position will report to the Engineering Manager and work under the...
External Applicant Instructions Please upload your resume/CV for automatic population of information to your Kean application.Your contact information, work experience and education will be...
Role Summary/Purpose: The Analyst, Information Security Cryptography will play a key role in safeguarding the organizations systems, networks, and data. The position is responsible for aiding in the design and build of Information Security...