Sort by
Refine Your Search
-
Program is required. Req 1 year One-year experience as a Surgical Technician or as a Surgical Technician intern required. *Surgical Technician intern experience must be paid and completed at Keck Medicine
-
Program is required. Req 1 year One-year experience as a Surgical Technician or as a Surgical Technician intern required. *Surgical Technician intern experience must be paid and completed at Keck Medicine
-
of the security program to the chief information security officer (CISO) and executive leadership. Collaborates with OCEC Policy change management to identify change impacts; provides communications team with
-
. Req Proficient computer skills in Microsoft Office as well as Internet access and utilization. Preferred Qualifications: Pref Master’s degree Nursing Master’s Degree in Nursing or in progress, strongly
-
cleanliness of facilities. Buses tables, as necessary. Assists in kitchen sanitation program. Complies with standard food handling and sanitation procedures. Adheres to department service standards and to all
-
. Arrive patients using the proper registration system(s). Politely inform patients of possible delays relating to their appointments. Collate chart appropriately. Perform patient encounter in computer
-
. The emphasis on each of these areas will depend on the unit assigned. Minimum Education: Current California Certified Nurse Assistant Certification OR Active enrollment in an accredited nursing program and
-
Under the supervision of the Laboratory Information System Manager, the IT Analyst for Laboratory Systems, will work with external vendors, system owners, community partners, contractors and Health Science Campus leadership to design, develop, implement and make operational laboratory...
-
that the employee will travel to and from campus for meetings as necessary. Under the direction of Donna Benton, the Center Director, the Financial Administrator will be hands-on and responsible for managing program
-
with all relevant cybersecurity laws, regulations, and policies. Provides specific technical information security expertise for development of centralized cybersecurity program. Supports development