346 postdoc-in-automation-and-control positions at University of Alabama at Birmingham
Sort by
Refine Your Search
-
responsibility for the direction, control and planning of an one’s own work; (3) work independently; (4) recognize the rights and responsibilities of patient confidentiality; (5) convey empathy and compassion
-
responsibility for the direction, control and planning of an one’s own work; (3) work independently; (4) recognize the rights and responsibilities of patient confidentiality; (5) convey empathy and compassion
-
evaluating new instruments and/or methods, reagent preparation, quality control information, troubleshooting, and equipment maintenance. To assist team lead with apheresis procedures, bone marrows
-
without loss of efficiency or composure; (2) accept responsibility for the direction, control and planning of an one’s own work; (3) work independently; (4) recognize the rights and responsibilities
-
be able to: (1) perform a variety of duties often changing from one task to another of a different nature without loss of efficiency or composure; (2) accept responsibility for the direction, control
-
experience coordinating employee training, maintaining service quality control, managing human resource issues including performance management, staffing, and payroll. TRAITS & SKILLS: Must be self-directed
-
preparation, quantification, and quality control. Support viral vector production, including transfection, harvest, and characterization under supervision. Maintain mammalian cell culture, including passaging
-
Payable group as well as with departments and other Finance staff. - Report any issues or concerns to management in a timely manner. - Willingly perform any other duties as assigned by the Controller
-
changing from one task to another of a different nature without loss of efficiency or composure; (2) accept responsibility for the direction, control and planning of an one’s own work; (3) work independently
-
with risk owners to document remediation plans and exceptions Assessing risk of vulnerabilities of assets on the network Mapping risk findings to common controls Determining risk of firewall requests