1,130 cloud-computing-"https:"-"https:"-"https:"-"https:"-"https:"-"https:" positions at University of Miami in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
as necessary CORE QUALIFICATIONS: High school diploma or equivalent Successful completion of EKG certification program Valid American Heart Association (AHA) Basic Life Support (BLS) certification
-
as necessary CORE QUALIFICATIONS: High school diploma or equivalent Successful completion of EKG certification program Valid American Heart Association (AHA) Basic Life Support (BLS) certification
-
as necessary CORE QUALIFICATIONS: High school diploma or equivalent Successful completion of EKG certification program Valid American Heart Association (AHA) Basic Life Support (BLS) certification
-
efficiency and profitability. Maintains awareness of current medical technology, health insurance trends, and government regulations. Adheres to all program and applicable governmental policies and procedures
-
paperwork, and performs computer functions, such as entering reports, recording completed procedures, logging studies, and ordering procedures. Adheres to University and unit-level policies and procedures and
-
guidance and positive mentorship in a manner that compliments the training program. Notify Security Leadership when officers in training are not meeting performance standards consistent with the training
-
. Teamwork: Ability to work collaboratively with others and contribute to a team environment. Technical Proficiency: Skilled in using office software, technology, and relevant computer applications
-
collaboratively with others and contribute to a team environment. Technical Proficiency: Skilled in using office software, technology, and relevant computer applications. Communication: Strong and clear written and
-
program requirements. Performs problem analysis for strategic planning initiatives. Solves data integrity issues as they arise, and monitor the addition of new data, analytics and reporting systems
-
Security protects the University’s computers, networks, and data against threats, such as security breaches, computer viruses or attacks from cyber-criminals, by assessing the security measures to identify