567 engineering-computation "https:" "https:" "https:" "https:" "https:" "https:" "https:" "CNRS " uni jobs at University of Virginia
Sort by
Refine Your Search
-
Listed
-
Field
-
the foundational technology, applications, services, and infrastructure that enable the University’s teaching, research, and administrative functions. The IT Project Management Office (IT PMO) provides Program and
-
Security Officer (DCISO) to lead and evolve one of two critical security verticals: Security Operations or Security Engineering. Reporting directly to the Chief Information Security Officer, this high
-
conditions. These roles use specialized imaging technology to screen for and diagnose breast abnormalities. Professionals in this field operate mammography equipment, perform breast imaging, and provide
-
—using defined cleaning standards and APPA level criteria. This role requires strong attention to detail, objectivity, critical thinking, and comfort using technology. After initial training, the QA
-
conditions. These roles focus on using ultrasound technology to produce images of the body's internal structures, such as organs, tissues, and blood vessels. These images are essential for diagnosing and
-
Office, faculty program leadership and reporting to the Senior Associate Dean for Student Engagement, this individual will lead a high-performing team in attracting, evaluating, and enrolling exceptional
-
conditions. These roles focus on using ultrasound technology to produce images of the body's internal structures, such as organs, tissues, and blood vessels. These images are essential for diagnosing and
-
technology 3.) Maintains a positive and professional work environment 4.) Identifies potential areas for improved operations and care 5.) Performs telephonic patient triage and processes requests
-
, Athletic Training, Pharmacology, Medical Technology, Physical Therapy or Registered Respiratory Therapy. CRC 1, Licensed Education: Bachelor's Degree Required or equivalent combination of experience
-
security risk management program including assessment of cyber and IT risk management and exceptions, maintenance of a registry of significant IT risks, third-party risk management (TPRM), data governance