30 coding-"https:"-"Prof"-"FEMTO-ST" "https:" "https:" "https:" positions at University of Michigan
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
Apply Now How to Apply Applicants are required to submit a (1) cover letter, (2) resume, and (3) example code via the UM Careers website as one combined electronic document. The cover letter should
-
. The MPOG team includes clinicians, quality improvement experts, software developers, statisticians, and administrators. For more information, please visit https://mpog.org/about/ Position Summary
-
codes. Fluency in reading, writing and speaking English. Why Join Michigan Medicine? Michigan Medicine is one of the largest health care complexes in the world and has been the site of many groundbreaking
-
disassembly, mobile device security, NAC, secure code review, secure remote access, secure wireless networking, penetration testing, PKI, policy development, risk management, SIEM, threat modeling, two-factor
-
until the position is filled. Who We Are The Parker Lab generates mechanistic knowledge about how disease susceptibility is encoded in the non-coding genome, with a focus on metabolic traits. We combine
-
build, support, and maintenance of Coding/CDI, Deficiency, Identity, ROI, Scanning, and Care Everywhere workflows within the Epic Electronic Health Record System instance for Michigan Medicine. As a
-
. The MPOG team includes clinicians, quality improvement experts, software developers, statisticians, and administrators. For more information, please visit https://mpog.org/about/ Position Summary
-
in live courses and programs. For more information, please visit our website: Center for Academic Innovation Why Work at Michigan? Excellent benefits are available, for details, see http
-
of new and existing systems onto our AV System Monitoring Platform (Innomesh), adding requisite code to existing programs and loading programs onto the system, testing, room data gathering, and other tasks
-
automation and standardization (e.g., infrastructure as code, reusable patterns, self-service enablement). Practical experience partnering with security and identity teams to operationalize non-functional