436 computer-security-"https:" "https:" "https:" positions at Duke University in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
work safely in environments where dust or mold exposure may occur. - Perform additional responsibilities as assigned. Meet the Hiring Managers Wednesday, March 18 2:00–3:00 p.m. ET Zoom: https
-
Duke Division of Surgical Sciences and Center for Human Systems Immunology is seeking a detail-oriented scientist to fulfill a key role as a Scientific Program Leader II. This unique position combines
-
positions, on Wednesday, March 18th at 2:00pm-3:00pm ET https://duke.zoom.us/j/93327587232?pwd=bXAEPXe4lpygJzirthUqJdNjlAbycZ.1&jst=1 Meeting ID: 933 2758 7232 Passcode: 128838 What You’ll Do Content
-
University Health System, and affiliated entities—helping ensure that Duke maintains a strong, transparent, and highly effective institutional compliance and privacy program. You’ll work closely with Directors
-
analysis of spatial-omics and imaging data, developing a framework for simulations, simulating epidemics on social networks, building generative models to improve computation time for simulations, and other
-
, and Proposal Development – 20% · Perform scientific and administrative analysis supporting the R35 research program led by Dr. Mara Serbanescu, including progress tracking, milestone evaluation, and
-
international programs in more than 150 countries. Occupational Summary Coordinate and administer activities for the Coleman Family Ventures (CFV) Fellows Program and the Health Professions Advising (HPA) team
-
discover how we can advance health together. Duke Health Integrated Practice https://careers.dukehealth.org/us/en/dhip Duke Health Integrated Practice comprises more than 110 primary and specialty outpatient
-
patterns. Calculate proper amounts of herbicides, pesticides, fertilizers, and topsoil for landscape applications; walk off areas, take measurements, compute percentages, and determine proper ratios
-
, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new technology when required