2,627 information-security "https:" "https:" "https:" "https:" "https:" "UCL" uni jobs at Duke University
Sort by
Refine Your Search
-
Listed
-
Field
-
, it is essential that all members of the community feel secure and welcome, that the contributions of all individuals are respected, and that all voices are heard. All members of our community have a
-
issues appropriately. Prepares and submits documents needed for regulatory and safety reporting to sponsors and other agencies. May train or oversee others. Data: Enters and collects data. Develops data
-
without reasonable accommodations. For more information, please visit https://hr.duke.edu/policies/ada/ Duke is an Equal Opportunity Employer committed to providing employment opportunity without regard
-
, it is essential that all members of the community feel secure and welcome, that the contributions of all individuals are respected, and that all voices are heard. All members of our community have a
-
cultural programs to eligible team members. Learn more at: https://hr.duke.edu/benefits/ Ready to Make a Difference? Apply now and help us build a stronger, smarter, and more connected future. Duke is an
-
—an exchange that is best when the rich diversity of our perspectives, backgrounds, and experiences flourishes. To achieve of this exchange, it is essential that all members of the community feel secure and
-
experiences flourishes. To achieve of this exchange, it is essential that all members of the community feel secure and welcome, that the contributions of all individuals are respected, and that all voices
-
collaboration with the PI and institutional offices. Participant Interaction & Safety Conducts and documents informed consent for complex technology-enabled studies, clearly explaining wearable data collection
-
security of student, staff, business, and other confidential, sensitive, electronic or proprietary information of Duke University from any source and in any form (spoken, paper, electronic, etc.) that is
-
. Advise senior leadership on IAM risk and governance matters, integrating IAM considerations into broader IT and security strategies (e.g., Zero Trust, least privilege). Cross-Functional Collaboration: Work