93 computer-security-"https:" "https:" "https:" uni jobs at University of Pennsylvania
Sort by
Refine Your Search
-
adherence to organizational policies and regulatory requirements; Maintain accurate records and ensure all procedures support student safety, accountability, and program integrity. Coordinate vendors and
-
Research Engineering, Wharton Computing Job Profile Title Information Technology Technical Director Job Description Summary Wharton School Overview Founded in 1881 as the world’s first collegiate business
-
organizational, communication, and interpersonal skills. Position is contingent upon funding. Working Conditions Office, Library, Computer Room; Requires extensive safety Physical Effort Typically sitting at a
-
or limitation in Pennsylvania; DEA Licensure. 0-1 year of work experience of related experience in a specified medical field. Working Conditions Office, Library Computer Room; Requires extensive safety training
-
in support of their goals. Learn more about us by visiting https://www.isc.upenn.edu/about or www.linkedin.com/company/penn-information-systems-computing/. ISC’s HireIT Services team delivers best-in
-
several years. These requirements include the need to establish a Research Security Program including cybersecurity as well as increasingly stringent contractual requirements related to how research data
-
of Pennsylvania, FDA, and GCP regulations. As coordinators advance in experience, they may assume greater independence in managing studies, overseeing patient safety, communicating with sponsors, and mentoring
-
recommendations for adaptation of new technologies, procedures, or policies; investigate security incidents; perform computer forensics studies and maintain incident tracking records. Prepare status reports
-
the Commission’s findings. The Program Manager will be instrumental in maintaining relationships with grantors and securing new grant funding. The second project stream focuses on Penn IUR’s long-standing research
-
security, and HIPAA standards Developing standard procedures for file transfers and naming conventions Coordinating access to HIPAA-compliant computing resources Contributing to data acquisition for projects