2,063 information-security-"https:"-"https:"-"https:"-"https:"-"U.S" positions at Duke University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
ideas—an exchange that is best when the rich diversity of our perspectives, backgrounds, and experiences flourishes. To achieve this exchange, it is essential that all members of the community feel secure
-
flourishes. To achieve this exchange, it is essential that all members of the community feel secure and welcome, that the contributions of all individuals are respected, and that all voices are heard. All
-
this exchange, it is essential that all members of the community feel secure and welcome, that the contributions of all individuals are respected, and that all voices are heard. All members of our community have
-
normal and pathologic findings. Analyzes sonograms, synthesizes sonographic information and medical history, and communicates findings to the Radiologist. Assume responsibility for the safety, mental and
-
with computer systems and electronic documentation Ability to meet physical requirements, including prolonged standing and walking Working knowledge of infection control, safety protocols, and regulatory
-
physical layout of the hospital. Working knowledge of infection control procedures and safety precautions. Ability to withstand prolonged standing and walking. This position is very active and requires
-
perspectives, backgrounds, and experiences flourishes. To achieve this exchange, it is essential that all members of the community feel secure and welcome, that the contributions of all individuals are respected
-
is best when the rich diversity of our perspectives, backgrounds, and experiences flourishes. To achieve this exchange, it is essential that all members of the community feel secure and welcome
-
the rich diversity of our perspectives, backgrounds, and experiences flourishes. To achieve this exchange, it is essential that all members of the community feel secure and welcome, that the contributions
-
procedures. Recognizes and reports security of physical and electronic data vulnerabilities. May develop or review research data security plans (RDSPs) for multiple study protocols. Maps a protocols data flow