Sort by
Refine Your Search
-
continuity. Continue Implementation and support of our phone system, NICE in contact and assist in proper training of staff. Interprets NICE in Contact reporting data for purposes of optimization and makes
-
customers in order to meet or exceed expectations, address concerns, and optimize experience. Perform all on-site patient access registration related functions promptly without compromising patient safety
-
to secure and sustain extramural funding for a research program, including NIH RO1s, Program Projects, Center Grants, Cooperative Agreements and/or training grants. The performance of the Chief shall be
-
consistent standardized high-quality care is provided at all locations. Optimizes staffing models, patient throughput and satisfaction, and ensures efficient utilization of exam room resources. Implements new
-
lesson plans and curriculum design, training manuals, classroom exercises, competency assessment and testing, and online computer-based learning modules in support of employee roles and job functions that
-
. Records case history information for all audiology appointments once certification is received. Makes case-by-case decisions on clinic flow that prioritizes shortened wait times and optimal patient care
-
. Basic knowledge of Microsoft Office (e.g., Word, Excel, PowerPoint) required. Basic Life Support (BLS) certification required, must be from an American Heart Association (AHA) endorsed program (effective
-
engineering techniques, such as process designs, optimization models, forecasting methodologies, and chain management principles, to improve overall systems. Analyzes existing flow of people, activities, and
-
order to meet or exceed expectations, address concerns, and optimize experience. Perform all on-site patient access registration related functions promptly without compromising patient safety, quality
-
best practices to optimize incident response processes and enhance the organization’s security posture. The incumbent will also drive continuous improvement through incident analysis, threat hunting, and