1,392 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"UCL" positions at University of Kentucky in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
/or pulling objects weighing up to or over 50 pounds; standing or walking with objects weighing up to 25 pounds; working in confined spaces; occasionally sitting at a computer workstation for extended
-
. Does this position have supervisory responsibilities? Yes Preferred Education/Experience Excellent computer and Excel management skills, data processing and analysis, sample analysis and use
-
entry and computer work, sitting for extended periods of time. Shift 15-25 hours per week depending on business needs between 7:30a-5pm Monday – Friday. Evening and Weekend work is rare but possible
-
thinking skills; basic computer navigation skills and working knowledge of the internet; ability to communicate in a professional and respectful manner with patients and their families, co-workers and
-
; basic computer navigation skills and working knowledge of the internet; ability to communicate in a professional and respectful manner with patients and their families, co-workers and physicians; and
-
Needs and the priority within Gordon’s Functional Health Patterns Frame Work as well as Swanson’s Caring model; superb direct patient care and critical thinking skills; basic computer navigation skills
-
direct patient care and critical thinking skills; basic computer navigation skills and working knowledge of the internet; ability to communicate in a professional and respectful manner with patients and
-
direct patient care and critical thinking skills; basic computer navigation skills and working knowledge of the internet; ability to communicate in a professional and respectful manner with patients and
-
- $24.50 Type of Position Staff Position Time Status On Call Required Education Must have completed at least 1.5 semesters of an accredited respiratory therapy program and be a current active student in
-
remote work may be considered as the virtual infrastructure becomes more fully established and contingent upon demonstrated reliability, consistency in performance, and the ability to meet program