1,236 computer-security "https:" "https:" "https:" "https:" "https:" "https:" positions at University of Utah in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
experience preferred, but all applicants are encouraged to apply. · Moderate to advanced computer skills. Proficiency with Microsoft Word, Excel, and Outlook is strongly preferred. · Familiarity with Microsoft
-
manage, store, and disseminate information, ensuring security and compliance of information. Assist in planning department activities, manage meeting calendars, and make travel arrangements. Track expenses
-
Investigators in achieving study objectives by implementing and completing study protocols and procedures. Review protocols for clarity and subject safety, addressing concerns with the PI and sponsor. Participate
-
Investigators in achieving study objectives by implementing and completing study protocols and procedures. Review protocols for clarity and subject safety, addressing concerns with the PI and sponsor. Participate
-
, administration, or other areas relevant to Huntsman Cancer Institute’s mission and this position. Responsibilities Essential Functions Assesses protocol for clarity and subject safety, reviews inclusion/exclusion
-
manage, store, and disseminate information, ensuring security and compliance of information. Assist in planning department activities, manage meeting calendars, and make travel arrangements. Track expenses
-
Investigators in achieving study objectives by implementing and completing study protocols and procedures. Review protocols for clarity and subject safety, addressing concerns with the PI and sponsor. Participate
-
Investigators in achieving study objectives by implementing and completing study protocols and procedures. Review protocols for clarity and subject safety, addressing concerns with the PI and sponsor. Participate
-
inception and help shape its direction and culture. We develop computational tools and approaches to study the most challenging and rapidly evolving regions of the human genome—segmental duplications. Using
-
areas of information technology, such as computer hardware, server software, networking, telecommunications, computer support, database analysis, data security, and other areas of the overall IT platform