2,645 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dip" "Dip" uni jobs at Duke University
Sort by
Refine Your Search
-
Listed
-
Field
-
ELIGIBILITY REQUIREMENTS: Graduate of an accredited Surgical Technology program or maintains an accredited Surgical Technologist certification (NCCT or NBSTSA). Or, provides evidence of the successful
-
department. Plan and provide advanced and/or specialized nursing care for patients in guided by DUHS Professional Practice model participate in the clinical ladder program, educational activities, departmental
-
. Job Eligibility Requirements Education NP: Graduate of an accredited MSN or DNP Acute Care Nurse Practitioner Program for Adult Critical Care. PA: Graduate of an ARC-accredited Master's
-
limited to unit and hospital policies and procedures, regulatory standards, and patient safety goals. Assume responsibility for self and ensures that the policies, procedures and safety practices
-
nursing staff to communication systems. Perform other related duties incidental to the work described herein. What you will need: Education Completion of a Level I - Nurse Aide education program approved by
-
validation on hire as well as annual competency validation. Required Qualifications at this Level Education Completion of Level I Nurse Aide education program approved by the North Carolina Board of Nursing
-
physicians. Adherence to standards including but not limited to unit and hospital policies and procedures, regulatory standards, and patient safety goals. Assume responsibility for self and ensures
-
/reactions to mobilization and documents in medical record as appropriate. Basic computer skills, ability to learn and use DUHS computer system programs. Understand oxygen procedures in transport of patients
-
Qualifications at this Level Education Work requires graduation from an accredited BSN program. Exception: Registered nurses hired between July 1, 2014 and April 11, 2021 without a Bachelor's degree in Nursing
-
for quality assurance. Runs summaries and reports on existing data. Follows required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security