2,512 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dip" "Dip" uni jobs at Duke University
Sort by
Refine Your Search
-
Listed
-
Field
-
-level administrative support to a department or group of professionals and leaders. Apply knowledge and skills to resolve complex administrative problems independently or with others. The Program
-
partner with campus stakeholders, community organizations, and national networks to foster empathy, equity, and unity. What You'll Do PROGRAM COORDINATION & ASSESSMENT (25%) • Oversee the planning
-
University Health System, and affiliated entities—helping ensure that Duke maintains a strong, transparent, and highly effective institutional compliance and privacy program. You’ll work closely with Directors
-
comprehensive and competitive medical and dental care programs, generous retirement benefits, and a wide array of family- friendly and cultural programs to eligible team members. Learn more at: https
-
for front of the house food production, housekeeping, sanitation, safety, security, cash control, PCI compliance, employee hygiene and uniforms in compliance with appropriate state laws, regulations and
-
opportunities to grow your expertise in accounting, financial systems, fixed asset management, and leadership. Learn more about Duke University’s competitive benefits package: https://hr.duke.edu/benefits
-
Duke Health is seeking a visionary Sustainability Program Planner to lead transformative initiatives that reduce environmental impact, boost resource efficiency, and embed sustainability into every
-
discover how we can advance health together. Duke Health Integrated Practice https://careers.dukehealth.org/us/en/dhip Duke Health Integrated Practice comprises more than 110 primary and specialty outpatient
-
or over‑capacity spaces and implementing solutions to maximize efficiency. Administer 25Live Pro, including security management, routine data updates, technical support, and training for room schedulers
-
, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new technology when required