2,501 computer-security "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" "UCL" "UCL" uni jobs at Duke University
Sort by
Refine Your Search
-
Listed
-
Field
-
economics or finance, preparing for graduate studies. Application should include a short cover letter, a current CV, and academic transcripts. Applicants should submit their materials electronically at https
-
discover how we can advance health together. Duke Health Integrated Practice https://careers.dukehealth.org/us/en/dhip Pursue your passion for caring with Duke Health Integrated Practice, which comprises
-
flourishes. To achieve of this exchange, it is essential that all members of the community feel secure and welcome, that the contributions of all individuals are respected, and that all voices are heard
-
Duke University, School of Law Program ID: Duke-Law-VAP2627 [#31241] Program Title: Visiting Assistant Professor Program Program Type: Non-regular rank faculty Location: Durham, North Carolina 27708
-
or program enhancements. Experience supporting ADA accommodations, FMLA interpretation, and conflict resolution. This role includes on‑call responsibilities on some weekends and holidays due to support for
-
Degree in Nursing, or Nursing Diploma Program Twelve months of appropriate clinical nursing experience is required in the area of expertise. Current American Health Association BLS American Heart
-
issues appropriately. May train or oversee others. Prepares and submits documents needed for regulatory and safety reporting to sponsors and other agencies. Data: Enters and collects data. Develops data
-
discover how we can advance health together. Duke Health Integrated Practice https://careers.dukehealth.org/us/en/dhip Duke Health Integrated Practice comprises more than 110 primary and specialty outpatient
-
, and a wide array of family-friendly and cultural programs to eligible team members. Learn more at: https://hr.duke.edu/benefits/ Equal Opportunity Employer: Duke is an Equal Opportunity Employer
-
required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new technology