2,648 computer-security "https:" "https:" "https:" "https:" "https:" "Dr" "Robert Gordon University" uni jobs at Duke University
Sort by
Refine Your Search
-
Listed
-
Field
-
assist JLD’s Springboard Fellow with logistics of large-scale, student-collaborative programming such as the JFAM (Jewish First-Year Advisory Mentorship) program and the B’nai Mitzvah, including managing
-
specified thresholds. Support tracking of policy exception approvals. Manage financial system security access and escalate workflow concerns as needed. Financial Oversight – Strategic Finance Oversight (25
-
issues appropriately. May train or oversee others. Prepares and submits documents needed for regulatory and safety reporting to sponsors and other agencies. Data: Enters and collects data. Develops data
-
, and a wide array of family-friendly and cultural programs to eligible team members. Learn more at: https://hr.duke.edu/benefits/ Equal Opportunity Employer: Duke is an Equal Opportunity Employer
-
of employment. BLS certification Knowledge, Skills, and Abilities: Ability to use office related computer software. Possess knowledge of radiation protection and safety. General computer knowledge IV placement
-
above with or without reasonable accommodations. For more information, please visit https://hr.duke.edu/policies/ada/ Duke is an Equal Opportunity Employer committed to providing employment opportunity
-
radius of our downtown Durham office. If working a hybrid or remote schedule, individuals must have access to and maintain a secure home office environment with high-speed internet service and work
-
to eligible team members. Learn more at: https: //hr.duke.edu/benefits/ Essential Physical Job Functions: Certain jobs at Duke University and Duke University Health System may include essential job functions
-
Occupational Summary Plan, coordinate and participate in the establishment and operation of a specialized program and/or activity at Duke University, planning methods and developing systems in
-
required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new technology