1,091 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" uni jobs at Rutgers University
Sort by
Refine Your Search
-
Listed
-
Field
-
on the financial impact of strategic planning and new business and program development for the institute. Designs, implements, and oversees a variety of financial business models with external partners. Oversees
-
seeking a Health Care Case Manager (Registered Nurse) for the Essex South office for the Child Health Program within the School of Nursing. The Heath Care Case Manager (HCCM) functions to support the
-
seeking a Health Care Case Manager for the Camden South office for the Child Health Program within the School of Nursing. The Heath Care Case Manager (HCCM) functions to support the Department of Children
-
implementation of appropriate budget control, business planning and program/practice development strategies across both campuses. Monitors clinical in-patient and out-patient care and volume to enhance the quality
-
Position Details Position Information Recruitment/Posting Title Seasonal Agricultural Worker - Cooperative Extension Fruit IPM Program Posting Number 26TM0064 Department Pest Management Overview
-
Rutgers School of Health Professions (SHP) is seeking a Graduate Assistant to work in the Department of Psychiatric Rehabilitation & Counseling Professions. Working under the supervision of the Program
-
for course-related instructional technology, including Canvas-based course organization and management. • Lead and support the use of secure computer-based assessment platforms (e.g., ExamSoft
-
computer program to replace the DNA Sequence Analysis Program (DSAP) that is used by participants in the Waksman Student Scholars Program (WSSP). DSAP is an on-line program used by high school students in the WSSP
-
of the program. Among the key duties of this position are the following: Takes the lead on program marketing, recruitment and clinical placements of students. Researches and drafts program-specific
-
computing, and endpoint management technologies. Knowledge of cybersecurity best practices, including identity management, data protection, and secure configuration standards. Equipment Utilized Position