494 algorithm-development-"Prof"-"Prof" uni jobs at University of Southern California
Sort by
Refine Your Search
-
Listed
-
Field
-
, Cyber Risk Management develops, implements, and supports cybersecurity risk management plans, as well as governance and remediation strategies. Plays a crucial role in establishing that the university's
-
that is personalized, compassionate and innovative. The department of Family Medicine is leading the growth and development of primary care services at Keck Medicine of USC and is committed to providing
-
application of new technological developments in patient care. Performs complex and varied administrative and clinical assignments. Serves as a personal contact for physicians, staff, and outside departments in
-
algorithm for communication with discharged patients. Under the direction and supervision of the Transitional Care Coordinator, communicates frequently and directly with clinic physician staff and other post
-
are available within defined TAT guidelines. Communicates and interacts effectively with co-workers, guests of the Institution and hospital clinical staff. Maintains professional growth and development
-
are available within defined TAT guidelines. Communicates and interacts effectively with co-workers, guests of the Institution and hospital clinical staff. Maintains professional growth and development
-
The Director, EHR Programming and Administration is responsible for leading the strategic planning, development, and management of the Point and Click Electronic Health Record (EHR) system within
-
Documentation § Identifies and participates in data collection and process improvements related to Nurse Sensitive Quality Indicators PROFESSIONAL DEVELOPMENT Participates in professional hospital/nursing
-
. The Manager, Cyber Engineering oversees the design, implementation and maintenance of the university's security infrastructure and related tools. Manages a team of cybersecurity engineers, developing and
-
manages comprehensive training programs to educate staff about potential cyber threats, best practices for digital hygiene and the importance of following established security policies. Manages