165 computer-security-"https:"-"https:"-"https:"-"https:"-"Bath-Spa-University" positions at Case Western Reserve University
Sort by
Refine Your Search
-
secure media attention and aligned with the associate vice president's strategic media approach. Build faculty expert contact lists, including cell numbers for time-sensitive media requests. (15%) Develop
-
in the laboratory. Produce accurate and complete donor and biospecimen records; these records are printed by hand onto authorization forms and entered into various secure databases. Entering
-
by hand onto authorization forms and entered into various secure databases. Enter information daily into a bioscpecimen management software program (LabMatrix). Manage the printing and de-identifying
-
gifts departments in the identification, cultivation, and solicitation of donors by providing assistance in identifying and evaluating prospects, arranging and securing appointments, requesting research
-
to optimize workflow efficiency. By ensuring data integrity, system functionality, and accurate transmission of laboratory results, this position plays a vital role in supporting the Surveillance Program
-
stock). Support the associate dean in identification, cultivation, and solicitation of donors by providing assistance in identifying and evaluating prospects, arranging, and securing appointments
-
of animal health, chemical safety, microbiological and physical hazards associated with the workplace, and handling of animal waste materials. Education/Licensing: High school education required. The employee
-
. The nature and frequency of cleaning is performed according to Custodial Services' Quality Control Program. ESSENTIAL FUNCTIONS 1. According to the assigned schedule: Clean spaces daily, empty wastebaskets and
-
related safety equipment and procedures. Training to be provided. Must be able to read technical drawings. Basic computer skills; must be willing to learn Work Management System software to record work
-
Office and computer room environment. This position has the potential to access secure and sensitive personal information. May require working off hours to appropriately evaluate all conditions. The