2,168 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"https:" positions at Duke University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
patient identification through the maintenance of all clinical laboratory records, register/accession patients/specimens and perform order entry as required. Perform various quality control, safety, and
-
required. Perform various quality control, safety, and infection control procedures to maintain compliance with internal and external regulations. Receive and process specimens as required by respective
-
the delivery of nursing care functioning as an integral member of the multidisciplinary team • Establishes collaborative relationships within and across departments that promote patient safety, culturally
-
Abilities N/A Level Characteristics N/A Minimum Qualifications Education Work requires completion of an accredited Nurse Practitioner program, with a Master's degree in Nursing. Experience None required above
-
. BLS, ACLS, PALS, and/or NRP Instructor level certification is preferred. Knowledge, Skills, and Abilities Basic Computer Skills in Microsoft office. Knowledge of Audiovisual equipment set up
-
role. Strong problem-solving skills and ability to manage complex situations. Excellent written and verbal communication skills. Basic computer proficiency. Minimum Qualifications Education Experience
-
. The Duke University Health System offers career advancement through a clinical ladder program. Duties and Responsibilities of this Level Level I Duties and responsibilities may include providing nutrition
-
the region, as well as serves as the home forthe Duke Caregiver Support Program. Team members work closely with a patient's physician to provide comprehensive, individualized care in the comfort of their home
-
described herein. Knowledge, Skills, and Abilities Knowledge of drug names, basic math, medical terminology, basic computer skills. Ability to compound medications and admix intravenous under the supervision
-
. Follows required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new