2,140 computer-security-"https:"-"https:"-"https:"-"https:"-"Keele-University" positions at Duke University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
normal and pathologic findings. Analyzes sonograms, synthesizes sonographic information and medical history, and communicates findings to the Radiologist. Assume responsibility for the safety, mental and
-
control, safety, and infection control procedures to maintain compliance with internal and external regulations. Receive and process specimens as required by respective laboratory area procedures and
-
patient identification through the maintenance of all clinical laboratory records, register/accession patients/specimens and perform order entry as required. Perform various quality control, safety, and
-
required. Perform various quality control, safety, and infection control procedures to maintain compliance with internal and external regulations. Receive and process specimens as required by respective
-
magnets. Work Performed Screen patients for MR safety pri orto procedure performance. Assist radiologist with procedure protocoling and performance. Start IV’s, administer contrast media as directed and p
-
committees. What you will need: Education: Level I -- Graduation from an accredited Medical Assistant program is strongly preferred. High school or GED graduation is required. Level II -- Graduation from a
-
: 7am - 5pm Monday - Friday What you will do: As a Clinical Nurse, you will deliver advanced and specialized care to patients, following the standards set by the Nursing Clinical Ladder Program. You’ll
-
the region, as well as serves as the home forthe Duke Caregiver Support Program. Team members work closely with a patient's physician to provide comprehensive, individualized care in the comfort of their home
-
described herein. Knowledge, Skills, and Abilities Knowledge of drug names, basic math, medical terminology, basic computer skills. Ability to compound medications and admix intravenous under the supervision
-
. Follows required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new