2,147 computational-physics-"https:"-"https:"-"https:"-"https:"-"L2CM" positions at Duke University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
or Resolute Hospital Billing Office Administration for SBO and SBO Admin certification through a formal Epic training program. Training will commence on the first available date with Epic for up to a period of
-
. For adults, services include internal and family medicine, annual physicals, preventive care, sick visits, immunizations, chronic illness management, women’s health care, and diagnostic tests like lab work and
-
to the transformation, development, and management of enterprise information technology solutions across Duke Health. By harnessing the power of innovative technologies like cloud computing and artificial intelligence
-
radioactive decay. Evaluate recorded images for technical quality. Process computerized image data to include function curves and reconstructed SPECT images. Assume care for physical and psychological needs
-
schedule or equipment issues in real time Strong communication skills for working with surgeons, anesthesia, nursing, and support services Experience with process improvement and data-driven decision making
-
*** DUHS Commitment Bonus Program $5000.00 (paid in 2 installments over 12 months - 6 month increments) *** * Only new hires who have not worked for Duke University in the past 12 months (at the time of
-
benefits and reimbursement guidelines, the discharge planning process and applicable federal, state and local regulations. Provide education and guidance on these topics to providers, patients and families
-
to the transformation, development, and management of enterprise information technology solutions across Duke Health. By harnessing the power of innovative technologies like cloud computing and artificial intelligence
-
Registered Nurse (RN) is responsible for providing and supervising direct and indirect total nursing care responsibilities. Utilizing the nursing process (assessing, planning, implementing and evaluating) in
-
. Follows required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security of physical and electronic data vulnerabilities. Learns and uses new