1,933 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"U.S"-"St" positions at Duke University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Take electrocardiograms Remove sutures/ staples Change sterile and non-sterile dressings Required Qualifications at this Level Education Level I -- Graduation from accredited Medical Assistant program
-
care and selection of nursing priorities. Assist in the development and implementation of general policies and procedures to provide for the emotional and physical comfort and safety of patients
-
systems, social sciences, epidemiology or other health-related fields. Demonstrated proficiency through previous developed analytical codes with R Language for Statistical Computing and/or Python The ideal
-
. Update the billing system to reflect the insurance status of the patient. Refer patients to the Manufacturer Drug program as needed for medications. Greet and provides assistance to visitors and patients
-
receiving services at a reduced benefit level. Update the billing system to reflect the insurance status of the patient. Refer patients to the Manufacturer Drug program as needed for medications. Greet and
-
. -Develop the pastoral component in interdisciplinary teams in assigned areas. Level II: Inclusive of Level I Duties and Responsibilities -Develop a program of outreach to community clergy and religious
-
of experience who are exceptional performers may be eligible for this level. CN Is are eligible for promotion to CN II by meeting criteria set forth by the DUHS Vizient Nurse Residency Program within 12 months
-
or healthcare. Experience Level I Completion of the patient transport safety training program with 30 days of hire. Level II Completion of Transport Safety Training program - Two years experience as a Clinical
-
- 4:30pm, 8:30am - 5:00pm or 9:00am - 5:30pm *** DUHS Commitment Bonus Program $5000.00 (paid in 2 installments over 12 months - 6 month increments) *** * Only new hires who have not worked for Duke
-
for quality assurance. Runs summaries and reports on existing data. Follows required processes, policies, and systems to ensure data security and provenance. In addition, recognizes and reports security