1,205 computer-security "https:" "https:" "https:" "https:" "https:" "https:" positions at Rutgers University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
practitioner who provides lead functions for the program, to include screening of intakes and referrals, care coordination, ensuring completion of program specific documentation and/or comprehensive assessment
-
operations, which encompasses an expansive range of comprehensive service and business operations across the State of New Jersey. These include planning and construction, facilities, public safety and
-
interpersonal communication, analytical, computer and organization skills. Capacity to work as part of a team and provide exemplary customer service. Capacity to perform in a high-pressured, confidential office
-
or translational research or quality improvement and academic program building in areas of interest, preferably related to liver diseases. Pursue leadership activities in medical societies and associations
-
lecturing students and residents, and supervision of the resident clinic 6. Participate in the administrative activities of the Department 7. Participate in the clinical neuromuscular research program 8
-
research program 8. Participate in the General Neurology clinic at RWJ and satellite clinics as needed 9. Participate in the teaching mission of RWJMS to the extent determined in consultation with
-
Position Details Position Information Recruitment/Posting Title Sr. Program Coordinator Job Category URA-AFT Administrative Department One Stop Student Services Cent Overview The Division
-
tails for genotyping via PCR and agarose gel electrophoresis. Collects and analyzes data. Prepares and/or compiles data for special reports and analyses, monthly reports, program evaluations, and other
-
an Operations/Technical Coordinator – Women’s Volleyball. Among the key duties of the position are the following: Provides technical and operational support for the Women’s Volleyball program. Works under
-
of virtualization, cloud computing, and endpoint management technologies. Knowledge of cybersecurity best practices, including identity management, data protection, and secure configuration standards. Equipment