811 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "U.S" "St" positions at The University of Chicago
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
of Chicago’s Academic Recruitment job board, which uses Interfolio to accept applications: https://apply.interfolio.com/179782 . Applicants must upload a CV and cover letter. Review of applications ends when
-
that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: http://securityreport.uchicago.edu
-
, the University's Donor Relationship Management System. Proficient in Microsoft Windows computer environment, especially Microsoft Outlook, Word, Excel, PowerPoint and Access. Preferred Competencies Creative
-
tools available to Advancement, including Phoenix, the University's Donor Relationship Management System. Proficient in a Microsoft Windows computer environment, including Microsoft Outlook, Word, Excel
-
situations and information with absolute discretion. Previous Electronic Medical Record (EMR) experience. Experience with EPIC and Qgenda computer programs. Experience with handling a large volume of work
-
offices and programs that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: http
-
team, and program leadership, the Manager coordinates and executes all aspects of in-person and virtual events including lectures, seminars, symposia, and other community engagement events. Provides
-
and PowerPoint skills, financial computing, and database software applications, with an emphasis on their integration with financial platforms. Preferred Competencies Analytical Skills: Ability
-
offices and programs that provide safety support, crime and fire statistics, emergency response and communications plans, and other policies and information. The Report can be accessed online at: http
-
organizations. Protects patient and data confidentiality by ensuring security of research data and protected health information (PHI) and compliance with federal regulations and sponsor protocols. Ensures