629 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"https:" positions at University of Alabama at Birmingham
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
to develop and refine research protocols. Your role may also include mentoring junior staff and ensuring compliance with safety and regulatory standards. Depending on the research focus, this position may
-
with safety drills, emergency response protocols, and supports onsite staff during unexpected situations (e.g., inclement weather, mechanical failure). 10. Supports flow of operations by setting up
-
, coordinates routine operations at department facilities. Maintains facility and equipment serviceability and coordinates building configuration for all events. Ensures facility security and clean up
-
to instrument manufacturer, safety and quality control protocols. - Documents appropriately. - Utilizes laboratory information systems effectively to determine status of specimens. - Receives and prepare
-
supports sanitation procedures when needed (e.g., disinfecting high-touch areas in the entry/exit of vehicle). 9. Assists with safety drills, emergency response protocols, and supports onsite staff during
-
research initiatives with a high level of autonomy. This professional-level position entails developing innovative research methodologies, securing external funding, and influencing the strategic direction
-
presented by senior management and applicable governing agencies. You'll also maintain clear documentation and champion data integrity and security. Oracle Grant experience is preferred. Experience creating
-
and supplies in and around university departments, and performs laboratory housekeeping duties. This entry level position is the first year of the two year apprenticeship program. The program provides
-
and supplies in and around university departments, and performs laboratory housekeeping duties. This entry level position is the first year of the two year apprenticeship program. The program provides
-
an environment of heightened security following Information Technology Security Policies and participating in security training, such as Health Insurance Portability & Accountability Act (HIPAA) and Family