629 computer-security-"https:"-"https:"-"https:"-"https:"-"https:" positions at University of Alabama at Birmingham
Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
established standards and ensure delivery of high-quality patient care. Health Informatics, Medical Records, and others to ensure patient documentation is complete, accurate, and follows all privacy/security
-
by Title IX, UAB prohibits sex discrimination in any education program or activity that it operates. Individuals may report concerns or questions to UAB's Assistant Vice President and Senior Title IX
-
/sustainability for assigned area. • Maintains physical security system, conducts facility walk-throughs and provides facility management during emergencies. • Facilitates and coordinates with action items
-
utilizing effective computer skills to compile data and prepare reports; ensure accuracy of data/ and perform routine to complex calculations Supervises and/or perform equipment maintenance, operations and
-
department supervisor to maintain a mix of philanthropic event and program sponsorships, as well as broadcast and digital sponsorships. This includes any necessary collaboration across departments to develop
-
and hardware products. To support Web access and electronic messaging services and maintains a secure systems environment. To provide new hardware specifications to users based on application needs and
-
, project management and energy management/sustainability for assigned area. - Maintains physical security system, conducts facility walk-throughs and provides facility management during emergencies
-
leader role demands exceptional expertise and visionary thinking, with responsibilities including securing major funding, influencing research policy, and driving innovation. You will lead large
-
maintaining existing and developing new database-driven web applications. Provides support for the analysis, design, estimates, development, documentation, testing and implementation of new computer programs
-
used to maintain safety. Uses required processes, policies, and systems to ensure data security and provenance. Recognizes and reports vulnerabilities related to the security of physical and electronic