786 computer-security "https:" "https:" "https:" "https:" "https:" "UCL" "UCL" positions at University of British Columbia
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
AI and Health Network Fellows Program. Under the supervision of Dr. Richard Lester, MD, FRCPC, the Postdoctoral Fellow will lead a research program titled: Advancing Patient-Centered AI: Validating NLP
-
to building security, ensures that doors and windows are properly secured. Attends to guest requests and their needs as appropriate. Carries out any other related duties and necessary in keeping with
-
completion of dental assistant program. Two years of relevant experience or the equivalent combination of education and experience. Preferred Qualifications Ability to maintain accuracy and attention
-
Staff - Non Union Job Category M&P - AAPS Job Profile AAPS Salaried - Information Systems and Technology, Level E Job Title Senior Business Analyst Department OCIO | Program Delivery | Project
-
services to the customers; while ensuring compliance to the project budget and schedule. Ensures that jobsite safety programs are in place and functional, and that workers under their jurisdiction work in a
-
the implementation of operational policies, safety standards, and research protocols. This position advises principal investigators on regulatory requirements as per federal, provincial, and University policies
-
judgement at all times. Computer experience required; MS Windows environment, Microsoft Office preferred. Experience working with a centralized fundraising system an asset. Ability to plan, co-ordinate and
-
) Actively promotes best practices in the security and privacy of personal information and data; makes recommendations to improve processes and procedures where necessary. 5) Performs other related duties as
-
Staff - Non Union Job Category M&P - AAPS Job Profile AAPS Salaried - Information Systems and Technology, Level E Job Title Senior Business Analyst Department OCIO | Program Delivery | Project
-
the project or seriously compromise the quality of the research. In addition, if established protocols related to privacy, confidentiality, and safety are not followed, confidentiality of participants sensitive