1,377 computer-security-"https:"-"https:"-"https:"-"https:"-"https:"-"IFM"-"IFM" positions at University of Miami
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
network performance and provide network performance statistics and reports. 14. Participate in managing all network security solutions. 15. Handhold other in-house engineers to train them on wireless
-
Administration or Technician (RHIA or RHIT) Minimum 6 months of relevant experience Microsoft Office applications Electronic Health Records (EHR) system Computer proficiency Knowledge of medical terminology
-
level of productivity and demonstrates willingness to adjust personal schedule in case of crisis or real clinic need. Participates in quality and safety improvement activities. Orients, instructs, and
-
goals. CORE JOB FUNCTIONS 1. Serves as the program expert on online academic programs, assessment, and accreditation. 2. Helps implement strategic plan goals and objectives related to online academic
-
has been recognized by the Maternal Safety Foundation as an Accreta Center of Excellence and as VBAC Center of Excellence. Additional responsibilities: Inpatient L&D at Jackson Holtz Women’s
-
of Surgical Oncology and the Department of Surgery: Oversees outcomes, quality, and patient experience for the program Coordinates and provide scheduling services for physicians to ensure coverage to perform
-
to apply for a faculty or staff position, please review this tip sheet . The Department of Medicine, Cardiovascular Division is searching for a Postdoctoral Associate, Computational Simulations Engineer
-
for fire and general safety, waste disposal, dress code, and patient information. 4. Reports areas in need of special cleaning or repairs to appropriate supervisor. 5. Assists in the maintenance of equipment
-
Diagnostic Medical Sonography and/or Vascular accredited program Certification and Licensing: Vascular Ultrasound Certification RVT (Registered Vascular Tech) by ARDMS RVS (Registered Vascular Sonographer) by
-
to select sites, configuring and monitoring crawls, performing quality control checks, and creating descriptive metadata. Recommend and implement digital forensics tools to support secure capture, evaluation