Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
hiring processes for student and temporary roles, maintaining and analyzing HR and engagement data, and overseeing select Workday transactions to ensure operational excellence and compliance. The role also
-
coordinator and data support to ongoing cohort studies of pediatric acute leukemia. The coordinator will be expected to perform detailed, standardized chart abstractions, serve as resource for other staff
-
Intelligence Developer Job Profile Title Information Technology Project Leader Job Description Summary provide critical support and technical guidance to the Perelman School of Medicine in data analysis
-
knowledge and strategic planning skills. Oversee admissions processes, including inquiries, open houses, early consideration process, applicant files and aggregate data, admissions committees and target
-
include management and coordination of projects, recruiting participants, analyzing data and preparing presentations, developing research and IRB protocols, contacting health department officials
-
. Major duties include screen/enroll patients, conduct follow-up assessments, data collection and use of EDC systems, assessment of adverse events. This coordinator will assist in ensuring patient and data
-
as they directly relate to the requirements of the position, and in alignment with salary ranges based on external market data for the job’s level. Internal organization and peer data at Penn are also
-
, enrollment, data collection, and sample handling. Supports IRB submissions and helps prepare manuscripts, grant proposals, and presentations. Works closely with the Principal Investigator, manager, and study
-
based on external market data for the job’s level. Internal organization and peer data at Penn are also considered. Equal Opportunity Statement The University of Pennsylvania is an equal opportunity
-
which safeguard the integrity of and access to university systems. Manage security improvement projects; maintain knowledge of changing information security threats and technologies; provide