1,883 computer-security "https:" "https:" "https:" "https:" "https:" positions at University of Utah
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
preventive maintenance, respond to service requests, and assist in maintaining compliance with applicable safety and building codes. Applicants must demonstrate the potential ability to perform the essential
-
maintenance, respond to service requests, and assist in maintaining compliance with applicable safety and building codes. Applicants must demonstrate the potential ability to perform the essential functions
-
Track Level M3 - Manager FLSA Code Computer Employee Patient Sensitive Job Code? No Standard Hours per Week 40 Full Time or Part Time? Full Time Shift Day Work Schedule Summary 40 hours/week, flexible
-
tumors diagnosed and/or treated within the organization. Codes, stages, and enters into the computer each case added to the tumor registry utilizing ICD-O, ICD-9/10, AJCC TNM (Tumor, Nodes, Metastasis
-
sensitive situations, and work with security personnel if needed. 4. Create and maintain files. 5. Schedule appointments and arranges for meetings. 6. Answer questions about the organization and associated
-
record of leadership, (2) history of innovative and successful investigation, (3) strong appreciation of a multifaceted range of health service research areas, and (4) commitment to program development
-
discriminate on the basis of sex in the education program or activity that it operates, as required by Title IX and 34 CFR part 106. The requirement not to discriminate in education programs or activities
-
, administration, or other areas relevant to Huntsman Cancer Institute’s mission and this position. Responsibilities Essential Functions Assesses protocol for clarity and subject safety, reviews inclusion/exclusion
-
, administration, or other areas relevant to Huntsman Cancer Institute’s mission and this position. Responsibilities Essential Functions Assesses protocol for clarity and subject safety, reviews inclusion/exclusion
-
the solicitation of donations from individuals, corporations, and foundations. This may include leading and coordinating efforts to solicit and secure gifts at all levels, including gifts of significant value and/or