156 computer-security-"https:"-"https:"-"https:"-"https:"-"UCL" positions at Wayne State University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
regulatory and legal compliance and security documents and to develop and implement security measures for the protection of research. Computer Skills: High level of experience related to the development and
-
, complying with safety and security standards. Execute in vitro and in vivo experiments. Perform a variety of laboratory procedures and tasks. Maintain detailed, accurate records of all experiments performed
-
Research. It is expected that the successful candidate will conduct independent research including maintaining a strong record of accomplishments and the ability to secure external cancer-focused funding
-
Research. It is expected that the successful candidate will conduct independent research including maintaining a strong record of accomplishments and the ability to secure external cancer-focused funding
-
University‘s Elaine L. Jacob and Art Galleries. Oversee the installation and de-installation of exhibitions, ensuring proper handling, security, and preservation of objects. Collaborate with the Gallery and
-
either a public or technical service unit in the University Library System. Work activities necessitate familiarization with basic library methods and procedures and the ability to utilize on-line computer
-
to: Associate Director (Academic) The Infant Mental Health Program Coordinator is the main contact for the Infant Mental Health Dual-Title Degree Program at Merrill Palmer Skillman Institute. The coordinator
-
& Insurance Programs (ERM) will provide technical knowledge and subject matter expertise encompassing all aspects of the University’s workers compensation program. Key components of this position will be
-
and services program to include affinity partnerships, program contracting, marketing and promotion, revenue generation, and engagement reporting.15% Serve as building coordinator for the Tierney Alumni
-
or are expanding their capabilities in a second technology. They may also have specific assignments in areas such as performance tuning, security, disaster recovery, and the like to broaden their overall knowledge