...ith the study site.Perform Source Data Review (SDR), Source Data Verification (SDV) and review Case Report Forms (CRFs).Document monitoring visits and submitting reports on time.Handle and distribute ...
...ith the study site.Perform Source Data Review (SDR), Source Data Verification (SDV) and review Case Report Forms (CRFs).Document monitoring visits and submitting reports on time.Handle and distribute ...
...IT-Security Administrator stellen Sie die Sicherheit und Integrität der von uns betreuten Umgebung inkl. Planung und Weiterentwicklung der Sicherheitssysteme sicher. Sie konfigurieren, überwachen und ...
...ith the study site.Perform Source Data Review (SDR), Source Data Verification (SDV) and review Case Report Forms (CRFs).Document monitoring visits and submitting reports on time.Handle and distribute ...
...ith the study site.Perform Source Data Review (SDR), Source Data Verification (SDV) and review Case Report Forms (CRFs).Document monitoring visits and submitting reports on time.Handle and distribute ...
...IT-Security Administrator stellen Sie die Sicherheit und Integrität der von uns betreuten Umgebung inkl. Planung und Weiterentwicklung der Sicherheitssysteme sicher. Sie konfigurieren, überwachen und ...
...ith our education services, we turn school IT into enterprise IT. From IT infrastructure to cloud services, identity management, hardware and software through to IT support, administration and trainin...
...IT and Medical Technology division (G6.4) THE UNIVERSITY HOSPITAL MAGDEBURG The Faculty of Medicine is an integral part of Otto von Guericke University Magdeburg and cooperates with the University Hos...
...ity experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite c...
...ity experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite c...
...ith common attack scenarios within cloud computing environments and has used a security framework, such as MITRE ATT&CK, to define and analyze security incidents.Amazon is an equal opportunities emplo...
...ities. Additionally, you assist in selecting optimal software architecture solutions (best of breed / best in class) and lead the IT Architecture Board (ITAB) as the authoritative body for architectur...
...ity experts, operations managers, and other vital roles. You’ll collaborate with people across AWS to help us deliver the highest standards for safety and security while providing seemingly infinite c...
...ith our education services, we turn school IT into enterprise IT. From IT infrastructure to cloud services, identity management, hardware and software through to IT support, administration and trainin...
...IT and Medical Technology division (G6.4) THE UNIVERSITY HOSPITAL MAGDEBURG The Faculty of Medicine is an integral part of Otto von Guericke University Magdeburg and cooperates with the University Hos...