- Texas A&M University System (College Station, TX)
- …procedures. Manage and account for assigned agency credit cards, agency vehicle log books, activity time reports and any assigned agency-owned equipment in ... accordance with applicable laws, rules, policies, procedures and guidelines. -This is a security-sensitive position. The individual in this position is required to handle Protected Health Information (PHI) as defined by HIPAA regulations. The individual is… more
- Cummins Inc. (Dallas, TX)
- …of Transportation (DOT) driving regulations including Hours of Service and Electronic Log Booking Device use -Federal law requires operators of commercial vehicles ... to be 21 years of age or older, applicant must be 21 years of age **Job** Service **Organization** Cummins Inc. **Role Category** Hybrid **Job Type** Technician **Min Salary** $28 **Max Salary** $39 **ReqID** 2417738 **Relocation Package** Yes **Cummins and… more
- HCA Healthcare (San Antonio, TX)
- …charges into Meditech; performing database and operating system backup; error log review; Hemodynamic Monitoring system data field modification; and proper storage ... of archived exam/study data. 7. Performs high level disinfection using established policies and procedures as required. _Additional Job Functions:_ 1. Takes "Call" as scheduled by the department Director or designee. 2. Assists the Cardiology PACS… more
- Ryder System (Austin, TX)
- …a current employee at Ryder, please click here (http://wd5.myworkday.com/ryder/d/task/1422$3.htmld) to log in to Workday to apply using the internal application ... process. _Job Seekers can review the Job Applicant Privacy Policy by clicking here (http://ryder.com/job-applicant-privacy-policy) ._ \#wd more
- Truist (Fort Worth, TX)
- …communications. If you already have a profile with us, you can log in to check status.** Need Help? (https://www.brainshark.com/bbandt/careers-site-faq) _If you have ... a disability and need assistance with the application, you can request a reasonable accommodation. Send an email to Accessibility (###@truist.com?subject=Accommodation%20request)_ _(accommodation requests only; other inquiries won't receive a response)._… more
- VCA Animal Hospitals (Coppell, TX)
- …are a current associate, you will need to apply through our internal career site. Please log into Workday and click on the Jobs Hub app or search for Browse Jobs.** ... Benefits: We offer competitive compensation along with a comprehensive benefits package, including medical, dental, vision and paid vacation/sick days, 401(k), generous employee pet discounts and more! The information in this position description indicates the… more
- Acxiom (Austin, TX)
- …Internal applicants need to apply for open positions through their Workday account. Please log into Workday and use the **Find Jobs** report to search for and apply ... for positions posted internally. For questions, please contact the recruiter listed on the job posting. Attention California Applicants: Please see our CCPA/CPRA Privacy Act notice here… more
- SOS International LLC (El Paso, TX)
- …to tasks. Such duties may include but are not limited to placing log sheets, line sheets, duplicating tapes and/or summaries into binders, copying and stapling ... related paperwork, and labeling storage boxes. Attend minimization briefings conducted by the US Attorney's Office and our client. Understand and comply with Court regulations concerning minimization procedures. Testify in court as "Fact Witness" if required… more
- Catholic Health Initiatives (Lake Jackson, TX)
- …logs in accordance with unit polices and as evidenced by random audits of log books. + Admits and discharges patients out of telemetry system in accordance with ... unit policy. + Troubleshoots and maintains equipment and supplies. Completes assigned duties in a timely manner **Qualifications** + High school diploma or GED required + 1 to 3 months related experience and Basic EKG interpretation required + BLS… more
- Huntington Ingalls Industries (San Antonio, TX)
- …of Defense Industrial Network (DODIN). + Monitors and analyzes security systems, log data, network traffic, and alerts generated by various security technologies in ... real-time, incorporating Zero Trust principles to validate access and identify security incidents. + Escalates and explains validated security incidents to customers, ensuring alignment with Risk Management Framework (RMF) and Cyber Security Framework (CSF)… more