Search Results: 218 vacancies
...innovation. And were here for talented individuals who are passionate about using their skills to drive positive change.
Mind Detect provides exceptional recruitment services to businesses who are leading the way in Data Machine Learning and AIdriven technologies...
Team-oriented consulting firm is seeking a Wetlands Scientist for their Pittsburgh, Pennsylvania team! This position is eligible for a flexible hybrid schedule.
Responsibilities:
Lead environmental field surveys, including wetland/stream delineations, endangered ...
...:
• Diagnose and treat radiological conditions using X-ray, MRI, CT scans, and other imaging technologies.
• Analyze images to detect abnormalities or diseases.
• Develop treatment plans for patients and maintain accurate medical records.
• Monitor patient progress...
...candidate will be expected to diagnose complicated problems quickly and accurately; perform installation duties; inspect drainage systems; detect malfunctions; replace worn/faulty parts on pipes, fixtures or other plumbing equipment; repair/install water heaters; perform...
...in Abu-Dhabi. The successful candidate will be responsible for providing quality gynecological care to our patients, including the detection, diagnosis, and treatment of gynecological conditions. The ideal candidate must have excellent communication and interpersonal...
...interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...
...maintenance history of equipments.
Troubleshooting, operating and managing office systems, such as security system, fire alarm and leak detections systems, meeting scheduling system, audio visual (AV) system, building management system, way finding system, safety inductions...
...to ensure a safe environment.
• Monitor security systems such as surveillance cameras, alarms, access control systems, etc., to detect any threats or breaches in security.
• Investigate any incidents or violations of company policies.
• Handle emergency situations...
...interacting with (for example, to limit the number of times a video or an article is presented to you). Ensure security, prevent and detect fraud, and fix errors Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...
...interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...
...MIDP and CDE protocol.
Prepare BIM package submissions in accordance with project standards and requirements
Conduct clash detection and visual walkthroughs
Prepare models and reports for constructability analysis
Coordinate work with the lead technical engineer...
...interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...
...network devices, servers, and applications, using Splunk or other security information and event management (SIEM) tools. - Incident Detection and Triage: Identify and investigate potential security incidents based on the analysis of log data, network traffic, and other...
...SH&E processes, identifying and eliminating/controlling any hazards to persons and property.
Audits and Inspects the job site to detect and correct safety hazards.
Supervises first aid personnel in providing first aid care of occupationally injured or ill...
...to create maps or other documents.
- Operate sophisticated survey equipment including GPS systems; total stations; levels; light detection and ranging (LIDAR); sonar; remote sensing instruments; robotic systems; etc.
- Analyze survey data using computer applications...
...interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...
...and implementing OT Cybersecurity applications and technologies such as risk assessments, antivirus software, firewalls, intrusion detection systems, centralized alert logging and monitoring in ICS environments (energy companies or large manufacturing organizations)....
...interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...
...interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...
...interacting with (for example, to limit the number of times a video or an article is presented to you).
Ensure security, prevent and detect fraud, and fix errors
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example,...