Duration :: 5 Months Contract
Top 3 Skills Needed or Required
What project or initiative will they be working on?
Job Description
What are the day-to-day responsibilities?
About US Tech Solutions:
US Tech Solutions is a global staff augmentation firm providing a wide range of talent on-demand and total workforce solutions. To know more about US Tech Solutions, please visit
US Tech Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Recruiter Details:
Recruiter name: Ajeet Kumar
Recruiter’s email id : ajeetk@ustechsolutionsinc.com
JobDiva ID :: JobDiva # # 25-54361
...your neighborhood. You dont have to travel far to find your next great opportunity! You belong here! We are looking for a Medical Assistant (CMA) to provide high quality care to patients at our patients in the Greater Washington Region. The Medical Assistant...
...Role: Customer Service Representative Location: Avenue Chicago Illinois 60631 Onsite Pay... ...about product, pricing and availability Work with internal departments to meet... ...organize, and prioritize work experience in a contact center environment preferred....
...Regional Health is a leading medical center located in Central Florida... ...in healthcare. As the only Level 2 Trauma center for Polk, Highlands... ...to join our team in various entry-level positions. Whether you'... ...Under the direction of the Coding and Clinical Documentation Improvement...
...hospital as needed Required Qualifications: Minimum of 2 years of CVICU experience, including post-operative cardiac care Active RN license or pending license with application submitted to the state board BLS and PALS certifications required; NRP preferred...
...Description POSITION SUMMARY The Cyber Security Intern will gain hands-on experience in protecting organizational systems, networks, and data from cyber threats. This role provides exposure to various aspects of information security including threat detection, vulnerability...