zd-pixel Contact Health eCareers | Health eCareers
About Us
Learn more about Health eCareers
The Leading Job Board for Healthcare Professionals

Contact Health eCareers

We’d love to hear from you! Use the email addresses below to ask a question, resolve an issue or simply let us know what you’re thinking.

Job Seekers

Having trouble using HealtheCareers.com? Having issues with your Health eCareers account? Something else? Email us at info@healthecareers.com

Have a question about a specific job? Please contact the employer listed in the job posting.

Employers

Looking to post jobs with Health eCareers? Want to know more about pricing? Have questions about a contract? Email us at info@healthecareers.com

Associations

Are you a healthcare association looking for a partner to provide additional career services for your members? Email us at partners@healthecareers.com

BILLING INQUIRIES

Email: AccountsReceivable@healthecareers.com
Phone: 888-884-8242, Option 4

Health eCareers General Contact

Address: 114 Fifth Avenue, 15th Floor, New York, NY 10011
Email: info@healthecareers.com
Phone: 888-884-8242
Hours of Business: Monday – Friday, 9am-6pm EST

Ziff Davis Responsible Vulnerability Disclosure Program

We are committed to maintaining the security of our systems and our customers’ information. We value those who take the time and effort to responsibly report security vulnerabilities according to the guidance here: https://bugcrowd.com/ziffdavis-vdp-pro.

If you believe you have found a security vulnerability relating to the Organization’s system or products please submit a vulnerability report via https://bugcrowd.com/ziffdavis-vdp-pro. Ziff Davis uses this platform to triage, validate and respond to responsibly disclosed vulnerability reports.

In your report please include the following details:

1.) The location of the vulnerability (or the endpoint or URL with the vulnerability), which may require the software product name, version, and platform or the website address where the vulnerability can be observed.

2.) A brief description of the type of vulnerability, for example; “XSS vulnerability on <domain name>”.

3.) Steps to reproduce the vulnerability. These should be a benign, non-destructive, proof of concept.