Sort by
Refine Your Search
-
Listed
-
Category
-
Field
-
initial triage and validation of security alerts to identify potential incidents. Conduct deep analysis of events using multiple data sources (e.g., SIEM logs, endpoint telemetry, network traffic). Lead
-
detection and response (EDR) solutions, Network IDS/IPS technologies, and Firewall administration and enterprise log analysis. Previous senior technical expertise during complex incident response activities
-
Facilities The Opportunity: UCF IT is seeking an IT Project Manager III to lead and manage complex, high-visibility technology initiatives from initiation through delivery and closure. This role will oversee
-
tailored for operations research problems. This role focuses on making significant contributions to understanding optimization and simulation models, particularly in scheduling, routing, and network flow
-
and security platforms, network issues, and various testing hardware and peripherals, including but not limited to PCs, displays, headsets, cameras, palm vein scanners, microphones, satellite clocks
-
and practices. About the UCF Libraries The UCF Libraries enhance student success and faculty excellence through a dynamic network of libraries and information professionals. Serving the UCF community
-
Programs student and alumni related events (networking events, graduation celebrations and annual holiday party) including event logistics, catering, invitations, guest lists, hosting, etc. Provide event
-
documentation of automation processes, including design, installation, and maintenance records. Monitor BAS network reliability using tools such as Optigo Networks and Wireshark; resolve any issues promptly
-
-network resources, etc.) and obtaining necessary CEUs. Reimbursement Research: Research newly released or requested CPT codes and their reimbursement potential for SHS in-network plans. Other Duties
-
future pipelines, utilizing advanced sourcing tools (e.g., LinkedIn Recruiter, specialized job boards, academic databases) and creative outreach techniques. Develop and maintain a robust network of passive