Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Peninsula. Regular travel within this region will be required. Merit Network, a nonprofit leader providing advanced networking, cyber security, and connectivity to Michigan's research, education, and public
-
to live, learn and grow. Join us and contribute to our culture. Additional Information: Purdue’s benefits summary https://www.purdue.edu/hr/Benefits/ Purdue will not sponsor employment authorization
-
implementation assessments of NSLS-II programs including Quality Assurance, Conduct of Operations, Configuration Management, Cyber Security, LOTO, Accelerator Safety, etc. This includes developing assessment
-
Posting Summary Logo Posting Number STA00080PO26 Job Family Information Technology Job Function Cyber Security USC Market Title IT Security Engineer Link to USC Market Title https://uscjobs.sc.edu
-
interaction, communication, or psychology. Masters or Ph.D. in Human-Computer Interaction (HCI), Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology will be advantageous
-
, biodiversity monitoring, and climate resilience. The work supports strategic priorities in Environmental Sciences, Software/Cyber. PhD researchers will explore how AI-driven Earth observation, computer vision
-
RESPONSIBILITIES: 1.Collaborates with cybersecurity data security and awareness team members to triage, investigate, and resolve services tickets related to data security alerts, compromised accounts, security
-
of information technology and communication; Solid background and research experience in two or more of the following areas: AI techniques to secure networked computing infrastructures; Data science and statistical analysis
-
Information Security Analyst in order to monitor, detect, report, and remediate threats to the UCSF infrastructure, its assets, and its data. Responsible for detailed analysis of alerts and potential threats as
-
. Implements and maintains security protocols, conducts regular security assessments, ensures compliance with industry standards and regulations, and protects systems from cyber threats and vulnerabilities