Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. The overall goal is to contribute to improved security, resilience, and situational awareness in critical infrastructure systems. For more information and how to apply: https://www.jobbnorge.no/en/available
-
prevent cyber threats to Mason's business enterprise including network sensors, firewalls, endpoint protection, anti-virus, and security information and event management tools; Lead the Computer Security
-
in modeling and analysis of cyber-physical systems At the Technical Faculty of IT and Design, Department of Computer Science, a full-time postdoc position in modeling and analysis of cyber-physical
-
-sharing platforms. This candidate will work with the ACO Cyber team to ensure information security is built into and maintained for systems deployed in and by the laboratory's ACO Group. In this position
-
California State University, San Bernardino | San Bernardino, California | United States | about 19 hours ago
management, public financial management and cyber security. We also offer a dual MSW-MPA degree and participate in the curriculum of the BA in Administration. The Jack H. Brown College of Business and Public
-
testing and analysis. For further information, you may refer to https://www.uni.lu/snt-en/research-groups/svv The position holder will be required to perform the following tasks: Carrying out research in
-
Research Excellence in Cyber-Physical Infrastructure Systems (MECIS), and the University Transportation Center for Railway Safety (UTCRS). For further information regarding the College, please visit our
-
overall cyber defense posture. Classification Title: Information Security Professional III Responsibilities: Monitor SIEM, EDR, IDS/IPS, firewalls, and other security tools for alerts and anomalies. Perform
-
managing SSL/TLS certificates, encryption, and secure communications Working knowledge of DNS, HTTP/S, LDAP, NTP, SSH, SMTP, SNMP, and related infrastructure protocols Experience with virtualized
-
, cyber-security and information technology. Substitutions allowed for Education: When a candidate has the required experience, but lacks the required education, they may normally apply additional relevant