Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Privacy Research Management: 40% The RPM will coordinate research activities and lead study partner relations for multiple projects that involve the development and deployment of PETs in data-intensive LMIC
-
updates to address system changes, including new encryption algorithms, authorization protocols, data packet configurations, and additional user groups. Maintains and upgrades software and hardware
-
, encryption, port-scanning, IDS/IPS); Basic level of proficiency with configuring, hardening, and assessing Windows desktop and server platforms. Knowledge of implementing and supporting enterprise applications
-
. Security & Compliance: Collaborate with security teams to ensure all systems adhere to organizational policies and industry regulations regarding data protection, encryption, vulnerability management, and
-
responsible for management, maintenance and monitoring server related hardware for multiple, systems, servers including virtual environments. Must have excellent oral and written communication skills to inform
-
and/or destruction. Document, prioritize and analyze security threats, incidents, and key metrics. Responsible for security services and tools such as endpoint protection, encryption, firewall
-
training the next generation of space scientists. Today, our Mission Operations Team plays a central role in operating multiple NASA science spacecraft and we’re preparing for our most ambitious era yet. By
-
of cybersecurity controls including malware protection, firewalls, intrusion detection systems, content filtering, Internet proxies, encryption controls, and log management solutions Hands-on experience with
-
Description The Security Engineer analyzes threat information from multiple sources, disciplines, and agencies across the intelligence community; synthesizes and places intelligence information in context
-
rules to minimize false positives and accelerate remediation. Oversees the design and operational management of secure VPN infrastructures, ensuring alignment with industry-standard encryption and access