Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. To learn more about the benefits of working at UCSF, including total compensation, please visit: https://ucnet.universityofcalifornia.edu/compensation-and-benefits/index.html Department Description
-
of encrypted and non-encrypted channels when necessary. Monitors and/or controls all GMUPD assigned channels, regional interoperability channels, and PMARS. Follows equipment outage and notification procedures
-
corrective procedures to restore them to operational standards. Works with DoIT and IT Security to decrypt, backup and restore user encrypted data while maintaining data loss prevention principles. Research
-
controls and encryption. Requirements: A master’s degree in Computer Science, Electrical/Computer Engineering, Biomedical Engineering, or related field with at least 4 years of relevant experience
-
Austin's libraries and museums Free rides on all UT Shuttle and Capital metro buses with staff ID card For more details, please see: https://hr.utexas.edu/prospective/benefits and https://hr.utexas.edu
-
and computer science and be fluent in oral and written English. Specific depth in mathematics, computer security or encryption is valuable but not a requirement. It is an advantage if you have previous
-
encryption, access management, and auditing Knowledge of enterprise application administration, including Student Information Systems such as Ellucian Banner and Degree Works Familiarity with compliance
-
applicants should have research experience in at least one of these or related areas: • Databases and computer security (distributed ledger technology, blockchain technology, data encryption) • Computer
-
principles, include encryption, authentication and access control methods. Working knowledge of web applications, including IIS and Apache. Familiarity with network and application monitoring tools, such as
-
security policies and control configurations (IAM, key management, encryption, logging/monitoring, network segmentation, backup/DR, workload isolation) mapped to HIPAA, NIST 800-53/171, CIS Benchmarks, and