Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Austin's libraries and museums Free rides on all UT Shuttle and Capital metro buses with staff ID card For more details, please see: https://hr.utexas.edu/prospective/benefits and https://hr.utexas.edu
-
controls and encryption. Requirements: A master’s degree in Computer Science, Electrical/Computer Engineering, Biomedical Engineering, or related field with at least 4 years of relevant experience
-
and computer science and be fluent in oral and written English. Specific depth in mathematics, computer security or encryption is valuable but not a requirement. It is an advantage if you have previous
-
encryption, access management, and auditing Knowledge of enterprise application administration, including Student Information Systems such as Ellucian Banner and Degree Works Familiarity with compliance
-
applicants should have research experience in at least one of these or related areas: • Databases and computer security (distributed ledger technology, blockchain technology, data encryption) • Computer
-
principles, include encryption, authentication and access control methods. Working knowledge of web applications, including IIS and Apache. Familiarity with network and application monitoring tools, such as
-
security policies and control configurations (IAM, key management, encryption, logging/monitoring, network segmentation, backup/DR, workload isolation) mapped to HIPAA, NIST 800-53/171, CIS Benchmarks, and
-
practices, including antivirus, encryption, and vulnerability management. Experience monitoring and optimizing device health, login times, and user satisfaction metrics. Proven ability to work collaboratively
-
concepts, including intrusion detection/prevention, access controls, risk analysis, vulnerability scanning, and data encryption. -Ability to investigate Information Security events discretely. -Ability
-
), and maintain code repositories (Git); and Adhere to IRB/ethics and data protection requirements, implementing access controls and encryption. Requirements: A master’s degree in Computer