Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. Ensure all integrations follow security, privacy, and compliance standards (e.g., secure data handling, encryption in transit and at rest). Observability, Monitoring & Logging Leverage centralized logging
-
applications. Perform database performance tuning and optimization, including query tuning and memory management. Enhance database security by implementing row-level security, data encryption, data redaction and
-
/LINUX, Windows and NT). LAN/WAN networking protocols such as: TCP/IP, routing, firewalls, IDS/IPS, PKI and encryption. Solid understanding of core cybersecurity concepts including network protocols
-
protocols and concepts such as HTTP requests/responses, APIs, DNS and addressing, as well as security technologies such as firewalls, certificates, and encryption; Authentication and single sign
-
Management Manage endpoint and server security technologies, including EDR solutions, encryption, and multi-factor authentication (MFA). Create, package, and deploy software in a Windows enterprise environment
-
Management Manage endpoint and server security technologies, including EDR solutions, encryption, and multi-factor authentication (MFA). Create, package, and deploy software in a Windows enterprise environment
-
Homomorphic Encryption. (3) AI for Science: Applications of Artificial Intelligence to basic sciences such as High Energy Physics, Cosmology, Statistical Physics, Materials Science, Chemical and Biological
-
project of a higher education institution, developed in association or cooperation with one or more R&D units.” (https://files.dre.pt/2s/2021/10/210000000/0013700149.pdf ). 4. Project Objectives: General
-
https://uscjobs.sc.edu/titles/198024 Job Level M2 - Managerial Business Title (Internal Title) Database Administrator Lead Campus Columbia Work County Richland College/Division Division
-
experience in the field of information security operations. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and