Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
intelligence to optimize security controls and tool configurations. Ensure secure handling of API keys, authentication tokens, and encryption practices. Implement and manage Identity and Access Controls across
-
(Annual Rate). To learn more about the benefits of working at UCSF, including total compensation, please visit: https://ucnet.universityofcalifornia.edu/compensation-and-benefits/index.html Department
-
restore, endpoint protection, and several native and centrally managed encryption solutions required. A valid driver's license. You Can: Explain tech clearly and listen with empathy. Deliver patient
-
, compliance, encryption, and access-control best practices across systems and workflows. Collaborate with scientific researchers to understand their app needs and design effective support systems and processes
-
, integrity, and availability of institutional data. Implement and maintain data security protocols, access controls, encryption, and auditing mechanisms to protect sensitive data and maintain compliance with
-
the Director of Field Operations to support field data capture (mobile tools, encrypted devices, remote uploads). • Collaborate with IIRER staff to support data systems that facilitate research and evaluation
-
possible. Please note that this grant funded currently supported through May 2027, could be extended based on availability of funds. Familiarity with Outlook, Word, Excel, and working with encrypted shared
-
management, and data encryption standards. Coordinate with Global IT team to develop a schedule for key activities and reviews. Document configurations, incidents, and changes per ITSM processes. Maintain IT
-
, flat files, connectors and adapters. Work with cross-functional teams to deliver the integration in a secure manner, including data encryption at rest and in transit. Design, develop, document, and
-
requirements in model serving Implement encryption and key management for model artifacts and sensitive data Set up secure access controls using cloud-native security services (e.g., KMS, Cloud KMS, Key Vault