Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
platforms. Preferred Qualifications: Salesforce Certified Platform Developer II, Salesforce Certified OmniStudio Developer, Salesforce Certified Marketing Cloud Developer; Understanding of encryption methods
-
best practices, including implementing access controls, data encryption, and secure coding practices within the platform. Skill in designing intuitive and user-friendly forms, dashboards, and portals
-
advanced encryption methods. Identify, develop, and implement complex systems for the detection and identification of malicious activity both on-premises and in multiple cloud environments. Track and monitor
-
. Responsibilities may include, but are not limited to: endpoint security, full-disk encryption, multi-factor authentication, security incident and event management (SIEM), SSL and client certificate management
-
security, vulnerability management platforms. Strong technical knowledge in network security, firewalls, intrusion detection, encryption, authentication, and incident response A track record of delivering
-
encryption, access management, and auditing Knowledge of enterprise application administration, including Student Information Systems such as Ellucian Banner and Degree Works Familiarity with compliance
-
security policies and control configurations (IAM, key management, encryption, logging/monitoring, network segmentation, backup/DR, workload isolation) mapped to HIPAA, NIST 800-53/171, CIS Benchmarks, and
-
Austin's libraries and museums Free rides on all UT Shuttle and Capital metro buses with staff ID card For more details, please see: https://hr.utexas.edu/prospective/benefits and https://hr.utexas.edu
-
forms and encrypted technologies) on these questions are especially encouraged to apply, as are scholars who approach these questions from global perspectives. Faculty have access to pre- and post-award
-
maintenance Familiarity with computer security practices, including role-based access control (RBAC), firewalls, data encryption, and backup and recovery processes Ability to ensure data confidentiality and