Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
efforts to remediate violations. Direct the implementation of security tools such as firewalls, encryption, and monitoring software. Recommend and implement IT security standards and best practices. Assist
-
data security practices, including anonymization, encryption, and GDPR compliance. Background in immersive technologies such as VR/AR development using Unity Game Engine. Where to apply E-mail info
-
point protection, encryption, and management technologies Experience leading technical staff and or technical projects. Experience leading effective meetings, and or troubleshooting work sessions
-
the EU Research Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description Simula UiB (https://simula-uib.com ) is a
-
to work weekend and off-hour work on occasion. Preferred Qualifications Knowledge of JAMF, SCCM, Bomgar, Code42 CrashPlan, Active Directory and drive encryption tools. Knowledge of an incident management
-
understanding of cloud-native security (e.g., AWS, Azure, GCP); Data protection techniques (e.g., encryption, tokenization); Operational technology (OT) and IoT security; Skills: Financial analysis of security
-
Manager (ISSM) will plan, program, budget, implement, manage, and oversee circuit management, classified information systems, networking equipment, encryption equipment, Communications Security (COMSEC
-
connections across various fields. For more details, visit: https://www.apctp.org JOB DESCRIPTION & ELIGIBILITY The Asia Pacific Center for Theoretical Physics (APCTP) invites applications for the Young
-
University of California, San Francisco | San Francisco, California | United States | about 2 months ago
visit: https://ucnet.universityofcalifornia.edu/compensation-and-benefits/index.html Department Description University of California, San Francisco (UCSF) is distinguished as a leading academic healthcare
-
policies and security standards. Implement measures such as access controls, encryption, and data masking to safeguard sensitive information. Create and maintain documentation for custom tasks, procedures