Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
to work weekend and off-hour work on occasion. Preferred Qualifications Knowledge of JAMF, SCCM, Bomgar, Code42 CrashPlan, Active Directory and drive encryption tools. Knowledge of an incident management
-
visit: https://ucnet.universityofcalifornia.edu/compensation-and-benefits/index.html Department Description University of California, San Francisco (UCSF) is distinguished as a leading academic healthcare
-
connections across various fields. For more details, visit: https://www.apctp.org JOB DESCRIPTION & ELIGIBILITY The Asia Pacific Center for Theoretical Physics (APCTP) invites applications for the Young
-
security policies, including patching, encryption, antivirus, and compliance. Managing the university's endpoint management platforms (e.g., Microsoft Intune/SCCM, Jamf). Overseeing the budget for endpoint
-
the EU Research Framework Programme? Not funded by a EU programme Is the Job related to staff position within a Research Infrastructure? No Offer Description Simula UiB (https://simula-uib.com ) is a
-
and identity governance activities. Implement data protection controls such as encryption, secure file-sharing aligned with data classification standards. Governance, Risk & Compliance Conduct security
-
electronically signed and encrypted data.) or to: TU Dresden, Chair of Spatial Information and Modelling, Prof. Marc Wolfram, Helmholtzstr. 10, 01069 Dresden, Germany. Please submit copies only, as your
-
electronically signed and encrypted data.) or to: TU Dresden, Chair of Spatial Information and Modelling, Prof. Marc Wolfram, Helmholtzstr. 10, 01069 Dresden, Germany. Please submit copies only, as your
-
of encrypted and non-encrypted channels when necessary. Monitors and/or controls all GMUPD assigned channels, regional interoperability channels, and PMARS. Follows equipment outage and notification procedures
-
: Shaping research directions and producing results in one or more of the following topics: Fully homomorphic encryption Public-key cryptanalysis Side-channel attacks and countermeasures Contributing