Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
experimental systems designed for the high-throughput synthesis and characterization of advanced materials. This includes hardware design, system control, and data acquisition. https://www.li-lab-cat-design.com
-
information on crimes statistics, crime prevention, law enforcement, crime reporting, and other related issues for the past three (3) calendar years. The FIU Annual Security report is available online at: https
-
the university?s financial condition. About the Position: The primary purpose of the Access Control and IT Technician is to provide maintenance to the university?s CCTV equipment and access control hardware
-
About the Opportunity This postdoctoral position offers an opportunity to conduct leading-edge research in embedded security with applications to healthcare and medical device cybersecurity
-
policy enforcement. Troubleshoot and resolve operational, performance, and security-related issues across HPC hardware and software stacks. Coordinate with hardware and software vendors to address defects
-
to apply for all positions that best match your profile and interests. DETAILS for the FIELD SUPPORT TECHNICIAN This position provides hardware, networking and audio visual field support for residential
-
demonstrated experience administering security controls and standards (NIST, CIS, ISO, PCI) configurations hardware, software, and networks. Experience with fully automating CI/CD pipelines end-to-end, from code
-
Without Attitude, Students Always, Beyond Yourself. Join us in moving business and society forward. For more information about the Haas School of Business visit: https://haas.berkeley.edu/about/ The Haas
-
research in the disciplines of Artificial Intelligence, Computational Biology, Databases, Graphics, Hardware / Architecture, Human-Computer Interaction, Operating Systems / Networking, Programming Systems
-
applying security controls to computer software and hardware. Hands-on experience with directory services (e.g., Active Directory, Lightweight Directory Access Protocol (LDAP)), Single Sign-On (SSO