Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
of development until the final prototype. Coordinate procurement and liaison with vendors/suppliers. Carry out Risk Assessment, and ensure compliance with Work, Safety and Health Regulations. Work independently
-
accreditations. The ISSO promotes the use of secure hardware and software within the systems affected by government and corporate approval standards. The ISSO works to ensure all required security policies and
-
work week. Must be authorized to work in the United States on a full-time basis for any employer without sponsorship. Join Liberal Arts Instructional Technology Services (https://liberalarts.utexas.edu
-
record and clinical information systems, manage clinical data, train and assist users on clinical platforms, maintain hardware. The annual salary for this position ranges from $59,400 to $76,000. The final
-
in methods, procedures, safety, techniques, equipment use, and tool use of the carpentry trade. Maintains inventory of all related equipment, hardware, and supplies. Records data for service history
-
-line support resource for students, faculty, and staff, assisting with a variety of basic technology-related issues. Responsibilities include troubleshooting hardware and software problems, providing
-
, including hardware interlocks Ability to work independently and collaboratively in multidisciplinary teams, including engineers, scientists, and technical staff. Knowledge is expected in the following areas
-
University of North Carolina at Chapel Hill | Chapel Hill, North Carolina | United States | about 10 hours ago
to UNC School of Medicine faculty, staff, and students for a variety of hardware, software, operating systems and networks. Principal duties require working knowledge, technical aptitude and analytical
-
and applications (e.g., Computer-Aided Dispatch (CAD), Report Management Systems (RMS)). Strong technical knowledge of software, hardware, and network security principles as they apply to confidential
-
network security, hardware and embedded system security, cryptography, privacy-preserving and trustworthy computing, AI-driven security and adversarial machine learning, security of cyber-physical and