Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
applying security controls to computer software and hardware. Demonstrated skill at administering complex security controls and configurations to computer hardware, software and networks. Knowledge
-
integrations, business intelligence policies and procedures, software and hardware modifications, complex data projects, and other projects to enhance the ISR team’s capabilities and maintain best practices
-
About us The University of Luxembourg is an international research university with a distinctly multilingual and interdisciplinary character. The Interdisciplinary Centre for Security, Reliability
-
to critical infrastructure as defined in Section 117.001(2) of the Texas Business and Commerce Code, the ability to maintain the security or integrity of the critical infrastructure is a minimum qualification
-
to develop efficiently, this requires competencies in optical and quantum physics, experience in development of experimental control hardware, and perseverance and ingenuity. The positions are part of
-
; computer software/hardware; presentation software; microscopes. Physical Demands and Work Environment PHYSICAL DEMANDS: Standing, sitting, walking, talking, and hearing. No special vision requirements
-
Posting Summary Logo Posting Number STA00160PO26 Job Family Information Technology Job Function Help Desk USC Market Title IT Help Desk Technician Link to USC Market Title https://uscjobs.sc.edu
-
-clinical networks. The work will directly impact patient safety and digital resilience in some of the most vulnerable healthcare settings. If successful, your engineering will revolutionize the healthcare
-
., are currently subject to negotiation with the appropriate union. To learn more about the benefits of working at UCSF, including total compensation, please visit: https://ucnet.universityofcalifornia.edu
-
penetration testing (ethical hacking) Formal methods for security Human-centered cybersecurity Privacy and privacy enhancing technologies Security engineering Hardware security Security in pervasive computing