Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
transformation projects, working closely with IT Security, Networks, Windows Server team, Cloud team and Storage to ensure systems are fit for purpose, and meet strategic and user requirements. You will champion
-
) with plenty of cultural and leisure activities. INTERESTED? How to apply You should apply via https://jobs.idlab.ugent.be/en/ph-d-hardware-aware-control-algorithms-for-robot-reflexes For more information
-
incidents and requests using established ticketing procedures, maintain strong follow‑up practices, assist in training clients on the use of hardware and software, and ensure the privacy and security of all
-
Location ESTEC, Noordwijk, Netherlands Our team and mission The Research Fellow in Planetary Protection will work in close cooperation with other staff of the Independent Safety Office in
-
, and cloud services Knowledge of Microsoft Office Suite, Adobe Suite, G suite, Dropbox and other software used across campus Install and configure complex audio-visual and IT hardware in supported spaces
-
computer related field. Knowledge of operating system installation, security, and configuration. Knowledge of application installation and end user provisioning and security, LDAP concepts, SAN concepts
-
Poison Control Full Time 88415BR Job Summary Applies professional business / technical support concepts to resolve hardware, software and networking issues of moderate scope and complexity for a
-
Job Description Job Description The IT Technician/Service Desk Technician (Job Profile: Computer Support Technician 2) provides comprehensive hardware and software support to end-users and functions
-
Enterprise Linux, or other UNIX/Linux environments, ensuring stability, security, and integration with enterprise applications. Demonstrated knowledge of IT infrastructure hardware, including hands
-
of hardware, software, and other resources, all relevant to cybersecurity and privacy research, connected by user-configurable network substrate, and protected by a set of security policies uniquely aligned