Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Do you want to play a pivotal role in ensuring the effective management, security and compliance of hardware and software assets? Do you have knowledge of relevant regulations and industry
-
in door hardware and electronic access systems. May accept a combination of education and experience. Preferred Education/Experience Three (3) years of experience in the access/security systems
-
maintenance of computing devices. Supports the confidentiality, integrity, and availability of university information as part of the overall University Information Security Program. Analyze, record and track
-
electronic access components. This includes but is not limited to door hardware, automatic door operators, electronic locks, card readers, access control devices, and related security systems. The technician
-
device configuration and management, and the maintenance and troubleshooting of various hardware, software, and peripherals. The role requires knowledge of and proficiency in troubleshooting Windows, macOS
-
technology budget. Manage help desk staff and ensure proper resolution of daily technical issues. Monitor network capacity issues relating to planned area projects. Perform hardware/software needs analysis
-
networking and related protocols. An understanding of desktop/laptop security tools and applications. The ability to keep abreast of new technologies including computer software and hardware, smart phones, and
-
walk up counter, email, telephone. Ticketing system, or chat. Help customers set up their computer systems and mobile devices. Troubleshoot and resolve software and hardware problems related to desktop
-
software security. A particular focus of the position is low-level kernel development in embedded systems equipped with a CPU that does not integrate a memory management unit (noMMU scenarios
-
Oversee software licensing compliance and renewal processes Coordinate hardware purchasing and vendor management activities Develop and maintain documentation for all IT processes and systems 4. Security