Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
applying security controls to computer software and hardware. Hands-on experience with directory services (e.g., Active Directory, Lightweight Directory Access Protocol (LDAP)), Single Sign-On (SSO
-
of information technology, including computer hardware, server software, networking, end-user support, data security, and related IT infrastructure functions, with a primary focus on Linux-based systems and additional
-
assisted ISAC framework available at the TUM ACES Lab. ▪ Conducting real world experiments to analyze performance deviations between theoretical models, software simulations, and hardware behavior. ▪ Working
-
knowledge security. Please do not contact us for unsolicited services. Where to apply Website https://www.academictransfer.com/en/jobs/358915/three-motivated-senior-software… Requirements Additional
-
hardware and software support to campus users, which includes; troubleshooting, researching, analyzing and responding to a wide range of routine and complex issues or questions and requests for assistance
-
hardware/software support, programming, network design, network engineering, IT systems integration. • Proficiency in data analysis tools, Microsoft Excel, and financial management software (e.g., SAP
-
. Computer skills to retrieve workflow information, job assignments and material data entry; experience with MS Office; as well as ability to use computer hardware and software and firmware to operate, control
-
CapMetro buses with staff ID card For more details, please see: https://hr.utexas.edu/prospective/benefits and https://hr.utexas.edu/current/services/my-total-rewards . For more information on the
-
Please visit our Human Resources (HR) website at https://hr.utexas.edu/ to learn more about the total benefits offered when you join our team! Purpose To assist the security services shop with
-
, install, configure, trouble-shoot and provide maintenance of system hardware, software, and components. Ensure systems conform with IT security requirements. Interact with faculty to develop requirements