Sort by
Refine Your Search
-
Listed
-
Category
-
Country
- United States
- United Kingdom
- Australia
- Sweden
- Netherlands
- Denmark
- Germany
- Norway
- France
- Portugal
- Belgium
- Spain
- Finland
- Luxembourg
- Canada
- Hong Kong
- Ireland
- Poland
- Singapore
- China
- Japan
- Italy
- Austria
- Morocco
- Czech
- Estonia
- New Zealand
- Cyprus
- Greece
- Latvia
- Switzerland
- Brazil
- Saudi Arabia
- Bangladesh
- Bulgaria
- Fiji
- Lithuania
- Romania
- United Arab Emirates
- 29 more »
- « less
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Biology
- Mathematics
- Science
- Materials Science
- Education
- Social Sciences
- Arts and Literature
- Psychology
- Electrical Engineering
- Humanities
- Law
- Chemistry
- Sports and Recreation
- Linguistics
- Environment
- Earth Sciences
- Philosophy
- Physics
- Design
- 14 more »
- « less
-
of university personnel and assets. This position will be expected to represent the university’s public safety team at campus events, meetings, and discussion groups. 2) Global Network Sites (20%) Travel several
-
of education, training and relevant experience. Familiarity with SIEM, EDR, email security gateways, vulnerability scanners, and basic network security concepts (firewalls, subnets, DNS, etc.). Working knowledge
-
Job Posting Title: Network Analyst ---- Hiring Department: Enterprise Technology - Infrastructure ---- Position Open To: All Applicants ---- Weekly Scheduled Hours: 40 ---- FLSA Status: To Be
-
This Employer https://main.hercjobs.org/jobs/22171332/patient-safety-specialist-f-t-days Return to Search Results
-
. Experience with network security systems is also preferred. Experience with the installation and testing of network cabling systems. Time Base: Full-time Pay Plan: 12/12 Work Schedule: Mon-Fri 8:00am-5:00pm
-
Communications and Networking, Springer, 6 (2022). https://doi.org/10.1186/s13638-021-02081-4 Abu-Tair, M., Zia, U., Memon, J., Scotney, B.W., Martínez Carracedo, J. & Sajjad, A. (Apr 2024). Transparent Encryption
-
Background/Motivation: Backdoor attacks are attacks on neural networks where a so-called trigger alters the decision-making behaviour of the networks, thereby creating vulnerabilities
-
& Responsibilities: Administer Microsoft Active Directory, Entra ID, and Group Policy Objects (GPOs) for identity management, authentication, and security policy enforcement. Maintain and optimize Citrix Virtual
-
highly qualified talent. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud
-
, network, and accessibility-related issues while ensuring compliance with security, privacy, and accessibility standards. Monitor lab usage, generate reports, and assist with planning technology upgrades