Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
, and wireless telephone/data service for University use. MU Extension specialists receive reimbursement for approved travel expenses, per University of Missouri policy. MU Extension programs often occur
-
as needed for investigations and inquiries pertaining to infrastructure security and privacy. The Network Security Engineer assists with wireless networking designs and implementations. Areas
-
7,000 students from 2 locations: Ho Chi Minh City and Hanoi. All libraries are networked for wireless. They provide flexible spaces for individual and group study, computer equipped group study rooms and
-
in CUNY's Classified Civil Service. The full specification is available on our web site at http://www.cuny.edu/about/administration/offices/hr/classified-civil-service/ccsjobs/ CONTRACT TITLE IT
-
be qualified for this position, you should have ▪ Excellent master’s degree in Electrical Engineering, Communications Engineering, or a related field ▪ Strong knowledge in wireless communication
-
, cameras, wireless access points, AV equipment, IOT, and Building Automation Systems. Excellent communication, collaboration, and leadership skills for working with internal teams and external contractors
-
. Provides general maintenance of equipment, ensuring that it is in optimal working condition. Provides event A/V support for journalism school events, which includes operating wireless microphones, PTZ
-
speakers, mixing consoles, wireless and wired microphones, audio recorders, signal flow Video: HD and SD Video Systems video switching systems, projection lens to screen throw ratios, signal flow Computers
-
, encryption, endpoint protection, education and awareness, firewalls, IDS/IPS, incident response, malware disassembly, mobile device security, NAC, secure code review, secure remote access, secure wireless
-
systems (incl. cyber physical systems, IoT, mobile healthcare systems and wireless computing systems) Cybersecurity governance Cryptogaphy, incuding post-quantum cryptography You must be responsible