Sort by
Refine Your Search
-
security policies, including patching, encryption, antivirus, and compliance. Managing the university's endpoint management platforms (e.g., Microsoft Intune/SCCM, Jamf). Overseeing the budget for endpoint
-
containing the public key you need to send an encrypted e-mail to that address is available at https://www.uni-erfurt.de/universitaet/arbeiten-an-der-universitaet/stellenausschreibungen . If you choose not
-
Communications and Networking, Springer, 6 (2022). https://doi.org/10.1186/s13638-021-02081-4 Abu-Tair, M., Zia, U., Memon, J., Scotney, B.W., Martínez Carracedo, J. & Sajjad, A. (Apr 2024). Transparent Encryption
-
and identity governance activities. Implement data protection controls such as encryption, secure file-sharing aligned with data classification standards. Governance, Risk & Compliance Conduct security
-
electronically signed and encrypted data.) or to: TU Dresden, Chair of Spatial Information and Modelling, Prof. Marc Wolfram, Helmholtzstr. 10, 01069 Dresden, Germany. Please submit copies only, as your
-
connections across various fields. For more details, visit: https://www.apctp.org . Position Overview The APCTP Assistant Professor position is designed to enhance the in-house research capacity of the Center
-
electronically signed and encrypted data.) or to: TU Dresden, Chair of Spatial Information and Modelling, Prof. Marc Wolfram, Helmholtzstr. 10, 01069 Dresden, Germany. Please submit copies only, as your
-
applications. Perform database performance tuning and optimization, including query tuning and memory management. Enhance database security by implementing row-level security, data encryption, data redaction and
-
of encrypted and non-encrypted channels when necessary. Monitors and/or controls all GMUPD assigned channels, regional interoperability channels, and PMARS. Follows equipment outage and notification procedures
-
. Understanding of HTTP, HTTPS, IPV4, POE, DNS, DHCP, WINS, and TCP/IP 7. Ability to work independently with minimal supervision as well as in a team environment 8. Ability to follow escalation procedure within IT