Sort by
Refine Your Search
-
, to preserve video confidentiality, we plan to study the encryption or obfuscation of variables in the latent space, after quantization but before the entropy coder. In this context, the PhD candidate will
-
implementing and maintaining endpoint security solutions. Assists in the management of endpoint protection, encryption, and compliance for university-managed Windows and macOS devices in accordance with
-
of concurrent players, Load balancing, auto-scaling, and server instance management. Expertise in securing a multiplayer game network system. Knowledge of encryption techniques to ensure data in transit remains
-
. Implements encryption, manage access controls, conduct security audits, and stay updated with security best practices to safeguard data integrity and privacy 10. Manages the storage structure within the data
-
efforts to remediate violations. Direct the implementation of security tools such as firewalls, encryption, and monitoring software. Recommend and implement IT security standards and best practices. Assist
-
total compensation, please visit: https://ucnet.universityofcalifornia.edu/compensation-and-benefits/index.html Department Description University of California, San Francisco (UCSF) is distinguished as a
-
Manager (ISSM) will plan, program, budget, implement, manage, and oversee circuit management, classified information systems, networking equipment, encryption equipment, Communications Security (COMSEC
-
point protection, encryption, and management technologies Experience leading technical staff and or technical projects. Experience leading effective meetings, and or troubleshooting work sessions
-
understanding of cloud-native security (e.g., AWS, Azure, GCP); Data protection techniques (e.g., encryption, tokenization); Operational technology (OT) and IoT security; Skills: Financial analysis of security
-
that all devices meet institutional security standards in regards to encryption, management, and protection prior to connecting them to the network. Answers end-user technology questions and provides general