Sort by
Refine Your Search
-
Listed
-
Country
- United States
- United Kingdom
- Australia
- Sweden
- China
- Denmark
- Germany
- Japan
- Netherlands
- Spain
- France
- Singapore
- Canada
- Hong Kong
- Belgium
- Ireland
- Poland
- Finland
- Austria
- Luxembourg
- Norway
- Portugal
- Switzerland
- Estonia
- New Zealand
- Cyprus
- Italy
- United Arab Emirates
- Czech
- Greece
- Morocco
- Romania
- Croatia
- Fiji
- Latvia
- Turkey
- 26 more »
- « less
-
Field
- Medical Sciences
- Computer Science
- Economics
- Engineering
- Business
- Mathematics
- Materials Science
- Biology
- Education
- Science
- Social Sciences
- Psychology
- Arts and Literature
- Law
- Electrical Engineering
- Humanities
- Sports and Recreation
- Chemistry
- Environment
- Linguistics
- Earth Sciences
- Design
- Philosophy
- Physics
- 14 more »
- « less
-
plans for the university’s safety and security construct. Lead the creation of network-wide safety and emergency programs, policies, and training initiatives to ensure compliance with evolving regulatory
-
, walk-ins, voicemail) regarding, but not limited to: network connectivity, PC, mac, printer and mobile hardware support, application support, audio visual requests, ad hoc requests, account creation and
-
qualified talents. We look for researchers from diverse academic backgrounds to contribute to our projects in areas such as: Trustworthy AI, secure and reliable systems, cloud computing, cryptography, network
-
to ensure proper operation of all components of the systems are functional (including door contacts, request to exit devices, readers, the actual lock, power supplies, encoders, network connections, and
-
, e.g., by nationality (British Citizen) or 5+ years UK residency etc. Eligibility criteria and further information on the process can be found on the UK Government security vetting website, see https
-
infrastructure including active directory, voice, networking, and information security. Experience managing infrastructure operations organizations required; experience leading cloud systems engineers and software
-
three (3) calendar years. The FIU Annual Security report is available online at: https://police.fiu.edu/download/annual-security-fire-safety-report/ . To obtain a paper copy of the report, please visit
-
maintains records of campus crime statistics and security policies. Copies of Wesleyan University’s Clery Act Report are available on request and online at https://www.wesleyan.edu/publicsafety/clery.html
-
, including LAN, WAN, wireless, and remote access. Establishes and enforces network policies, standards, procedures, and best practices for performance, security, and compliance. Oversees network monitoring
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and