Sort by
Refine Your Search
-
Listed
-
Country
- United States
- United Kingdom
- Australia
- Sweden
- China
- Denmark
- Germany
- Japan
- Netherlands
- Spain
- France
- Singapore
- Canada
- Hong Kong
- Belgium
- Ireland
- Poland
- Finland
- Austria
- Luxembourg
- Norway
- Portugal
- Switzerland
- Estonia
- New Zealand
- Cyprus
- Italy
- United Arab Emirates
- Czech
- Greece
- Morocco
- Romania
- Croatia
- Fiji
- Latvia
- Turkey
- 26 more »
- « less
-
Field
- Medical Sciences
- Computer Science
- Economics
- Engineering
- Business
- Mathematics
- Materials Science
- Biology
- Education
- Science
- Social Sciences
- Psychology
- Arts and Literature
- Law
- Electrical Engineering
- Humanities
- Sports and Recreation
- Environment
- Chemistry
- Linguistics
- Earth Sciences
- Design
- Philosophy
- Physics
- 14 more »
- « less
-
, e.g., by nationality (British Citizen) or 5+ years UK residency etc. Eligibility criteria and further information on the process can be found on the UK Government security vetting website, see https
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
three (3) calendar years. The FIU Annual Security report is available online at: https://police.fiu.edu/download/annual-security-fire-safety-report/ . To obtain a paper copy of the report, please visit
-
maintains records of campus crime statistics and security policies. Copies of Wesleyan University’s Clery Act Report are available on request and online at https://www.wesleyan.edu/publicsafety/clery.html
-
infrastructure including active directory, voice, networking, and information security. Experience managing infrastructure operations organizations required; experience leading cloud systems engineers and software
-
, including LAN, WAN, wireless, and remote access. Establishes and enforces network policies, standards, procedures, and best practices for performance, security, and compliance. Oversees network monitoring
-
facility that provides both clinical and research services. The incumbent assists with patient and research participant intake, vital signs and health screenings, MRI safety screening, rooming, and post
-
Peninsula. Regular travel within this region will be required. Merit Network, a nonprofit leader providing advanced networking, cyber security, and connectivity to Michigan's research, education, and public
-
to enforcement proceedings, contributing to increased transparency, security, and efficiency of public services. Where to apply E-mail resurse.umane@upb.ro Requirements Research
-
of hardware, software, and other resources, all relevant to cybersecurity and privacy research, connected by user-configurable network substrate, and protected by a set of security policies uniquely aligned