Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Employer
- University of Tübingen
- Pennsylvania State University
- University of California Davis
- Central Michigan University
- George Mason University
- Monash University
- Nanyang Technological University
- Nature Careers
- Rutgers University
- University of California
- Columbus State University
- National University of Singapore
- Princeton University
- Stony Brook University
- University of British Columbia
- University of Louisville
- European Space Agency
- Fairleigh Dickinson University
- Illinois Institute of Technology
- KINGS COLLEGE LONDON
- Korea Institute for Advanced Study
- North Carolina State University
- Northeastern University
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- Singapore Institute of Technology
- The Ohio State University
- University of Alabama at Birmingham
- University of Central Florida
- University of Michigan
- University of Rhode Island
- University of Texas Rio Grande Valley
- University of Texas at Austin
- XIAN JIAOTONG LIVERPOOL UNIVERSITY (XJTLU)
- ;
- ; Swansea University
- ; University of Warwick
- ; Xi'an Jiaotong - Liverpool University
- Abertay University
- American University
- Arizona State University
- Auburn University
- Austin Community College District
- Blackhawk Technical College
- Bryant University
- Carnegie Mellon University
- Cedars Sinai Medical Center
- DAAD
- Drexel University
- Foothill-De Anza Community College District
- Fraunhofer-Gesellschaft
- Humboldt-Stiftung Foundation
- Idaho State University
- Johnson & Wales University
- King Abdullah University of Science and Technology
- King's College London
- Lamar University
- Manchester Metropolitan University
- Max Planck Institute for Chemical Energy Conversion, Mülheim an der Ruhr
- Medical Research Council
- National Research Council Canada
- SUNY University at Buffalo
- South Dakota Mines
- Southwest Tennessee Community College
- System Office
- Temple University
- Texas A&M AgriLife Extension
- The University of Chicago
- University of Arkansas
- University of California Davis Health System
- University of California Office of the President
- University of California, Los Angeles
- University of Dayton
- University of Delaware
- University of Houston Central Campus
- University of Luxembourg
- University of Minnesota
- University of New England
- University of New Mexico
- University of Newcastle
- University of North Carolina at Greensboro
- University of Oregon
- University of Oslo
- University of Phoenix
- University of Texas at Dallas
- University of Toronto
- University of Wisconsin-Madison
- Utah Valley University
- VIETNAMESE-GERMAN UNIVERSITY
- Xi'an Jiaotong-Liverpool University
- Yeshiva University
- 80 more »
- « less
-
Field
-
the security posture of the storage and backup infrastructure. The incumbent will ensure that all data is being securely stored with the appropriate levels of encryption. They will ensure geo-redundancy for all
-
Background The rise of quantum computers could break many existing encryption methods, making post-quantum cryptography (PQC) vital for future security. Digital signatures, which act like electronic
-
physical and logical disk management, data encryption, printer and other device drivers, peripheral connection technologies and devices that use USB, FireWire, serial, parallel, and SCSI, numerous email
-
-on experience in data encryption, access controls, and secure data transmission. Advanced technical writing skills, including report programming and development. Familiar with NIH data sharing policies, including
-
, integrating with Galaxy as well as solutions for secure and trusted exchange of encryption keys. This development is part of a collaboration in the ELIXIR context, which also in-cludes core European data
-
scientific equipment and biological materials, participating in international research collaborations, space-related research, international travel, and use of computer software with encryption features
-
specifications using best practices; and Good understanding of issue troubleshooting and performance tuning within Salesforce and related platforms. Preferred Qualifications: Understanding of encryption methods
-
access management (IAM), encryption, logging, and threat detection. Develop cost management strategies, optimizing cloud resources through automation and continuous monitoring. Establish cloud disaster
-
processes in a multi-server, heterogeneous environment Experience with client encryption and virus protection products Experience conducting hardware and software tests, analyzing test results, and producing
-
standard methodologies for secure storage, encryption, access control, anonymization, and secure file transfer. Help develop secure research workflows. Provide Technical Support & Training: From software