Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Employer
- University of Tübingen
- Pennsylvania State University
- University of California Davis
- Central Michigan University
- George Mason University
- Monash University
- Nanyang Technological University
- Nature Careers
- Rutgers University
- University of California
- Columbus State University
- National University of Singapore
- Princeton University
- Stony Brook University
- University of British Columbia
- University of Louisville
- European Space Agency
- Fairleigh Dickinson University
- Illinois Institute of Technology
- KINGS COLLEGE LONDON
- Korea Institute for Advanced Study
- North Carolina State University
- Northeastern University
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- Singapore Institute of Technology
- The Ohio State University
- University of Alabama at Birmingham
- University of Central Florida
- University of Michigan
- University of Rhode Island
- University of Texas Rio Grande Valley
- University of Texas at Austin
- XIAN JIAOTONG LIVERPOOL UNIVERSITY (XJTLU)
- ;
- ; Swansea University
- ; University of Warwick
- ; Xi'an Jiaotong - Liverpool University
- Abertay University
- American University
- Arizona State University
- Auburn University
- Austin Community College District
- Blackhawk Technical College
- Bryant University
- Carnegie Mellon University
- Cedars Sinai Medical Center
- DAAD
- Drexel University
- Foothill-De Anza Community College District
- Fraunhofer-Gesellschaft
- Humboldt-Stiftung Foundation
- Idaho State University
- Johnson & Wales University
- King Abdullah University of Science and Technology
- King's College London
- Lamar University
- Manchester Metropolitan University
- Max Planck Institute for Chemical Energy Conversion, Mülheim an der Ruhr
- Medical Research Council
- National Research Council Canada
- SUNY University at Buffalo
- South Dakota Mines
- Southwest Tennessee Community College
- System Office
- Temple University
- Texas A&M AgriLife Extension
- The University of Chicago
- University of Arkansas
- University of California Davis Health System
- University of California Office of the President
- University of California, Los Angeles
- University of Dayton
- University of Delaware
- University of Houston Central Campus
- University of Luxembourg
- University of Minnesota
- University of New England
- University of New Mexico
- University of Newcastle
- University of North Carolina at Greensboro
- University of Oregon
- University of Oslo
- University of Phoenix
- University of Texas at Dallas
- University of Toronto
- University of Wisconsin-Madison
- Utah Valley University
- VIETNAMESE-GERMAN UNIVERSITY
- Xi'an Jiaotong-Liverpool University
- Yeshiva University
- 80 more »
- « less
-
Field
-
electronic information. The course includes necessary information on how to protect both personal and ASU information, back up files, maintain your operating system, respond to incidents, and encrypt laptops
-
, encryption, access control, and incident response. · Knowledge of healthcare data standards and high-performance computing applications. · Excellent communication, problem-solving, and
-
this is needed to develop backend messaging requirements for certain privacy libraries. Knowledge of basic cryptographic primitives such as encryption, digital signatures, and hash functions will be
-
, anti-malware, disk encryption, EDR, DNS security, patch management). 9. Demonstrated experience securing multiple operating systems (e.g., Mac, Windows, Linux and/or other Unix-like variants). 10
-
, anti-malware, disk encryption, EDR, DNS security, patch management). 9. Demonstrated experience securing multiple operating systems (e.g., Mac, Windows, Linux and/or other Unix-like variants). 10
-
standalone system networks. • Configuration Management: Assist with laptop and desktop computer system configuration management, including imaging, encrypting, and performing software and hardware updates
-
the security posture of the storage and backup infrastructure. The incumbent will ensure that all data is being securely stored with the appropriate levels of encryption. They will ensure geo-redundancy for all
-
. WSUS, YUM, SCCM Understanding of security concepts, best practices and how to apply them, such as Secure Shell, public key encryption, access credentials, certificates, TLS, and data encryption
-
. Proficiency in remote access security practices. Understanding of encryption and programming concepts related to security. Preferred Qualifications Experience with federal computing requirements and
-
remote access security practices. Understanding of encryption and programming concepts related to security. Preferred Qualifications Experience with federal computing requirements and implementation