Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Employer
- University of Tübingen
- Pennsylvania State University
- University of California Davis
- Central Michigan University
- George Mason University
- Monash University
- Nanyang Technological University
- Nature Careers
- Rutgers University
- University of California
- Columbus State University
- National University of Singapore
- Princeton University
- Stony Brook University
- University of British Columbia
- University of Louisville
- European Space Agency
- Fairleigh Dickinson University
- Illinois Institute of Technology
- KINGS COLLEGE LONDON
- Korea Institute for Advanced Study
- North Carolina State University
- Northeastern University
- Singapore Institute of Technology
- The Ohio State University
- University of Alabama at Birmingham
- University of Central Florida
- University of Rhode Island
- University of Texas Rio Grande Valley
- University of Texas at Austin
- XIAN JIAOTONG LIVERPOOL UNIVERSITY (XJTLU)
- ;
- ; Swansea University
- ; University of Warwick
- ; Xi'an Jiaotong - Liverpool University
- Abertay University
- American University
- Arizona State University
- Austin Community College District
- Blackhawk Technical College
- Bryant University
- Carnegie Mellon University
- Cedars Sinai Medical Center
- DAAD
- Drexel University
- Foothill-De Anza Community College District
- Fraunhofer-Gesellschaft
- Humboldt-Stiftung Foundation
- Idaho State University
- Johnson & Wales University
- King Abdullah University of Science and Technology
- King's College London
- Lamar University
- Manchester Metropolitan University
- Max Planck Institute for Chemical Energy Conversion, Mülheim an der Ruhr
- Medical Research Council
- National Research Council Canada
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- SUNY University at Buffalo
- Southwest Tennessee Community College
- System Office
- Temple University
- Texas A&M AgriLife Extension
- The University of Chicago
- University of Arkansas
- University of California Davis Health System
- University of California Office of the President
- University of California, Los Angeles
- University of Dayton
- University of Delaware
- University of Houston Central Campus
- University of Luxembourg
- University of Michigan
- University of Minnesota
- University of New England
- University of New Mexico
- University of Newcastle
- University of North Carolina at Greensboro
- University of Oregon
- University of Oslo
- University of Phoenix
- University of Texas at Dallas
- University of Toronto
- University of Wisconsin Madison
- University of Wisconsin-Madison
- Utah Valley University
- VIETNAMESE-GERMAN UNIVERSITY
- Xi'an Jiaotong-Liverpool University
- Yeshiva University
- 79 more »
- « less
-
Field
-
diploma or GED. Two years of relevant job experience. Knowledge of digital video formats and encryption, networking, and new cabling and cabling techniques. Demonstrated ability to maintain meaningful
-
detection systems, encryption, and cybersecurity best practices. In-depth understanding of IT compliance standards (e.g., ITIL, ISO, SOX, COBIT). Comprehensive knowledge of enterprise-level network
-
, authentication, and encryption to protect sensitive data. Patch Management: Apply database patches and operating system updates as necessary to keep the Oracle environment up to date. Troubleshooting: Help
-
must be in English, and documents 2 to 4 should be combined in a single PDF file, unsigned and not encrypted. Any late submission would not be accepted. Program Officer (Young Scientist Training Program
-
, hardware security, and encrypted computation. The post-doctoral researcher will take the lead in research projects supported by the National Science Foundation to advance the performance and usability
-
encrypted entries of your Google account and last login time to protect against attacks and data theft from form entries. Lifetime 2 years Name SID Use Used for security purposes to store digitally signed and
-
video formats and encryption, networking, and new cabling and cabling techniques. ~Demonstrated ability to maintain meaningful preventative maintenance schedules and equipment. ~Demonstrated ability
-
will design quantum-safe threshold encryption and/or authentication algorithms. The expected outcome is the design of methods, techniques and their software prototype to implement quantum-safe threshold
-
advertising and optimization platforms, caching systems, CDNs, asset optimization and management, system monitoring and event logging, and encryption, authentication, and identity standards. General proficiency
-
, firewalls, IDS/IPS, PKI and encryption. Strong understanding of core cybersecurity concepts including network protocols, common attack techniques (e.g., phishing, privilege escalation, lateral movement