Sort by
Refine Your Search
-
Category
-
Country
-
Program
-
Employer
- The Ohio State University
- Boston University
- Blackhawk Technical College
- Ferris State University
- George Mason University
- HONG KONG BAPTIST UNIVERSITY
- Monash University
- University of Texas at Austin
- Austin Community College District
- Emory University
- European Space Agency
- Fairleigh Dickinson University
- George Washington University
- King Abdullah University of Science and Technology
- Ritsumeikan University
- SUNY University at Buffalo
- University of British Columbia
- University of California Davis
- University of California, Berkeley
- University of California, San Francisco
- University of Dayton
- University of Miami
- University of Michigan
- University of New England
- University of Southern California
- University of Sydney
- 16 more »
- « less
-
Field
-
to, endpoint encryption, Antivirus, Antimalware, EDR and threat detection and prevention that adheres to the University Cyber Security Policies. 4. Assists with the development and management of Microsoft
-
for the delivery and operational support of desktop imaging, application packaging and delivery, and management of endpoint devices. Services are delivered through tools such as Azure Virtual Desktop Infrastructure
-
maintain automation scripts (Bash, Python, AppleScript) for deployment and compliance. Monitor and enforce security settings such as FileVault encryption and antivirus policies. Provide Tier 2/3 support and
-
enterprise needs. Research and prototype emerging products and solutions to enhance or offer new capabilities. This position often serves as a leadership consultant to meet technical or business needs. The
-
, encryption/decryption and compression; use of microelectronics devices (including COTS); implementation, inference, verification and validation of algorithms** on processing hardware platforms for space
-
standalone system networks. • Configuration Management: Assist with laptop and desktop computer system configuration management, including imaging, encrypting, and performing software and hardware updates
-
, augmented virtual reality, voice assistance, and medical diagnosis. This new paradigm is further accelerated by AI chips and ASICs embedded on mobile devices, e.g., Apple’s Bionic neural engine. Compared
-
, Biology and Mathematics, Humanoid Robotics, Cognitive Science, Mechnotronics, Advanced Manufacturing, Cyber security, Encryption and decryption, Petroleum and Petro-Chemical Engineering, Science of Climate