225 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" positions at University of Minnesota
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
maintaining servers. ● Support the implementation of security policies and procedures. ● Monitor server performance metrics using standard tools, autonomously responding to trends as appropriate to maintain
-
safety, environmental, and quality standards. Responsibilities include technician supervision and development; coordination of laboratory operations, facilities, vendors, and fleet assets; oversight
-
9791RP Employee Class Acad Prof and Admin Add to My Favorite Jobs Email this Job About the Job The Multidisciplinary Proposal Developer in the University of Minnesota’s National Security Research Institute
-
priorities. Position Impact Regional Development Officers play a critical role in connecting donors’ passions with the University’s highest priorities. By fostering authentic relationships and securing
-
Attend lab meetings with the entire research group and one-on-one meetings with Professor Mortazavi, as required. Attend relevant lectures and training sessions. Maintain the highest safety standards
-
Class Acad Prof and Admin Add to My Favorite Jobs Email this Job About the Job About the Job: Professor Alireza Khani’s Transit Lab (http://umntransit.weebly.com) has a post-doctoral associate position
-
equipment, instruments, and computers: Research, install, maintain, repair, upgrade instruments and equipment in the instructional labs. Provide assistance with installation, maintenance, repair, and upgrade
-
Previous Job Job Title Public Safety Analyst Next Job Apply for Job Job ID 372482 Location Twin Cities Job Family Campus Operations Full/Part Time Full-Time Regular/Temporary Regular Job Code 8422EC
-
. Acknowledge and address problems that arise with volunteers and volunteer roles. Program Operations – 15% Manage and monitor compliance with organizational policies and procedures, including youth safety, risk
-
encryption: HTTPS, TLS, AES, HMAC, and secure transmission protocols f. Cloud infrastructure and services: Hands-on experience with AWS, Azure, or Google Cloud g. Containerization: Docker and Kubernetes