Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Employer
- University of Michigan
- University of Tübingen
- Nature Careers
- University of California
- University of California, Los Angeles
- European Space Agency
- Nanyang Technological University
- University of California, San Francisco
- University of New England
- University of Texas Rio Grande Valley
- University of Texas at Austin
- University of Utah
- APCTP
- Carnegie Mellon University
- DAAD
- Emory University
- George Mason University
- Georgetown University
- K3Y Ltd
- Leibniz
- North Carolina State University
- Oak Ridge National Laboratory
- Pennsylvania State University
- Princeton University
- SINGAPORE INSTITUTE OF TECHNOLOGY (SIT)
- University of Bergen
- University of British Columbia
- University of California Davis
- University of Michigan - Ann Arbor
- University of Minnesota
- University of Washington
- Arizona State University
- Auburn University
- Austin Community College District
- Baylor College of Medicine
- Biola University
- Board of Regents
- Bryant University
- CNRS
- Carleton University
- Case Western Reserve University
- Central New Mexico Community College
- Columbia University
- Dallas County Community College District
- Drexel University
- Durham University
- Durham University;
- Ecole Normale Supérieure de Lyon
- Fairleigh Dickinson University
- Ferris State University
- Florida International University
- Fundació per a la Universitat Oberta de Catalunya
- Heriot Watt University
- Kennesaw State University
- King Abdullah University of Science and Technology
- Loyola University
- Lunds universitet
- Marist College
- Massachusetts College of Art and Design
- Monash University
- Montana State University
- National Renewable Energy Laboratory NREL
- National University of Singapore
- New York University
- Northeastern University
- Rutgers University
- SAIT Polytechnic
- SciLifeLab
- Simula UiB
- Singapore University of Technology & Design
- Southwest Tennessee Community College
- Syracuse University
- TU Dortmund
- Texas A&M AgriLife Extension
- The University of Newcastle
- Ulster University
- University of Birmingham
- University of Cincinnati
- University of Cyprus
- University of Delaware
- University of Lund
- University of Miami
- University of New Hampshire
- University of Newcastle
- University of North Carolina Wilmington
- University of North Georgia
- University of Oklahoma
- University of Plymouth
- University of Primorska
- University of Saskatchewan
- University of St. Thomas
- University of Stavanger
- University of Texas at Dallas
- Utah Valley University
- Weill Cornell Medicine
- Wesleyan University
- Xi'an Jiaotong - Liverpool University
- Zintellect
- 88 more »
- « less
-
Field
-
of website visitors in order to display relevant and personalized Google advertising. Lifetime 6 months Name HSID Use Includes encrypted entries of your Google account and last login time to protect against
-
and identity governance activities. Implement data protection controls such as encryption, secure file-sharing aligned with data classification standards. Governance, Risk & Compliance Conduct security
-
, unsigned, and non-encrypted PDF. - Applicants are responsible for ensuring their referees submit letters before the deadline. - No eligibility-related inquiries will be addressed by the Program Officer
-
to (Imprivata, Cisco AMP, FireEye, Aruba OnGuard, DUO, Bitlocker, Checkpoint Encryption, and USB Allowlisting) 28. Must have a valid drivers California license, have reliable transportation, and drive to UCLA
-
& Compliance Partner with Cybersecurity teams to implement endpoint security controls (encryption, EDR, device hardening) Ensure compliance with security policies, regulatory requirements, and audit findings
-
University of California, San Francisco | San Francisco, California | United States | about 2 months ago
management in higher education institutions Broad knowledge of data encryption technologies and experience selecting and applying appropriate data encryption technologies Expert knowledge of computer security
-
. Ensure all integrations follow security, privacy, and compliance standards (e.g., secure data handling, encryption in transit and at rest). Observability, Monitoring & Logging Leverage centralized logging
-
of cryptographic algorithms through solving polynomial systems of equations. It is crucial for building confidence in quantum safe cryptography, as well as novel symmetric encryption algorithms designed for use with
-
document submitted for items 1 to 5 above must be in English, and documents 2 to 4 should be combined in a single PDF file, unsigned and not encrypted. Any late submission would not be accepted. Program
-
, should you wish to send your application in a digitally encrypted form.