- Jensen Hughes Inc. (Baltimore, MD)
- …data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies ... as encryption and limited access . Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals… more
- Jensen Hughes Inc. (Warwick, RI)
- …data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies ... as encryption and limited access . Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals… more
- Jensen Hughes Inc. (Philadelphia, PA)
- …data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies ... as encryption and limited access . Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals… more
- Jensen Hughes Inc. (San Diego, CA)
- …data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies ... as encryption and limited access . Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals… more
- Jensen Hughes Inc. (Concord, CA)
- …data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies ... as encryption and limited access . Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals… more
- Jensen Hughes Inc. (Colorado Springs, CO)
- …data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies ... as encryption and limited access . Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals… more
- Jensen Hughes Inc. (New York, NY)
- …data from loss, misuse, alteration, or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies ... as encryption and limited access . Only authorized individuals may access your personal data for the purpose for which it was collected, and these individuals… more
- Emerson (Houston, TX)
- …including Purdue Model zones/levels, firewalls/jump servers, secure remote access , data diodes/unidirectional gateways, and segmented architectures ... **policy/standard requirements** , including segmentation, hardening, logging, and remote access governance; successfully integrated ** data diodes** without… more
- Oregon State University (Corvallis, OR)
- …communication performance, funnel progression, time to decision, and operational efficiency. 5% Data Stewardship and Access Coordination + Coordinate user ... on matters related to technical changes that affect integrations, enterprise data flows, or platform settings by documenting business requirements, participating in… more
- Genentech (South San Francisco, CA)
- …accelerate R&D, leveraging data and novel computational models to drive impact. Seamless data sharing and access to models across gRED and pRED are essential ... innovate. To continuously advance science and ensure everyone has access to the healthcare they need today and for...love. That's what makes us Roche. Advances in AI, data , and computational sciences are transforming drug discovery and… more