Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
Eindhoven University of Technology, Department of Mathematics and Computer Science Position ID: TUe-AR [#27896] Position Title: Position Type: Tenured/Tenure-track faculty Position Location
-
The Project Manager is a two-year, renewable, term role that provides project and financial management support for the Privacy and Cryptography Lab in the Computer Science Department within the College
-
: Information Systems, Cryptography, Secondary Education, and Intermediate Education. A significant portion of our mathematics majors pursue double majors in computer science or artificial intelligence, and the
-
program offers four specializations: Information Systems, Cryptography, Secondary Education, and Intermediate Education. A significant portion of our mathematics majors pursue double majors in
-
Communication sciences » Other Computer science » Informatics Information science » Other Researcher Profile Leading Researcher (R4) Positions Other Positions Country Norway Application Deadline 1 Feb 2026 - 23
-
12 Dec 2025 Job Information Organisation/Company Aalborg Universitet Department The Technical Faculty of IT and Design, Department of Computer Science, Section for Copenhagen Research Field
-
models. Is Your profile described below? Are you our future colleague? Apply now! Education Master’s student in Computer Science, Data Science, or Related Fields. Experience and skills · Solid
-
agency responsible for foreign signals intelligence, cyber operations and cyber security. Learn more about our mission: https://www.cse-cst.gc.ca/en/mission . CSE is committed to fostering a culture of
-
: Master degree in the area of Informatics. Additional optional skills and qualifications: Java programming experience; Advanced knowledge in cybersecurity, cryptography, and distributed systems, especially
-
security, satellite communications, industrial security, blockchain, the Internet of Things, cyber diagnostics and ethical hacking, cryptography, and quantum computing. Benefits and advantages