Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
. Knowledge, Skills, and Abilities: Experience with data analysis - Microsoft Suite will be considered but preference is given to candidates with programming experience; Experience in reporting and technical
-
. The overall goal is to contribute to improved security, resilience, and situational awareness in critical infrastructure systems. For more information and how to apply: https://www.jobbnorge.no/en/available
-
availability of university systems and data; Provide leadership in the enforcement of security and associated policies; Provide leadership to the team in the analysis, discussion, and development of security
-
including compliance with federal control information (FCI) and controlled unclassified information (CUI) regulations and sponsor contracting requirements, insider and external threat awareness, analysis and
-
platforms, security analysis, adversarial AI attacks and defences, intrusion detection, load management in mobile edge networks, or denial-of-service detection are considered as a merit. Earlier experience in
-
in modeling and analysis of cyber-physical systems At the Technical Faculty of IT and Design, Department of Computer Science, a full-time postdoc position in modeling and analysis of cyber-physical
-
testing and analysis. For further information, you may refer to https://www.uni.lu/snt-en/research-groups/svv The position holder will be required to perform the following tasks: Carrying out research in
-
Computation (MiC) Section at The Oak Ridge National Laboratory (ORNL) invites outstanding candidates to apply for a staff position in the Data Analysis and Machine Learning Group. This group focuses
-
and will actively participate in research activities related to intelligent urban mobility studies, in particular mobility data analysis and modeling. Statistical modeling software and other tools
-
penetration testing tools ● Deep technical knowledge of computer networking concepts and protocols, network security methodologies, cyber threats and vulnerabilities, authentication, authorization, and