Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
emphasizes applied software development while spanning domains such as robotics, computer vision, sensing, controls, data analysis, and embedded systems. The engineer will work on interdisciplinary projects
-
Research Excellence in Cyber-Physical Infrastructure Systems (MECIS), and the University Transportation Center for Railway Safety (UTCRS). For further information regarding the College, please visit our
-
of relevant experience Essential Functions: Manage cyber and organizational policies and standards in support of legal and regulatory compliance needs as well as general cyber and organizational information
-
-sharing platforms. This candidate will work with the ACO Cyber team to ensure information security is built into and maintained for systems deployed in and by the laboratory's ACO Group. In this position
-
3 Mar 2026 Job Information Organisation/Company UNIVERSITY OF SYDNEY Research Field Computer science Economics Mathematics Researcher Profile Recognised Researcher (R2) Established Researcher (R3
-
preference. Job Duties and Responsibilities: Assist with social media analysis for the research projects, hypothesis generation and evaluation for understanding cyber behaviors, data collection, cleaning
-
Leadership Team report directly to the Chief Information Officer (CIO) with the following portfolios: Strategy and Change; Operations; Information Systems, and Cyber Security. CIS work with departments across
-
Position Details Position Information Requisition Number S3353P Home Org Name Engineering Administration Division Name Samuel Ginn Col of Engineering Position Title Research Engineer I/II/III/IV/V
-
currently have positions available at all levels, from Lecturer to Full Professor, in the following areas: Information Security: Mobile/distributed systems security, Cyber Physical Systems security, security
-
overall cyber defense posture. Classification Title: Information Security Professional III Responsibilities: Monitor SIEM, EDR, IDS/IPS, firewalls, and other security tools for alerts and anomalies. Perform