Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
University EHS staff and plant Operations team to ensure all air permit preventative maintenance tasks are completed as required. Responsible for Plant Data Historian: Ensure 100% continuous recording of data
-
security, Cyber Physical Systems security, security analytics, digital forensics, vulnerability assessment, malware analysis and defence, Privacy-enhancing technologies, AI security. Computer Science and
-
California State University, San Bernardino | San Bernardino, California | United States | 14 days ago
intelligence and analytics, supply chain management, database management, project management, problem solving, application development, iCloud, information assurance, systems analysis & design, application
-
selection criteria Knowledge of quantum communication / quantum information fundamentals (e.g., entanglement, fidelity/noise, quantum repeaters) Experience with network modelling, performance analysis
-
trends and composition analysis, refractive index determination, and morphology for applications such as environmental monitoring, nuclear non-proliferation, and improving predictive modeling tools (e.g
-
Postdoc position in modeling and analysis of cyber-physical systems At the Technical Faculty of IT and Design, Department of Computer Science, a full-time postdoc position in modeling and analysis
-
the various areas of liability, which include property, cyber, auto, and workers compensation among others. This area works closely with various departments and functional leaders across the University
-
information is available in the EEOC’s Know Your Rights: Workplace (https://www.eeoc.gov/sites/default/files/2023-06/22-088_EEOC_KnowYourRights6.12ScreenRdr.pdf) discrimination is illegal poster.
-
. Knowledge, Skills, and Abilities: Experience with data analysis - Microsoft Suite will be considered but preference is given to candidates with programming experience; Experience in reporting and technical
-
availability of university systems and data; Provide leadership in the enforcement of security and associated policies; Provide leadership to the team in the analysis, discussion, and development of security