Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
currently have positions available at all levels, from Lecturer to Full Professor, in the following areas: Information Security: Mobile/distributed systems security, Cyber Physical Systems security, security
-
system of holistic student support into the culture of Career Services. This person will be accountable for: department management to include supervision, budgets and pertinent data collection, analysis
-
of processes against requirements, supporting the implementation of corrective action plans, analyzing performance data, performing supplier reviews and selections and incoming inspections, managing calibration
-
, biodiversity monitoring, and climate resilience. The work supports strategic priorities in Environmental Sciences, Software/Cyber. PhD researchers will explore how AI-driven Earth observation, computer vision
-
contribute to the research project “NEPTARGOS: Nautical Empowerment for Proactive Threat Analysis and Resilience with Guardian Oversight Systems”. NEPTARGOS aims to enhance cyber risk management of the North
-
) to address the relevant research questions. Perform statistical analysis on survey/experimental data, and conduct thematic analysis on interview transcripts and open-ended survey responses. To lead and report
-
of information technology and communication; Solid background and research experience in two or more of the following areas: AI techniques to secure networked computing infrastructures; Data science and statistical analysis
-
potential impact for further action that may cause ongoing and immediate impact to the environment 5. Utilizes cyber defense tools for continual monitoring and analysis of system activity to identify
-
programming in Python. - Information security and assurance, cyber-analytics, and incident analysis and response. - Web development (especially Python-based full-stack web application design and development
-
, and other policies and information. The Report can be accessed online at: http://securityreport.uchicago.edu . Paper copies of the Report are available, upon request, from the University of Chicago