Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
information technology, cyber security risk management, and asset management across the division. The unit has over 20 staff. In full support of our institutional commitment to embrace diversity and practice inclusive
-
? Not funded by a EU programme Reference Number AE2025-0571 Is the Job related to staff position within a Research Infrastructure? No Offer Description Portuguese version: https://repositorio.inesctec.pt
-
quarter, accept quarterly hire contract, submit required textbook orders, complete University mandated trainings (sexual harassment prevention, cyber security, Canvas etc.), and communicate classroom needs
-
research infrastructure and lab facilities to conduct world-leading fundamental and applied research within communication, networks, control systems, AI, sound, cyber security, and robotics. The department
-
, Intelligence Operations Posting Number req24782 Department Cyber Intelligence Operations Department Website Link https://engineering.arizona.edu/index Location Sierra Vista Address 1140 Colombo Avenue, Sierra
-
intellectual hub and thought leader for research and teaching in international law. Further information about CIL is available at https://cil.nus.edu.sg/ CIL invites applications for the position of Senior
-
operations, cyber security, business systems, data information, and information services, including records management and the Research Library. The ideal candidate is an excellent communicator who is
-
software. Assist user's ln developing and implementing automated project management workflows. Ensure compliance with UC Davis Cyber Safety requirements. Backup audio/visual support for ongoing departmental
-
, signal processing, machine learning, high-performance computing, computer vision, socially cognizant robotics, cyber-physical systems, nano/bio electronics, and cybersecurity and privacy. Faculty honors
-
core security values. Develop and maintain security applications deployed with container orchestration tools. Automate policy assessments to verify cyber security and operational policy. Engineer secure