Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
war history; cyber-security; critical international theory; gender studies; international law; and intelligence studies. Research and teaching across the department embraces a variety of intellectual
-
Institute for Cyber and Critical Infrastructure Security at Auburn University seeks a Project Manager to support the Institute’s Administration and Finance function. This role provides administrative
-
contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and research
-
insurance, generous paid leave and retirement programs. To learn more about USC benefits, access the "Working at USC" section on the Applicant Portal at https://uscjobs.sc.edu. Position Description Advertised
-
– Requisition #: 38285 Job Summary: Does this describe you? Are you passionate about cybersecurity and ready to join a great team of highly skilled and dedicated cyber defenders? Would you like to make an impact
-
on risks to the University Develop responses to risk questionnaires, for example, for obtaining cyber liability insurance or informing Compliance team via quarterly updates Physical Demands and Working
-
web-page: https://taltech.ee/en/phd-admission The following application documents should be sent to hadi.raja@taltech.ee CV Motivation letter Degree certificates as required by the university A research
-
to business as usual is as seamless as possible. 6. Compliance and Security: Working closely with the Chief Information Security Officer (CISO) ensure all services are compliant with cyber security
-
at intermediate level or A level qualification or vocational skills and proven experience within an IT support environment Essential Application Experience and understanding of following cyber security policies
-
. Subject description Cyber Security focuses on technical security aspects as well as protection of systems that are connected to the Internet and include protection of software, data, and hardware. Project