Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
undergraduate students take one or more courses at the department each year. You can find more information about us on the Department of Information Technology website . The doctoral student will join the Secure
-
to strengthen the security and resilience of computer systems and networks; and The Software Solutions Division, which focuses on improving lifecycle engineering technologies and assuring complex, software
-
position in the context of the project M etamo rphic Secur ity T esting A ssisted by L LMs (MORTAL), funded by the Cyber Research Hub and in collaboration with NC3. The project objective is the definition
-
an important contribution to solving complex technical-social issues, such as energy transition, mobility, digitalisation, water management and (cyber) security. TPM does this with its excellent education and
-
Cloud, Azure), server operating system admin, database operations, cloud microservices, network architecture, authentication, or cyber security. Coach and guide Developers in the team to analyse
-
• At least intermediate knowledge of cyber security • Knowledge of programming tools and technologies • Knowledge of data analysis tools • Knowledge of basic and advanced machine learning • Basic
-
• At least intermediate knowledge of cyber security • Knowledge of programming tools and technologies • Knowledge of data analysis tools • Knowledge of basic and advanced machine learning • Basic
-
safer place Job description In our connected world, cybersecurity is crucial. The Cybersecurity (CYS) group takes a data-driven approach to protecting and improving the security and privacy of our
-
sponsored under the Skilled Worker visa route if tradeable points can be used under the Skilled Worker visa rules. For more information please visit: https://www.gov.uk/skilled-worker-visa. As a valued member
-
; security analysis of composite systems, formal verification of networks, emergent security issues in networked cyber-physical systems and peripherals; cyber operations, adversarial examples, and anomaly