Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
to strengthen the security and resilience of computer systems and networks; and The Software Solutions Division, which focuses on improving lifecycle engineering technologies and assuring complex, software
-
: Background in Law, applied ethics, psychology or Cyber Crime/Security Qualifications and Licences Current ‘C’ class driver’s licence or manual vehicle licence Current Working with Vulnerable People
-
, Information Technology, Intelligent Systems Engineering, Network Engineering and Security, and Software Engineering. Find out more about SoC at https://www.cdm.depaul.edu/academics/Pages/School-of-Computing.aspx
-
The University of North Carolina at Chapel Hill | Chapel Hill, North Carolina | United States | 8 days ago
are generally required to reside in North Carolina, within a reasonable commuting distance of their assigned duty station. The Information Security Office coordinates the institution's response to cyber risk
-
worthiness of autonomous vehicles cyber risk management, advanced threat intelligence secure-by-design for IoT and policy governance of cybersecurity For more details, please view https://www.ntu.edu.sg/cysren
-
Industry Certifications ISO/IEC 27001 Lead Implementer or Lead Auditor Certified Information Security Officer (CISO) CISSP, CEH, CompTIA Security+, CCNA/CCNP Azure Security Engineer or AWS Security Specialty
-
program, the Cyber, Intelligence & National Security Law LLM, and the NSI National Security Summer Program, and other on campus student opportunities, as well as oversees NSI student research assistant and
-
Analysis Crime Causation Criminal Justice Administration and Leadership Cyber Security Disaster Preparedness and Emergency Management Ethics and Diversity in Criminal Justice Problem Solving and Assessment
-
of IT planning and implementation. This position plays a key role in safeguarding the university’s information systems against evolving cyber threats and ensuring the confidentiality, integrity, and