Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
, along with the ability to demonstrate self-motivation, perseverance and initiative. As part of this role, you may be required to obtain UK Security Clearance (BPSS). About Us As a specialist postgraduate
-
of Cybersecurity that includes Network Design/implementation, Systems Security, Network Security, Security Strategy/Analysis and Cyber Threat Intelligence. SUNY Suffolk is a comprehensive community college
-
the NIST cyber security framework. CompTIA or ISC2 certifications given preference. Princeton University is an Equal Opportunity and all qualified applicants will receive consideration for employment
-
Research Excellence in Cyber-Physical Infrastructure Systems (MECIS), and the University Transportation Center for Railway Safety (UTCRS). For further information regarding the College, please visit our
-
Cyber Security Awareness training within first 30 days. ¿ Complete FIU Service Excellence training within first 30 days. Student Assistant Applicants must be currently enrolled as a student at FIU with a
-
the parameters of the Family Educational Rights and Privacy Act (FERPA), other applicable regulatory requirements, and professional standards. A qualified faculty member in Cyber Security/Information Assurance
-
proposals led by the Systems Program and Faculty. Current Application Areas of Interest: Cyber-Human-Physical Systems: Human-System Interaction, Human-Centered Planning and Design. Smart, Connected, & Healthy
-
The Threat and Vulnerability Program Manager is a key role within the University Information Security Officer (UISO). This role leads and matures Georgetown’s enterprise-wide cyber threat and
-
Technology Services (ITS), providing strategic oversight of digital platforms, infrastructure, cyber security, data and emerging technologies that support teaching, research, staff and student experience and university
-
role model in secure trustworthy AI by pioneering cyber resilience across the AI lifecycle. The research program focuses on four key themes: Trustworthy and Verifiable AI, Runtime Security Assurance