Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
applicants will take place from March to April 2026. Awards for intake 2026 will be finalised by July 2026. Supported Areas for START Infocomm Technology Information Security: Mobile security, cyber-physical
-
security and automation Interest in working in research in the field of cyber security Programming skills (preferably Java and Python) Experience in mobile application security and large-scale analysis
-
, data sciences, applied mathematics, statistics, operations research, control, electrical engineering, energy systems, cyber security, or related fields Knowledge of privacy-preserving mechanisms
-
for Cyber and Critical Infrastructure Security is responsible for supporting the Alabama Cybersecurity Intelligence Center (ACIC) which provides managed cybersecurity services for multiple entities in
-
interaction, communication, or psychology. Masters or Ph.D. in Human-Computer Interaction (HCI), Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology will be advantageous
-
. Implements and maintains security protocols, conducts regular security assessments, ensures compliance with industry standards and regulations, and protects systems from cyber threats and vulnerabilities
-
disciplines. Knowledge of autonomous vehicles or cyber security will be advantageous. Have strong research record, preferably on top-tier computer science/engineering conferences. Key Competencies Specialized
-
geotechnical and construction). Detailed Position Information The Department of Civil, Construction and Environmental Engineering (CCEE: https://cce.eng.ua.edu/ ) and the Lee J. Styslinger Jr. College
-
research addresses challenges related to: Software systems, distributed systems, information systems and cyber-physical systems Application-specific domains (e.g. cybersecurity, healthcare, law) Reliability
-
Information Technology & Management (MSITM) program or its stackable certificates in Cyber Security, Business Analytics, Generative AI, Cloud Computing & Security Analytics, or Supply Chain Management. The ISSCM