Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
action. 7. May receive general supervision conferring with higher levels only in unusual situations. 8. Performs other job-related duties as required. The University of Houston’s Smart Systems Security
-
funding is made available to information technology (IT) practitioners, both in the public and private sector, who are responsible for securing computer networks or responding to any type of cyber-based
-
; cyber security engineering; critical infrastructure protection; advanced manufacturing; additive manufacturing; materials science and engineering; assured position, navigation and timing; propulsion
-
staff position within a Research Infrastructure? No Offer Description Continuing (permanent) position Join New Zealand's leading Cyber Security Research group Drive impactful research and contribute
-
advanced courses in cyber security, cyber law, cyber investigations and/or other criminal justice courses related to the field Criminal justice work experience, especially managerial experience in cybercrime
-
Apply now Job no:536552 Work type:Full Time Location:Sydney, NSW Categories:Information Technology, Cyber Employment Type: full time continuing role as a Senior Cyber Security Architect Attractive
-
. Demonstrated expertise in the areas of arctic security, cyber security, homeland security, homeland defense, and emergency management. Candidates with a professional certification are preferred. Teaching
-
California State University, San Bernardino | San Bernardino, California | United States | 1 day ago
THE SCHOOL OF CYBER AND DECISION SCIENCES To find out more about the School of Cyber and Decision Sciences at CSUSB please visit: Website: https://www.csusb.edu/cyber-decision-sciences Phone: (909)537
-
. The Charles D. McCrary Institute for Cyber and Critical Infrastructure Security at Auburn University seeks an accomplished technical leader to serve as McCrary Research & Development Lab Manager. Reporting
-
starting in Fall 2026. While we welcome applicants with expertise in broader computer/network security, privacy, and cyber forensics, we are particularly interested in security and privacy in AI/ML, applying