Sort by
Refine Your Search
-
Listed
-
Category
-
Country
-
Program
-
Field
-
the University as a whole. The Information Security Manager is at the forefront of the University’s vulnerability management and cyber risk management, responsible for threat assessment and information security
-
system on the identified scenarios. Implementation of a MISP (Malware Information Sharing Platform) and of a security data repository in which users can share information on cyber threats, with the aim
-
18 Mar 2026 Job Information Organisation/Company Eindhoven University of Technology Department Mechanical Engineering Research Field Engineering » Control engineering Researcher Profile First Stage
-
wireless technologies. The Centre for Secure Information Technologies (CSIT) is the UK’s Innovation & Knowledge Centre for cyber security, hosted at Queen’s. The BDM (fintech /cyber-security) will
-
multi-disciplinary research relating to the organisational, human and technology aspects of Cyber Security. The mission of the RMIT University Centre for Cyber Security Research and Innovation (CCSRI) is
-
the curriculum online for more information: https://lancaster-online-education.ac.uk/masters/msc-cyber-security/ We are particularly looking for candidates who are passionate about cyber security
-
-FNR PEARL Research Grant in the area of Information Systems Engineering, and, depending on interest, in fields, such as Generative AI & Machine Learning, Data Privacy, Cyber Security, Digital Identities
-
25 Mar 2026 Job Information Organisation/Company UNIVERSIDAD DE MÁLAGA Department NETWORK, INFORMATION AND COMPUTER SECURITY LAB (NICS Lab) Research Field Computer science » Informatics Computer science
-
physical worlds (Fig. 1). On the one hand, traditional IT security methods focus primarily on protecting information and do not directly consider the possible physical consequences of cyber-attacks
-
of experience, or MSc with less than 5 years of experience, in Computer Engineering or related field. Responsibilities of the Position: Conduct world class research in hardware security. Analyze a