Sort by
Refine Your Search
-
, developmental and lifespan sciences, movement sciences, music and the art, communication sciences and disorders, and cognitive training. CBH is also home to the Northeastern University Biomedical Imaging Center
-
restricted party screening against SDN, SSI, and consolidated sanctions lists. Implement and maintain data security controls, including AES-256 encryption for sensitive banking data at rest, TLS 1.3/1.2
-
of cybersecurity controls including malware protection, firewalls, intrusion detection systems, content filtering, Internet proxies, encryption controls, and log management solutions Hands-on experience with
-
the possibility of renewal based on performance. Key Responsibilities Lead research and development of a prototype community readiness assessment tool to describe the socio-cultural and economic attributes
-
, prototyping and data analysis to contribute to innovative translational near-infrared spectroscopic and tomographic imaging systems and clinical applications. The candidate will lead the design, testing and
-
the nematode C. elegans. Our lab integrates genetics, live imaging, quantitative analysis, and computational approaches to uncover the molecular mechanisms regulating aging and longevity. KEY RESPONSABILITIES
-
state and federal agencies. The appointment is for one year with the possibility of renewal based on performance. Key Responsibilities Lead research and development of a prototype community readiness
-
/Administrative Internal Number: 6744727 Research Assistant About the Opportunity The Research Assistant (Neuroinformatics) in the Computational Optics and Translational Imaging (COTI) Lab at Northeastern
-
, psychoacoustics, music-based interventions, creative cognition, music neuroscience, imaging and sonification, AI approaches to creativity and brain health, and AI applications in music therapy and/or sound and
-
of AI services in production 4) Security & Compliance Design and maintain IAM roles and permissions for ML workflows Ensure compliance with data privacy requirements in model serving Implement encryption