Sort by
Refine Your Search
-
Listed
-
Category
-
Country
- United States
- United Kingdom
- Australia
- Sweden
- Netherlands
- Denmark
- Norway
- Germany
- France
- Portugal
- Belgium
- Spain
- Finland
- Hong Kong
- Luxembourg
- Canada
- Ireland
- Singapore
- Poland
- China
- Japan
- Italy
- Austria
- Morocco
- Czech
- New Zealand
- Estonia
- Cyprus
- Greece
- Latvia
- Switzerland
- Brazil
- Bangladesh
- Bulgaria
- Fiji
- Lithuania
- Romania
- Saudi Arabia
- United Arab Emirates
- 29 more »
- « less
-
Program
-
Field
- Computer Science
- Medical Sciences
- Economics
- Engineering
- Business
- Mathematics
- Biology
- Science
- Materials Science
- Education
- Social Sciences
- Psychology
- Arts and Literature
- Electrical Engineering
- Humanities
- Law
- Chemistry
- Sports and Recreation
- Linguistics
- Environment
- Earth Sciences
- Philosophy
- Physics
- Design
- 14 more »
- « less
-
maintenance of computing devices. Supports the confidentiality, integrity, and availability of university information as part of the overall University Information Security Program. Analyze, record and track
-
to maintain the security or integrity of critical infrastructure, which may include communications systems, computer networks and systems, cybersecurity systems, electrical grid, hazardous waste treatment
-
for 12 months; continuation past 12 months will be based on university need, performance, and/or availability of funding. POSITION SPECIFICS The Child Maltreatment Solutions Network (CMSN) is seeking a
-
optimally for future challenges. This PhD position is part of the SecReSy4You MSCA Doctoral Network, which focuses on developing next-generation methods for security and resilience of cyber-physical systems
-
holder is expected to have a good understanding across a broad range of IT disciplines, although likely to specialise in one or more areas of expertise such as, but not limed to, networking & telephony
-
. Partner with the CTO’s infrastructure teams to ensure secure design and integration of core services (firewall, VPN, EDR, SIEM, IAM, networks, and platforms). Review and approve security designs for major
-
and experimentation in the area of Multi-agent Agentic AI systems applied to 6G network and service management. By leveraging recent advances in Large Language Models (LLM) and other key agentic tools
-
routing and switching services (e.g., TCP/IP, VLANs, OSPF/BGP fundamentals, IPv6 fundamentals, QoS, and network security controls). Experience planning and executing production changes with documented
-
securing clinical systems and web applications, working in a complex Windows and network environment, and deploying modern identity, endpoint, and cloud-based security products (i.e., Entra, Intune
-
backgrounds to contribute to our projects in areas such as: Network Security, Information Assurance, Model-driven Security, Cloud Computing, Cryptography, Satellite Systems, Vehicular Networks, and ICT Services