Sort by
Refine Your Search
-
Listed
-
Program
-
Field
-
files. May test software prototypes. May interact with research subjects in order to perform job functions. Performs basic data analysis in order to product reports. Documents results and processes
-
skills. 3. Ability to conduct independent literature review and synthesize findings. Preferred 1. Experience with chatbot frameworks or natural language processing tools. 2. Familiarity with phishing
-
depth knowledge of a specialized field, process, or discipline and may involve organizing and implementing complex research plans, the development of methods of research, testing and data collection
-
presentations to document the work. Responsibilities: Performs basic data analysis in order to product reports. Documents results and processes. May test software prototypes. May interact with research subjects
-
for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving
-
. The project will initially be associated with a NPS project that seeks to leverage Operation IceBridge elevation change data to refine projections of glacier changes in Alaska through 2100. Additional
-
practices in different research communities; Teach lessons and workshops such as data processing and analysis using R or Python, tools and best practices for data management, computational best practices
-
relevant STEM area such as biology, computer science, or robotic engineering, etc.) Willingness to maintain confidentiality Computer competency, including but not limited to Microsoft Office suite (Outlook
-
for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving