155 coding-"https:"-"Prof"-"FEMTO-ST" "https:" "https:" "https:" "https:" "https:" "U.S" positions at Carnegie Mellon University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
unacceptable risk. Position Summary: As a Senior Autonomous Systems Research Scientist you will identify, lead, and conduct research in support of critical U.S. government needs. The ideal candidate will have a
-
systems sufficient to maintain credibility with engineering teams (deep coding expertise not required). Experience navigating complex stakeholder ecosystems involving multiple contractors, oversight
-
software-intensive systems sufficient to maintain credibility with engineering teams (deep coding expertise not required). Experience navigating complex stakeholder ecosystems involving multiple contractors
-
datasets. Collaborate with team members to debug models, analyze results, and iterate on research directions through regular code reviews and research discussions. Document research findings through clear
-
or develop applications or systems programs from detailed specifications. Code, test, and debug programs. Develop and maintain technical documentation. Flexibility, excellence, and passion are vital qualities
-
-level (assistant) machine learning engineer in the AI for Autonomy Lab, you will identify, shape, apply, conduct, and lead engineering research that matches critical U.S. government needs. The AI
-
systems sufficient to maintain credibility with engineering teams (deep coding expertise not required). Experience navigating complex stakeholder ecosystems involving multiple contractors, oversight
-
, you will identify, shape, apply, and conduct research in support of critical U.S. government needs. The ideal candidate will have a strong background with hands-on experience in one or more of the
-
curious to deliver work that matters, your journey starts here! In a region booming with opportunities, CMU is the only U.S.-based research university offering its master’s degrees with a full-time faculty
-
AI systems and how attackers adapt their tradecraft to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and