Sort by
Refine Your Search
-
Listed
-
Country
- United States
- United Kingdom
- France
- Sweden
- Poland
- Spain
- Germany
- Austria
- Australia
- Portugal
- Belgium
- China
- Canada
- Denmark
- Hong Kong
- Singapore
- Netherlands
- Croatia
- Latvia
- Bulgaria
- Cyprus
- India
- Ireland
- Luxembourg
- Slovenia
- Worldwide
- Greece
- Italy
- Czech
- Estonia
- Malta
- New Zealand
- Romania
- Saudi Arabia
- Switzerland
- United Arab Emirates
- Andorra
- Armenia
- Europe
- Mexico
- Norway
- Slovakia
- South Africa
- 33 more »
- « less
-
Field
-
science » Autonomic computing Computer science » Computer architecture Computer science » Computer hardware Computer science » Computer systems Computer science » Cybernetics Computer science » Database management
-
education in lieu of experience) Required License No If yes, what is the required licensure/certification? Required Computer Applications: Microsoft Excel, Microsoft Word, Microsoft PowerPoint, Microsoft
-
of working on a computer Advantages: active participation in scientific research work, training, recognition and awards for excellence, experience working in a cell laboratory, experience working with PCR
-
, Technology and Information in Human-Computer Interaction (HCI), with a focus on responsible computing. The successful candidate will have an interest in online safety, including areas such as social media
-
, Technology and Information in Human-Computer Interaction (HCI), with a focus on responsible computing. The successful candidate will have an interest in online safety, including areas such as social media
-
Requirements Have relevant competence in the areas of Cyber Security. Degree in Infocomm, Computer Science, Cyber Security, Computer/Electrical Engineering, Information Technology or equivalent. Possessing a
-
Graphics: https://www.jku.at/cg Your Qualifications: The successful candidate must hold a Diploma/Master’s degree in a corresponding discipline (computer science, mathematics, engineering or related) or have
-
30 Mar 2026 Job Information Organisation/Company K3Y Ltd Department R&D Research Field Computer science » Computer systems Engineering » Electrical engineering Technology » Computer technology
-
. Chan, “When edge meets learning: Adaptive control for resource- constrained distributed machine learning,” in IEEE INFOCOM 2018- IEEE conference on computer communications. IEEE, 2018, pp. 63– 71. [3] G
-
countermeasures, and cloud security concepts. Candidates should possess a PhD or equivalent experience, ideally in computer or information science and preferably with a track record in the delivery of study modules