Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
reporting to the CISO and senior leadership. Oversee projects and initiatives for the Information Security Office. Develop and maintain Information Security Office’s business processes. Compliance & Cyber
-
, Information Technology, Intelligent Systems Engineering, Network Engineering and Security, and Software Engineering. Find out more about SoC at https://www.cdm.depaul.edu/academics/Pages/School-of-Computing.aspx
-
, and industry. The ideal candidates research program will build upon or complement the expertise of the current GPI faculty (https://www.augusta.edu/institutes/gpi/gpi-faculty/index.php ) and research
-
electrical engineering, computing, physics, and mathematics to better understand and advance our data-driven world. It has built substantial knowledge in machine learning, cyber security, statistics and
-
Cloud, Azure), server operating system admin, database operations, cloud microservices, network architecture, authentication, or cyber security. Coach and guide Developers in the team to analyse
-
and researchers. The Team Based within the Information Security division, our team is the driving force behind cyber improvement across the University. We work in multi-disciplinary environments
-
JD program, the Cyber, Intelligence & National Security Law LLM, and the NSI National Security Summer Program, and other on campus student opportunities, as well as oversees NSI student research
-
Criminal Law Criminology Cyber Crime Investigations Emergency Management Forensic Science Homeland Security Intelligence Policy International Crime Juvenile Justice Legal Writing Organized Crime Policing in
-
Analysis Crime Causation Criminal Justice Administration and Leadership Cyber Security Disaster Preparedness and Emergency Management Ethics and Diversity in Criminal Justice Problem Solving and Assessment
-
. The PriSec group’s research includes diverse cybersecurity topics such as network security, cybersecurity pedagogy, educational cyber ranges, generative AI for offensive cybersecurity, privacy-enhancing