Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
/type: Academic, Digital, Higher Education Job reference: REQ000461 Attachments: attachmentLecturer in Networking and Cyber Security (HE)- JDPS - Dec 2025.pdf Ready to inspire the next generation of tech
-
and cyber-physical software; Runtime verification of cyber-physical and autonomous systems; Target applications may include autonomous systems, collision avoidance, mission and plan monitoring
-
health insurance, retirement plans, and paid time off. To access this tool and learn more about the total value of your benefits, please click on the following link: https://resources.uta.edu/hr/services
-
Security Agency (NSA) and the Department of Homeland Security (DHS) as National Centers of Academic Excellence (CAE) in Cyber Defense, Research, and Cyber Operations. How to Apply: To apply, visit https
-
, cyber-security and information technology. Substitutions allowed for Education: When a candidate has the required experience, but lacks the required education, they may normally apply additional relevant
-
department offers Bachelor of Science degrees in Computer Science and Cyber Security, with undergraduate student enrollments in the department consistently being maintained at approximately 1000 students
-
overall cyber defense posture. Classification Title: Information Security Professional III Responsibilities: Monitor SIEM, EDR, IDS/IPS, firewalls, and other security tools for alerts and anomalies. Perform
-
implementation assessments of NSLS-II programs including Quality Assurance, Conduct of Operations, Configuration Management, Cyber Security, LOTO, Accelerator Safety, etc. This includes developing assessment
-
scalable insights for future transport innovations while contributing to environmental stewardship and road safety improvements. https://youtu.be/Dzasl3mBiII?si=JgJIfK9S4Df4HPtU (1min video) AI-Driven
-
currently have positions available at all levels, from Lecturer to Full Professor, in the following areas: Information Security: Mobile/distributed systems security, Cyber Physical Systems security, security