Sort by
Refine Your Search
-
Listed
-
Country
-
Field
-
flexibility orchestration Scalable data and machine learning pipelines Digital twin architectures for cyber-physical energy systems AI-based energy system modeling, simulation, and optimization Secure and
-
. Demonstrated expertise in the areas of arctic security, cyber security, homeland security, homeland defense, and emergency management. Candidates with a professional certification are preferred. Teaching
-
advanced courses in cyber security, cyber law, cyber investigations and/or other criminal justice courses related to the field Criminal justice work experience, especially managerial experience in cybercrime
-
team of compliance analysts and risk assessors and oversee compliance administration activities within the Research Cyber Risk Management team of the Information Security Office. The Manager will ensure
-
management, crime scene investigation, computer applications, traffic safety, illicit drug investigations and school safety. If you have a disability and need assistance with the hiring process or have
-
postgraduate modules related to Cyber Security. An evidenced track record is required within two or more of the following areas of Cyber Security: Pen-testing, Ethical hacking, Secure Programming (operating
-
building community, corporate and government partnerships that address health, security, economic and societal concerns locally and across the state. The University System of Georgia https://www.usg.edu/hr
-
security, mathematics, and emerging areas aligned with industry needs and national skills priorities. The successful candidate will contribute their expertise across the broad field of cyber security
-
standards Essential Skills & Experience Teaching & Assessment: Demonstrated experience in competency-based assessment Understanding of ICT and Cyber Security training packages Ability to diagnose learning
-
network security, hardware and embedded system security, cryptography, privacy-preserving and trustworthy computing, AI-driven security and adversarial machine learning, security of cyber-physical and