54 information-security-"https:"-"https:"-"https:"-"https:"-"UCL" scholarships in Canada
Sort by
Refine Your Search
-
Listed
-
Program
-
Employer
-
Field
-
*. * The Employment Equity Act, which is under review, uses the terminology Aboriginal peoples and visible minorities. Candidates are asked to self-declare when applying to this hiring process. City: Various Locations
-
Environmental certification or diploma CRSP (Canadian Registered Safety Professional) certification For information on certificates and diplomas issued abroad, please see Degree equivalency Experience Significant
-
The Mobilizing Insights in Defence and Security (MINDS) program of the Department of National Defence (DND) is committed to fostering the next generation of security and defence scholars in
-
over a period of five to ten years or more. Condition of employment Secret clearance A thorough security clearance process will be applied. For a Secret Clearance, verification of background information
-
of experience. Condition of employment Secret clearance A thorough security clearance process will be applied. For a Secret Clearance, verification of background information over a period of 10 years is required
-
the security screening process. Work is typically performed in an indoors research and development environment, but may occasionally be conducted outdoors. Must be able to travel both domestically and
-
maintenance. Condition of employment Secret clearance A thorough security clearance process will be applied. For a Secret Clearance, verification of background information over a period of 10 years is required
-
/RPAS, robotics, avionics integration) is considered an asset. Condition of Employment Secret (II) A thorough security clearance process will be applied. For a Secret Clearance, verification of background
-
qualifications may be considered for future opportunities in IT infrastructure operations, cyber security, cloud computing, or related fields as they become available. Discover the possible Anything is possible
-
qualifications may be considered for future opportunities in IT infrastructure operations, cyber security, cloud computing, or related fields as they become available. Discover the possible Anything is possible