Sort by
Refine Your Search
-
Listed
-
Employer
-
Field
-
solutions using first motion. Experience in full waveform inversion using innovative tools (e.g. ISOLA) and methods (ML), earthquake location algorithms, computer programming and geophysical equipment
-
modelling. Experience in developing and using innovative tools and methods, algorithms, computer programming, and GNSS/Satellite data. Knowledge of programming language, including experience in developing
-
flow cytometry/cell sorting protocols. Design and develop specialized methods and/or techniques to provide protocols in cytometric procedures and assays in collaboration with users. · Operate and
-
detection, and power grid waveform analytics. You will apply methods traditionally used in wireless communications and signal intelligence — including time-frequency analysis, interference modeling, multi
-
will develop novel machine learning and artificial intelligence (ML/AI) methods for genomics data, especially: large-scale single-cell genomics data, high-definition spatial genomics, digital pathology
-
for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving
-
qualitative, quantitative, and/or mixed-methods research designs Demonstrated ability to collaborate effectively with educators and community partners Experience with externally funded research or proposal
-
for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving
-
for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving
-
for the AI Security Researcher role. Originally created in response to one of the first computer viruses -- the Morris worm – in 1988, CERT has remained a leader in cybersecurity research, improving