508 information-security "https:" "https:" "https:" "https:" "https:" "UCL" positions at Carnegie Mellon University in United States
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
resource in software engineering, computer security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia to continually improve software-intensive
-
you for our team, where you’ll collaborate to deliver high-quality results in the emerging area of AI security. The CERT Division of the Software Engineering Institute (SEI) is seeking applicants
-
Carnegie Mellon University, Institute for Computer-Aided Reasoning in Mathematics Position ID: 3637-PF [#27988] Position Title: Position Type: Postdoctoral Position Location: Pittsburgh
-
, Academic Computing or Information Security; or if within a large college responsible for strategic IT support, planning, and direction. These are colleges that require significant IT resources to support
-
Carnegie Mellon University is a private, global research university that stands among the world’s most renowned education institutions. With ground-breaking brain science, path-breaking performances
-
Carnegie Mellon University is a global leader in innovation, creativity, and discovery—where big ideas come to life through pioneering research, hands-on learning, and real-world impact. From
-
Carnegie Mellon University's department of Facilities Management is searching for a Fire/Life Safety Technician. Working under the Life Safety Supervisor, you will be responsible for all aspects
-
, Academic Computing or Information Security; or if within a large college responsible for strategic IT support, planning, and direction. These are colleges that require significant IT resources to support
-
CMU in Qatar CMU in Qatar (CMUQ) operates in concert with several other American and European branch campuses under the umbrella of Qatar Foundation’s Education City (https://www.qf.org.qa/education
-
, multi-party computation, fully homomorphic encryption, as well as zero-knowledge proofs. The ideal candidate has a strong background in cryptography and data security and privacy. The successful candidate