91 information-security "https:" "https:" "https:" "https:" "https:" "Dr" "Robert Gordon University" positions at Aston University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
. This appointment forms part of our continued investment in excellence across our academic community. For any informal enquiries, please contact Dr Kristie Thomas (Head of Aston Law School) k.thomas5@aston.ac.uk
-
assumptions and sustainability conclusions are underpinned by verified performance across component and system levels and aligned with real-world operating conditions. For informal enquiries, please contact Dr
-
legal education. This role offers the opportunity to influence our strategy in a rapidly evolving and high‑impact area of law. For any informal enquiries please contact Dr Kristie Thomas (Head of Aston
-
knowledge bases to deliver innovation projects led by skilled graduates. It is essential you understand how KTP works and the vital role you will play if you secure this position. To learn more please visit
-
be found here . This role does not meet the eligibility criteria for new applicants to the Skilled Worker visa route. See here for information about Skilled Worker eligibility criteria: https
-
‑term post, commencing 1 October 2026. To apply, please upload and up-to-date CV and covering letter outlining your motivation for applying. For further information, please contact Dr Grant Pellowe
-
of the KTP. This is a Knowledge Transfer Partnership (KTP) funded by ISTL and Innovate UK . It is essential you understand how KTP works and the vital role you will play if you secure this position. To learn
-
Aston University’s Centre for Cybersecurity, Privacy and Trust (CyberHub) is the technical coordinator of a £3m, 10-partner EU Horizon project Agentic6G. The project will conduct leading research
-
terms of research activity and student recruitment in the digital sciences: computer science, cyber security, artificial intelligence and data science. You will have an opportunity to carry out research
-
MTD techniques are in preventing attacks is difficult. 5) MTD must coexist with traditional security measures like firewalls, IDS/IPS, and endpoint protection; 6) Frequent reconfigurations and