325 information-security-"https:"-"https:"-"https:"-"CUBO" positions at Oak Ridge National Laboratory
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Requisition Id 16116 Overview: The Laboratory Modernization Division (LMD) at Oak Ridge National Laboratory (ORNL) is seeking qualified applicants for the position of Construction Field
-
the High Flux Isotope Reactor (HFIR) and Cold Neutron Source plant systems. HFIR is a category 1 nuclear facility and requires that a high degree of rigor be applied to HFIR nuclear procurement processes
-
to meet the growing demand for radioisotopes. ORNL is the largest multi-program science and energy laboratory in the Department of Energy system. This role directly supports mission-critical nuclear
-
Requisition Id 16106 Overview: Oak Ridge National Laboratory is the largest US Department of Energy science and energy laboratory, conducting basic and applied research to deliver transformative
-
systems (Mojo, Julia, Rust, Python), and HPC system co‑design. This position is embedded within the larger DOE ASCR ecosystem, with direct relevance to ongoing efforts, and related AI‑for‑HPC thrusts
-
Requisition Id 16086 Overview: The Laboratory Protection Division (LPD) is seeking a detailed-oriented, customer focused professional for the position of Badging Specialist. This person will
-
Requisition Id 16167 Overview: The Multiphysics Modeling and Flows (MMF) Group in the Computational Sciences and Engineering Division is seeking a Postdoctoral Research Associate with expertise in
-
Laboratory to deliver groundbreaking advancements with a variety of applications, from national security to life-saving medical treatments. As part of our team, you will work with other technicians, engineers
-
Laboratory to deliver groundbreaking advancements with a variety of applications, from national security to life-saving medical treatments. As part of our team, you will work with other technicians, engineers
-
, queue statistics, and resource usage to inform planning and continuous improvement. Security and Compliance: Apply basic cyber-security principles (e.g., SSH key hygiene, least privilege, firewall rules