Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
in professional organizations Basic Qualifications: A PhD in Mathematics, Applied Mathematics, Computational Science, or a related field completed within the last 5 years Preferred Qualifications
-
Requisition Id 16022 Overview: We are seeking a Computer Scientist or Engineer with a focus on Vulnerability Research who will support the Cyber Resilience and Intelligence Division in the National
-
Requisition Id 15974 Overview: We are seeking a Computer Engineer with a focus on Hardware Vulnerability Research who will support the Cyber Resilience and Intelligence Division in the National
-
., ML Ops for geospatial data, real-time analytics, cloud/HPC hybrid, edge geospatial compute, neuromorphic, quantum), pilot new capabilities, foster innovation partnerships (academia, industry, federal
-
Requisition Id 15942 Overview The Program Analyst supports the Laboratory’s records management program by leading and participating in records-related projects with a strong emphasis on electronic
-
an ongoing random drug testing program. In addition, due the SCI, you may also be subject to random polygraph testing. About ORNL: As a U.S. Department of Energy (DOE) Office of Science national laboratory
-
to national security. This position resides in the National Security Program Office, Intelligence and Special Programs, National Security Sciences Directorate, at Oak Ridge National Laboratory (ORNL). As a U.S
-
economic benefits for the nation. Our partnerships with U.S. Department of Energy (DOE) laboratories, universities, and industry enable us to accelerate science and innovation. The Office of Research
-
Requisition Id 15777 Overview: The Fusion Energy Division at the Oak Ridge National Laboratory seeks applications for a skilled Computational Magnetohydrodynamics Engineer, with intended focus
-
Requisition Id 15351 Overview: The Field Intelligence Operations Division invites candidates to apply to join the team as a Group Leader and technical expert for a newly established secure computing