41 computer-security "https:" "https:" "https:" "https:" "UCL" "UCL" "UCL" "UCL" "UCL" Postgraduate positions in Canada
Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
assistant will be involved in are, and not limited to, the ECHO Autism BC program, the Autism Training Simulation program, the cross Canada ECHO Autism implementation project (ECHO AuDIO), and establishing a
-
career. The Turvey Lab aims to identify the causes of disease for previously undiagnosed complex conditions. The incumbent will participate in an exciting research program to investigate the role
-
. Inappropriate judgement also could compromise the safety and wellbeing of the participants. Inappropriate judgement would compromise research success and affect the credibility of the Principal Investigator
-
of the laboratory, lead to a loss of credibility in this field, and be financially costly. Noncompliance with biosafety and chemical safety regulations may also result in the closure of the facility or loss of grant
-
The Public Humanities Hub Graduate Research Fellowship program aims to provide support for interdisciplinary, innovative and/or experimental public humanities graduate research projects, imagined
-
knowledge to productively engage with diverse communities. McGill implements an employment equity program and encourages members of designated groups to self-identify. Persons with disabilities who anticipate
-
in a timely fashion is a must. Attention to detail is critical. Computer experience and the physical ability to lift and carry materials up to 25 kg are required. Performing other related duties as
-
life sciences program. Experience in research and familiarity with inflammatory bowel disease is considered an asset. You must be registered in a graduate program. To Apply: Interested applicants must
-
an asset but not required. * Significant is defined as at least 2 to 6 years of experience. ** Recent is defined as within the last five years. Condition of employment Secret clearance A thorough security
-
the project or seriously compromise the quality of the research. In addition, if established protocols related to privacy, confidentiality, and safety are not followed, confidentiality of participants sensitive