124 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" positions in Canada
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Associate Professor, Tenured Canada Impact+ Research Chair, Human Mobility and Wearable Technologies
procedures to allow non-Canadian chairholders to work in Canada. For more information, please visit the Impact+ Program webpage on Eligibility of Nominees: https://www.canada.ca/en/impact-plus-chairs/program
-
monitor the quality of care/practice provided by Child and Family Program staff who deliver a variety of services to families. Lead and assist in managing change within the work unit and the service area
-
information on the Queen’s National Scholar Program can be found on the website of the Office of the Provost and Vice-Principal (Academic): Queen’s National Scholars Program. The successful candidate will join
-
need to apply for Human Pathogens and Toxins Act (HPTA) security clearance. Please reference the following links for further information regarding risks and biosecurity. https://www.canada.ca/en/public
-
partially funded extension. Full program details can be found on the program’s website https://www.canada.ca/en/impact-plus-chairs/program-details/competition/2026/apply.html . USask is committed to providing
-
/implementing or evaluating AI tools in health care, and to establish an outstanding, competitive, and externally funded research program. Candidates must provide evidence of research excellence which can be
-
caregivers. Have knowledge of child abuse, neglect and domestic violence indicators and effects. Bring expertise in policy and practice for your program area. Knowledge of multi-cultural beliefs and values
-
Policing and Public Safety Salary Range: $49.549-$62.091 Hourly Salary Supplement: included in hourly salary range (in-scope) Grade: SGEU.10. The Saskatchewan Marshals Service (SMS) is seeking new
-
-quality scholarly output with significant impact in their field, including peer-reviewed publications in leading journals, a history of securing external research funding, and recognition as an established
-
protocols and concepts such as HTTP requests/responses, APIs, DNS and addressing, as well as security technologies such as firewalls, certificates, and encryption; Authentication and single sign