24 coding-"https:" "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dr" "Dr" research jobs at Carnegie Mellon University
Sort by
Refine Your Search
-
California’s Silicon Valley and Qatar, and programs in Africa, Asia, Australia, Europe and Mexico. Connections working at Carnegie Mellon University More Jobs from This Employer https://main.hercjobs.org/jobs
-
California’s Silicon Valley and Qatar, and programs in Africa, Asia, Australia, Europe and Mexico. Connections working at Carnegie Mellon University More Jobs from This Employer https://main.hercjobs.org/jobs
-
significant impact on the world around us. Dr. Li and Dr. Piazza invite applications for an outstanding Post‑Doctoral Researcher to join their groups in the Department of Electrical and Computer Engineering at
-
, and ensuring compliance with institutional, federal, and regulatory standards. The technician will work closely with Dr. Keith Cook’s surgical research manager and research staff to promote animal
-
right now. Please apply at https://cmu.wd5.myworkdayjobs.com/en-US/CMU/details/Postdoctoral-Fellow---DeDeo-Lab---Dietrich-College_2023842?q=2023842 . Postal Mail: 5000 Forbes Avenue Pittsburgh, PA 15213
-
of the research process. Your work will be supervised by Dr. Matthew Denes (Assistant Professor of Finance, Carnegie Mellon University). Core responsibilities include: Obtain and manipulate data from various
-
interview notes, transcripts, artifacts, and classroom feedback. Code and analyze qualitative data (e.g., thematic analysis) to identify design requirements, breakdowns, and opportunities for refinement
-
or qualitative coding. Familiarity with workplace surveillance topics, employee-monitoring platforms, or privacy/ethics debates. Basic data-cleaning or scripting skills and comfort producing simple data
-
datasets. Collaborate with team members to debug models, analyze results, and iterate on research directions through regular code reviews and research discussions. Document research findings through clear
-
AI systems and how attackers adapt their tradecraft to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and