16 data-"https:" "https:" "https:" "https:" "https:" "https:" "U.S" uni jobs at Johns Hopkins University
Sort by
Refine Your Search
-
of compliance processes, system requirements, and high quality data practices. Additional duties as assigned. Minimum Qualifications Bachelor’s Degree. U.S. citizenship or permanent residency required (federal
-
preferred but not required. ? The prospective applicant does not have to be an expert in localization. However, good knowledge of wireless communications, digital signal processing, and computer algorithms
-
will focus primarily on advising the university on a wide range of data governance matters, including privacy, cyber and information security, digital accessibility, records management, etc., including
-
to the husbandry and care of animals. Under the guidance of the Director, maintain the animal facility to meet the standards of the U.S. Department of Agriculture Animal Welfare Act, the Guide for the Care and Use
-
reputation for excellence has earned a ranking among "America's Best Hospitals" by U.S. News and World Report for more than two decades This fellowship program is designed to be an intensive 13-month program
-
Pepper spray. Basic computer usage and Microsoft Word. Degree of independent action performed on the job Work will be supervised on a daily basis by the on-duty Campus Safety and Security Shift Supervisor
-
. Basic computer usage and Microsoft Word. Degree of independent action performed on the job Work will be supervised on a daily basis by the on-duty Campus Safety and Security Shift Supervisor or his
-
their effectiveness in protecting sensitive information. The candidate will work as part of a team to conduct experiments and write research reports that focus on work from the NIST PETs Testbed, including
-
engines (i.e., providing data to feed models which in turn identify autonomous actions for the IoT product to take) and the cybersecurity risks of each step of this interaction - Updating and
-
engines (i.e., providing data to feed models which in turn identify autonomous actions for the IoT product to take) and the cybersecurity risks of each step of this interaction - Updating and