81 coding-"https:"-"https:"-"https:"-"https:"-"https:"-"https:"-"Dr" positions at Carnegie Mellon University
Sort by
Refine Your Search
-
artifacts and leading customer engagements. The ideal candidate will have significant experience in full software lifecycle development, the ability analyze source code and mentor others on the architecture
-
must have the ability to obtain and maintain a Department of War (DoW) security clearance. Knowledge, Skills and Abilities: Strong ability to analyze source code and identify quality concerns
-
artifacts and leading customer engagements. The ideal candidate will have significant experience in full software lifecycle development, the ability analyze source code and mentor others on the architecture
-
interview notes, transcripts, artifacts, and classroom feedback. Code and analyze qualitative data (e.g., thematic analysis) to identify design requirements, breakdowns, and opportunities for refinement
-
our university policies. Support Accounts Payable (AP) and Receivable (AR) activities, including invoice review, coding, and deposits. Maintain organized financial records and support our audit
-
of fire and life safety systems, from design and construction to maintenance and repair. This includes ensuring all work meets University standards and applicable NFPA codes. This is an exciting
-
environments. This role includes guiding technical teams, evaluating architectural tradeoffs, developing prototypes, analyzing existing source code, and leading customer engagements that inform acquisition and
-
online testing of the planner in different operational configurations Conducting extensive simulation testing of the planner in a variety of uncommon configurations Documenting the code and supporting
-
; comfortable developing production‑grade code and APIs. Solid understanding of ML theory, statistical learning, and common algorithms. Hands‑on experience with TensorFlow, PyTorch, Torch, Caffe, or similar deep
-
AI systems and how attackers adapt their tradecraft to exploit those vulnerabilities. Reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and