473 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" "Dip" "Dip" positions at Carnegie Mellon University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
currently lead a community-wide movement to mature the discipline of AI Engineering for Defense and National Security. As our government customers adopt AI and machine learning to provide leap-ahead mission
-
currently lead a community-wide movement to mature the discipline of AI Engineering for Defense and National Security. As our government customers adopt AI and machine learning to provide leap-ahead mission
-
currently lead a community-wide movement to mature the discipline of AI Engineering for Defense and National Security. As our government customers adopt AI and machine learning to provide leap-ahead mission
-
Carnegie Mellon University, Institute for Computer-Aided Reasoning in Mathematics Position ID: 3637-PF [#27988] Position Title: Position Type: Postdoctoral Position Location: Pittsburgh
-
: Experience in higher education, research computing, or similarly complex multi-tenant environments. Familiarity with security/compliance frameworks and practices (e.g., NIST, FERPA, HIPAA) as they apply to IT
-
Professor will be responsible for teaching undergraduate and graduate courses in computer systems and algorithm design on a temporary basis. Teaching may be in our core courses alongside other faculty
-
closely related field. Preferred - Master’s degree or advanced coursework in databases, cloud computing, systems, or information security. 3–5 years of database administration experience and 3–5 years
-
for teaching relevant coursework on Computational Finance in the Computer Science Department. Typical duties include, but aren't limited to: Planning and creating lectures, in-class discussions, and assignments
-
CMU in Qatar CMU in Qatar (CMUQ) operates in concert with several other American and European branch campuses under the umbrella of Qatar Foundation’s Education City (https://www.qf.org.qa/education
-
, multi-party computation, fully homomorphic encryption, as well as zero-knowledge proofs. The ideal candidate has a strong background in cryptography and data security and privacy. The successful candidate