494 computer-security "https:" "https:" "https:" "UCL" positions at Carnegie Mellon University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
drive impactful change in managerial and policy contexts. The Assistant Director of Executive Education – Program Delivery at Heinz College leads a suite of executive education programs and key marketing
-
language processing, machine learning, artificial intelligence, and human-computer interaction. Established within the School of Computer Science, LTI pioneers innovative ways to understanding, processing, and
-
Cloud Lab. The Sr PD will serve as a primary point of contact between the sponsors and CMU researchers/engineers to develop and secure new program tasks and to ensure smooth and timely oversight
-
university’s creative, dedicated and close-knit community. We place emphasis on practical problem solving, interdisciplinary learning, a visionary spirit, and collaboration. The Computer Science Department (CSD
-
university’s creative, dedicated and close-knit community. We place emphasis on practical problem solving, interdisciplinary learning, a transformative spirit, and collaboration. The Human-Computer Interaction
-
Carnegie Mellon University is seeking a dynamic and experienced leader to serve as the Senior Director of the Strategy and Transformation for Enterprise Platforms (STEP) program, a new initiative at
-
Computational Biology Department (CBD) is renowned for its interdisciplinary approach to studying biological systems using computational methods. Faculty and researchers collaborate across fields such as computer
-
, effective communication strategies, the Tartan Scholars program, accommodations for students with disabilities, and language support for multi-lingual learners, we offer a wide variety of opportunities
-
curious to deliver work that matters, your journey starts here! The Department of Electrical and Computer Engineering (ECE) ranks among the best in the country. Our research programs are at the forefront
-
, multi-party computation, fully homomorphic encryption, as well as zero-knowledge proofs. The ideal candidate has a strong background in cryptography and data security and privacy. The successful candidate