185 computer-security "https:" "https:" "https:" "https:" "https:" "https:" positions at Northeastern University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 21-Dec-25 Location: Portland, Maine Type: Full-time Categories: Academic/Faculty Computer/Information Sciences
-
, submitting timesheets, light cleaning, and checking water chemistry). Addressing issues of concern with patrons. Takes initiative to ensure safety in the facility. Effectively scan their zone of protection and
-
the supervision of the PI, including proposal development and preparation of high-quality publications in top computer security, privacy, embedded systems, sensing, and networking venues. Pursue research topics
-
information to comply with appropriate protocols Qualifications: Eligible for and willing to obtain/maintain a DoD security clearance Bachelor's degree 3-5 years of successful high-level support and program
-
driving innovation in radar, electronic warfare, and secure communications systems. The role involves end-to-end system development, from conceptual design and modeling through laboratory validation and
-
operational support: This role requires occasional availability outside of traditional working hours to address urgent business needs as they arise, including, but not limited to, responding to security
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 09-Jan-26 Location: Boston, Massachusetts Type: Full-time Categories: Academic/Faculty Computer/Information Sciences
-
activities. Also, he/she/they secure appropriate licensing rights for use of music or other intellectual property; scout and secure film shoot locations and props; review scripts, and hire technical personnel
-
. Salary ranges are reviewed regularly and are subject to change. To apply, visit https://northeastern.wd1.myworkdayjobs.com/en-US/careers/job/Boston-MA-Main-Campus/Program-Supervisor--International-First
-
to, responding to security incidents, supporting software deployments, resolving software issues or system breaks, and addressing other critical operational requirements. The ideal candidate must be proactive and