185 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" positions at Northeastern University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 21-Dec-25 Location: Portland, Maine Type: Full-time Categories: Academic/Faculty Computer/Information Sciences
-
About the Opportunity PROGRAM DESCRIPTION The N.U.in Program is one of Northeastern’s signature global first-year experiences and truly embodies the university’s experiential approach to education
-
driving innovation in radar, electronic warfare, and secure communications systems. The role involves end-to-end system development, from conceptual design and modeling through laboratory validation and
-
the supervision of the PI, including proposal development and preparation of high-quality publications in top computer security, privacy, embedded systems, sensing, and networking venues. Pursue research topics
-
information to comply with appropriate protocols Qualifications: Eligible for and willing to obtain/maintain a DoD security clearance Bachelor's degree 3-5 years of successful high-level support and program
-
activities. Also, he/she/they secure appropriate licensing rights for use of music or other intellectual property; scout and secure film shoot locations and props; review scripts, and hire technical personnel
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 28-Dec-25 Location: Boston, Massachusetts Type: Full-time Categories: Academic/Faculty Computer/Information Sciences
-
operational support: This role requires occasional availability outside of traditional working hours to address urgent business needs as they arise, including, but not limited to, responding to security
-
Details Posted: Unknown Location: Salary: Summary: Summary here. Details Posted: 09-Jan-26 Location: Boston, Massachusetts Type: Full-time Categories: Academic/Faculty Computer/Information Sciences
-
to, responding to security incidents, supporting software deployments, resolving software issues or system breaks, and addressing other critical operational requirements. The ideal candidate must be proactive and