180 computer-security "https:" "https:" "https:" positions at Northeastern University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
), labeling, and health authorities' interactions, while collaborating with cross functional teams across Clinical, Safety and CMC. The program also includes a 6-month rotation in Commercial Regulatory Affairs
-
About the Opportunity About the Opportunity Northeastern University Pharmaceutical Industry Fellowships Program is a two-year experiential program designed to advance lifelong learning and the
-
. Team members ensure that all safety and emergency protocols are followed. *This job position is located on the Oakland Campus and cannot be done remotely. RESPONSIBILITIES INCLUDE: Team members must be
-
About the Opportunity About the Opportunity Northeastern University Pharmaceutical Industry Fellowships Program is a two-year experiential program designed to advance lifelong learning and the
-
, quantified success in securing planned gifts or visits is highly desirable. Team player, able to relate effectively with all levels of staff, alumni and volunteers. High level of self-confidence, creativity
-
language processing, computer vision. AI model governance, explainability, and regulatory compliance. Data and AI ethics, privacy, and security Cloud AI platforms, AI ops, MLOps, and data engineering pipelines. AI
-
About the Opportunity About the Opportunity Northeastern University Pharmaceutical Industry Fellowships Program is a two-year experiential program designed to advance lifelong learning and the
-
in Computer Science, Information Technology, or related field; technical certifications in relevant areas (e.g., cloud platforms, MLOps, data engineering) preferred and a minimum of 3 years
-
required. The Kostas Research Institute was founded with a focus on homeland security research and development. Today, KRI strives to advance resilience in the face of 21st century risks across a wide range
-
working hours to address urgent business needs as they arise, including, but not limited to, responding to security incidents, supporting software deployments, resolving software issues or system breaks