Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
body, faculty and staff, and curricular offerings. The School of Law is focused on addressing challenges in the areas of health, security and sustainability, and committed to training graduates who will
-
revolutionizing the way software is designed and evolved over time, based on the belief that software is a systems engineering challenge rather than a coding problem. See website for details of programs: http
-
classrooms. Coordinates with campus security guard for campus safety. Administrative and clerical tasks: Co-manages shared email account. Receives/sends mail and packages. Supports students or employees
-
pipelines that push technological boundaries for our clients. The Engineer will tackle complex challenges at the intersection of Large Language Models, Computer Vision, and Predictive Analytics while ensuring
-
-clinical networks. The work will directly impact patient safety and digital resilience in some of the most vulnerable healthcare settings. If successful, your engineering will revolutionize the healthcare
-
About the Opportunity PROGRAM DESCRIPTION The N.U.in Program is one of Northeastern’s signature global first-year experiences and truly embodies the university’s experiential approach to education
-
the supervision of the PI, including proposal development and preparation of high-quality publications in top computer security, privacy, embedded systems, sensing, and networking venues. Pursue research topics
-
experience focused on safety and security, meaningful connections and a sense of belonging, high student satisfaction, inclusive communities, assessment of learning experiences, and innovation. The Director is
-
of contact for student and staff safety and security during crises and • Be an on-call emergency contact during entire duration of program Perform other duties as assigned QUALIFICATIONS: Bachelor's degree and
-
, implementing, and managing the identity and access management framework within Northeastern University. Utilizes a deep understanding of IAM technologies, security protocols, and best practices to ensure