Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
work with us to research new methods. What you contribute You have a university degree in computer science, mathematics, or a related field. You also have excellent knowledge of IT security, especially
-
the area of Electronic Engineering, Communication Engineering, Computer Sciences, Embedded Systems or comparable Experience with low level software development desired Experience in developing
-
, computer science, or physics with good to very good grades First experiences with algorithm development preferably using C++, Python or MATLAB Basic understanding of optical communication systems Basic
-
optical communication networks and systems, as well as machine learning, computer vision and compressing digital videos. Become a part of our team and join us on our journey of research and innovation! Be
-
optical communication networks and systems, as well as machine learning, computer vision and compressing digital videos. Become a part of our team and join us on our journey of research and innovation! Be
-
the laboratory Electromagnetic simulation of circuits, antennas, filters, and related structures Programming by means of MATLAB, Python, C What you contribute Full-time student of electrical engineering or a
-
the acquisition and implementation of national and international research projects What you contribute Completed master's degree or PhD in computer science, IT security, or a related field In-depth knowledge
-
contribute PhD or master's degree in computer science or a related field with above-average grades Extensive knowledge, keen interest, and ideally practical experience in the field of cybersecurity or data
-
, or assembly is an advantage Initial experience in several programming languages Good written and spoken German and English skills University degree in computer science, mathematics, or a related field What we
-
(master's or diploma) in computer science, IT security, information science, or a related field In-depth knowledge of cybersecurity, network security, and IT infrastructures Experience with zero-trust