Sort by
Refine Your Search
-
Category
-
Field
-
risk analysis. Computational dosimetry using stylized, voxel and mesh-type anthropomorphic phantoms Compilation and evaluation of radionuclide decay data and the construction of environmental source
-
, DNP3, OPC UA, IEC 61850, and others Knowledge of secure architecture principles for ICS/SCADA systems and segmented network design Experience with SIEM platforms (Elastic, Splunk) and Endpoint Detection
-
the Information Systems Security Manager (ISSM) in the certification and accreditation (C&A) of systems/networks and implementation of cyber security requirements and procedures across the National Security
-
opportunities for innovation and enhancement of the HPC infrastructure. Propose and implement improvements to existing systems and processes to support the evolving needs of the organization. Find opportunities
-
research spanning detector simulation, Spiking Neural Network (SNN) design, neuromorphic hardware, and data-rich experimental systems such as CMS pixel detectors, Timepix4, and novel photodetector
-
engage in a dynamic blend of activities, from theoretical explorations and laboratory experiments to crafting comprehensive reports and impactful proposals. Your innovative ideas will find a home here