Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Requisition Id 16239 Overview: We are seeking a Senior Procurement Officer to provide subcontract management support for a variety of needs (research, construction, high performance computing
-
Requisition Id 16246 Overview: We are seeking a Protection Systems Engineer who will focus on implementing and maintaining high-reliability electronic safety interlock systems. SNS Protection
-
efficiency of modern and future high-performance computer systems under various workload characteristics through measurement, modeling, and simulation. Publishing papers in high-quality refereed conferences
-
modeling and networked biological systems. You will work at the intersection of high-performance computing (HPC), computational biophysics, and machine learning, leveraging leadership-class computing
-
Programming Systems R&D: Contribute to DOE goals of enabling performance‑portable high‑productivity languages (Python/Julia/Rust) and evaluate the emerging role these languages and frameworks within scientific
-
via collective bargaining agreements. Demonstrated Skills: Capable of creating a high-performance organization that excels in safety performance, strong operational discipline, and compliant execution
-
modeling and networked biological systems. You will work at the intersection of high-performance computing (HPC), computational biophysics, and machine learning, leveraging leadership-class computing
-
challenging and impactful research and development programs in healthcare informatics, bioinformatics, high performance computing and deep learning. We have a collaborative environment focusing on designing
-
). Our group is responsible for the High Flux Isotope Reactor (HFIR) configuration management program. The SE Group also provides technical support to operations and maintenance and performs systems
-
partners having stewardship of high-risk materials, including nuclear and radioactive material. Apply knowledge of nuclear and radioactive material supply chains to actively identify potential security gaps