Sort by
Refine Your Search
-
Listed
-
Field
-
Application documents: 1) Brief cover letter, explaining your motivation for applying, 2) Detailed curriculum vitae (including your email address), 3) Complete transcript of grades from all your university-level studies. We do not ask for more information/documents at this point (but you can...
-
. Engineer and optimize gimbal-integrated sensor platforms for stabilized data acquisition. Ensure seamless integration with different drone platforms using SDKs and embedded systems. Autonomous Drone Systems
-
, Information Security, Health, Safety & Environment and ensure BioMed research operations comply with the policies and procedures. Coordinate with relevant departments to seek improvements and optimization
-
devices Design intuitive interfaces for AI model interaction and advanced image analysis Manage high-performance databases optimized for large-scale imaging datasets Implement security measures including
-
The Procurement Development Lead shall support the Director of Procurement and Supply Chain in advancing the procurement and supply chain department by focusing on the optimization and continuous
-
data into solutions—protecting ecosystems and empowering communities worldwide. Expectations 1. Data Management & Analysis Develop, maintain, and optimize data pipelines for collecting, cleaning
-
, Applied Probability, Partial Differential Equations, Numerical Analysis, Scientific Computing, and Optimization. Candidates with portfolios that align with Saudi Arabia’s national priorities for research
-
Accountability Fully own the planning, deployment, operations, optimization, and decommissioning of platform infrastructure components. · Risk-Driven Decision Making Prioritize security, compliance, and
-
documentation and providing regular reports on inventory status and deployment progress. Strict adherence to security protocols and maintaining optimal environmental conditions within the data center
-
correlate large datasets to troubleshoot incidents and recommend expedited remediation. Recommend optimizations to security-monitoring tools based on threat-hunting discoveries and assist in threat actor