...Postdoctoral Research Fellow
Starting Date: As soon as the applicant is available.
Description: IHMC is seeking a Postdoctoral Research Fellow to facilitate activities for a DoD-funded research program investigating the development and measurement of perceptual-...
Suggested
H1b
...Employment based visa sponsorship will NOT be considered for this position.
Position Title (Classification Title): OPS Research Assistant, Other Professional (Support/Service) Working Title: Research Assistant in CEDB Job Summary: Conduct research on discovery...
Suggested
Hourly pay
Contract work
...Research Associate (HRP Core Labs)
Starting Date: As soon as possible, depending on applicant's availability.
Description: IHMC is seeking a highly motivated and skilled Research Associate to support an array of functions in the Healthspan, Resilience, and Performance...
Suggested
...Employment based visa sponsorship will NOT be considered for this position.
Position Title (Classification Title):
OPS Research Support Specialist
Working Title:
Research Support Specialist
Job Summary:
The responsibilities...
Suggested
Hourly pay
Permanent employment
Full time
Temporary work
Part time
Immediate start
Job Type
Full-time
Description
JOB SUMMARY
Under the direction of the MedPro Claims Research Supervisor, the Claims Research Specialist III is responsible for performing the duties related to insurance follow up/collection and maintaining of accounts...
Suggested
Full time
Research Associate (HRP Wet Lab)
Starting Date: As soon as possible, depending on applicant's availability.
Description: IHMC is seeking a highly motivated Research Associate to join the Biochemistry and Molecular Biology Core (BMBC) Laboratory in the Healthspan, Resilience...
Suggested
Work From Home, Entry Level Data Entry Clerk As A Research Participant
We are looking for people who want to work remotely from home. You'll need an Internet connection and a mobile device or computer.
We need folks who want to do tasks, micro tasks, work at home...
Suggested
Remote job
Part time
Second job
Work from home
* American Board-certified in neurology and board certified/eligible in additional subspecialty training* Employed, GME core faculty position involving teaching and working with residents* Mainly outpatient position, Mon-Fri schedule* Commitment to providing high-quality...
Suggested
$76.9k - $138.9k
...effectiveness, mitigate risk and remediate operational and regulatory vulnerabilities. Develop, lead and approve risk assessment projects to assess... ...requiring advanced analysis.
Responsibilities
Plan the research for and development of specialized risk assessment scopes...
Suggested
Internship
Monday to Friday
...Participates in academic programs (e.g. medical education and research) as requested.
* Provides appropriate documentation that meets... ...care to all people, with special attention to the poor and vulnerable.
* Sacred Heart Health System includes hospital campuses in...
Suggested
Full time
Temporary work
Relief
Local area
...customers on Cyber related best practices, and respond to changing vulnerabilities, threats, and risks to Systems.
Responsibilities:... ...Excellent written and verbal communication skills.
Candidate will research DoD policy and complete various security tasking....
Suggested
Work experience placement
...effectiveness, mitigate risk and remediate operational and regulatory vulnerabilities. Develop and lead HMDA risk assessment projects to assess... ...Data entry of HMDA data into RATA software
Plan the research for and development of specialized risk assessment scopes...
Suggested
Internship
Monday to Friday
...Developing skill levels which parallel emerging technologies, through research, computer-based training, literature, and on- and off-site... ...standards. Identify and troubleshoot workstation security vulnerabilities. Research, test, and present information regarding new...
Suggested
Holiday work
Full time
Work experience placement
Remote job
Shift work
Rotating shift
...The Cyber Engineer designs, develops, documents, analyzes, tests, integrates, debugs, conducts research, and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, and applications. The Cyber Engineer ensures system security needs...
Suggested
Holiday work
Full time
Remote job
...security and privacy. Uses encryption technology, penetration, risk management and vulnerability analysis of various security technologies and information technology security research.
Develops security systems for any manual or automated systems environments. Responsible...
Suggested
...The Cyber Engineer designs, develops, documents, analyzes, tests, integrates, debugs, conducts research and/or discovers and analyzes security flaws or vulnerabilities in software, networks, systems, and applications. The Cyber Engineer ensures system security needs...
Remote job
...effectiveness, mitigate risk and remediate operational and regulatory vulnerabilities. Develop, lead and approve risk assessment projects to assess... ...requiring advanced analysis.ResponsibilitiesPlan the research for and development of specialized risk assessment...
Internship
Monday to Friday
...career spent focused on your community. From senior living to hospital and care facilities, Trio focuses on service to the most vulnerable members of your community. Each day, you can feel confident that the work you do has a real, meaningful impact on the people around...
Holiday work
Full time
...responsibilities include: Monitoring, identifying, collecting and analyzing information Providing computer network risk mitigation and network vulnerability assessments and incident response/reconstruction Providing network target access tool development Conducting computer network...
Full time
Work experience placement
Worldwide
Overseas
...area.
A Cyber Engineer will design, develop, document, analyze, test, integrate, debug, conduct research and/or discover and analyze security flaws or vulnerabilities in software, networks, systems, and applications. The Cyber Engineer will also ensure system...
Holiday work
Full time
Local area
Remote job
...careers bring the expertise in all facets of Information Operations, making sure our fleet is capitalizing on the information vulnerabilities of our adversaries. Candidates seeking careers in this field should preferably have a degree that focuses on areas of study such...
Part time
Worldwide
...- Knowledge of system and application security threats and vulnerabilities
- Knowledgeable in proactive analysis of systems and networks... ...Carbon Black, Etc)
- Proficiency with conducting all-source research.
Required Education: BS Computer Science, Cybersecurity,...
Contract work
Immediate start
Remote job
...detect threats and maintain the overall cybersecurity posture of these systems
Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (...
Work experience placement
Local area
...leading incident response efforts and reporting status to stakeholders and leadership.
" Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security operations
" Produce reports and briefs to provide an accurate...
Permanent employment
Temporary work
Worldwide
Shift work
Night shift
...reporting of cyber threats affecting client networks utilizing an enterprise SEIM.
• Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber defense operations.
• Identification, detection, and analysis of potential...
Holiday work
Permanent employment
Temporary work
Shift work
Night shift
...career spent focused on your community. From senior living to hospital and care facilities, Trio focuses on service to the most vulnerable members of your community. Each day, you can feel confident that the work you do has a real, meaningful impact on the people around...
Holiday work
Full time
...detection, response, mitigation, and reporting of cyber threats affecting client networks
"Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security operations
"Produce reports and briefs to provide an accurate...
Permanent employment
Temporary work
Worldwide
Shift work
Night shift
...detection, response, mitigation, and reporting of cyber threats affecting client networks
- Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber security operations
- Produce reports and briefs to provide an accurate...
Temporary work
Shift work
Night shift
...communities are vibrant**.
Since 1982, Lutheran Services Florida has been providing and sharing solutions to protect Floridas most vulnerable. Today, we are one of the largest nonprofits in Florida touching 1 in 50 Floridians with a wide range of services, including:
*...
Holiday work
Temporary work
...reporting of cyber threats affecting client networks utilizing an enterprise SEIM.
Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber defense operations.
Identification, detection, and analysis of potential...
Hourly pay
Holiday work
Contract work
Temporary work
Immediate start
Flexible hours
Shift work
Night shift