Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
data science, machine learning, computer science, statistics, or related highly-quantitative discipline with one (1) year of experience; or PhD in data science, machine learning, computer science
-
, Apache NiFi, Kafka, and Logstash. Comprehensive knowledge in data science and machine learning, both supervised and unsupervised. Demonstrable experience with Big Data platforms and tools such as Jupyter
-
knowledge in data science and machine learning, both supervised and unsupervised. Demonstrable experience with Big Data platforms and tools such as Jupyter Lab, ROCK NSM, and ALEX. Excellent communication
-
, Apache NiFi, Kafka, and Logstash. Comprehensive knowledge in data science and machine learning, both supervised and unsupervised. Demonstrable experience with Big Data platforms and tools such as Jupyter
-
knowledge in data science and machine learning, both supervised and unsupervised. Demonstrable experience with Big Data platforms and tools such as Jupyter Lab, ROCK NSM, and ALEX. Excellent communication
-
data science, machine learning, computer science, statistics, or related highly-quantitative discipline with five (5) years of experience; or PhD in data science, machine learning, computer science
-
About the role The SEI helps to advance software engineering principles and practices and serves as a national resource in software engineering and computer security. The SEI works closely with
-
they do their jobs. Our work ranges in scope from the close-up investigation and examination of security data, to the assessment of large, enterprise-wide networks, to analyzing the cybersecurity of SoSs
-
. Additionally, we work in generative AI and large language models, deep fake video creation and detection, data visualization, and natural language processing. We have access to a wide variety of cyber-related
-
. Additionally, we work in generative AI and large language models, deep fake video creation and detection, data visualization, and natural language processing. We have access to a wide variety of cyber-related