Sort by
Refine Your Search
-
Category
-
Program
-
Field
-
with the management of lab activities. They will learn how to manage NIH-funded research projects in an academic setting. The ideal APM is highly organized, excited about breakthroughs in the health
-
computer including experience with Microsoft Excel, Microsoft Word, and Microsoft Outlook. Excellent written, verbal and interpersonal communication and customer service skills. Ability to positively
-
. Able to accept supervision. Regular and punctual attendance. Ability to work independently as well as with peers and management. Enjoys learning and solving problems. Strong desire to learn software
-
systems. Familiarity with the key concepts and elements of AI and machine learning. Understanding of principles of data ethics, and how to avoid or reduce biases to build ethical, responsible AI models
-
403(b) and a Deferred Compensation program 457(b) Flexible spending account options for medical and childcare expenses Robust free training access through LinkedIn Learning plus professional conference
-
to the production of detailed technical reports and presentations that showcase project progress and breakthroughs. Required Qualifications A strong foundation in AI/machine learning and software development
-
implementation of systems containing advanced computer, data storage, monitoring, and network technologies in ruggedized packaging for military applications. Prepare and submit budget and technical proposals
-
programming such as Python or MATLAB. Familiarity with computer systems. Applicant must have a dynamic skill set, willing to work with new technologies, be highly organized and capable of planning and
-
engineering, computer science, or similar technical degree. Six years or more experience in engineering or software development or technical military applications. Three years of experience in project
-
scalability in challenging environments. Our project is dedicated to crafting advanced machine-learning algorithms specifically designed for network optimization and security challenges. Through rigorous real