your motivation and suitability for the role. Education Successful candidates will be able to demonstrate some of the following: Studying towards a degree in Cyber Security, Computer Science, Psychology, HumanFactors, Computing, or equivalent; For Computer Science related degrees, passed modules in any of the following or similar: Artificial Intelligence, Machine Learning, Cryptography, Data Science, Secure Software Development, Risk Management … SCADA, Cloud Security, Network Security, Offensive & Defensive Security, and/or Security Monitoring. For Psychology related degrees, passed modules in any of the following or similar: Cyber Psychology/HumanFactors, Decision-Making, Cognitive Science, Human-Computer Interaction (HCI), Human-Machine interface (HMI) design, Human-robot Interaction (HRI), Research Methods/Design, UI/UX. Technical Any practical skills and More ❯
your motivation and suitability for the role. Education Successful candidates will be able to demonstrate some of the following: Studying towards a degree in Cyber Security, Computer Science, Psychology, HumanFactors, Computing, or equivalent; For Computer Science related degrees, passed modules in any of the following or similar: Artificial Intelligence, Machine Learning, Cryptography, Data Science, Secure Software Development, Risk Management … SCADA, Cloud Security, Network Security, Offensive & Defensive Security, and/or Security Monitoring. For Psychology related degrees, passed modules in any of the following or similar: Cyber Psychology/HumanFactors, Decision-Making, Cognitive Science, Human-Computer Interaction (HCI), Human-Machine interface (HMI) design, Human-robot Interaction (HRI), Research Methods/Design, UI/UX. Technical Any practical skills and More ❯
to be an undergraduate for the whole duration of the placement. Please inform your graduation date on your application. Studying towards a degree in Cyber Security, Computer Science, Psychology, HumanFactors, Computing, or equivalent; For Computer Science related degrees, passed modules in any of the following or similar: Artificial Intelligence, Machine Learning, Cryptography, Data Science, Secure Software Development, Risk Management … Cybersecurity Law, Security Architecture, Cybersecurity of Operational Technology (OT)/SCADA, Cloud Security, Network Security, Offensive & Defensive Security, and/or Security Monitoring. Cyber Psychology/HumanFactors, Decision-Making, Cognitive Science, Human-Computer Interaction (HCI), Human-Machine interface (HMI) design, Human-robot Interaction (HRI), Research Methods/Design, UI/UX. Research Design; Technical report writing; Qualtrics/Psychopy More ❯