Job Seekers, Welcome to AAAI Career Center
Search Filters
Use this area to filter your search results. Each filter option allows for multiple selections.
Huawei Hong Kong Research Center
Hong Kong, Hong Kong, China
IIT Delhi - Abu Dhabi
United Arab Emirates
https://hkust-gz.edu.cn/academics/four-hubs/society-hub/financial-technology
Guangzhou, China
University of South Carolina School of Medicine-Columbia
Columbia, South Carolina
The Permanente Medical Group, Inc. (Kaiser Permanente Northern California)
Roseville, California
Featured! Featured!
Carnegie Mellon University
Pittsburgh, Pennsylvania
NEW! NEW!
Lawrence Berkeley National Laboratory
Berkeley, California
NEW! NEW!
Memorial Sloan-Kettering Cancer Center
New York, New York
NEW! NEW!
NEW! NEW!
Carnegie Mellon University
Pittsburgh, Pennsylvania
NEW! NEW!
Carnegie Mellon University
Pittsburgh, Pennsylvania
NEW! NEW!
Memorial Sloan Kettering Cancer Center
New York, New York
NEW! NEW!
Gynecologist, Obstetrics | Coastal Florida | Outpatient | Robotics | Full Support Staff | No OB Call
Baptist Health
Jacksonville, Florida
NEW! NEW!
NEW! NEW!
NEW! NEW!
NEW! NEW!
University of Minnesota Physicians
Minneapolis, Minnesota
NEW! NEW!
Memorial Sloan-Kettering Cancer Center
New York, New York
NEW! NEW!
Memorial Sloan Kettering Cancer Center
New York, New York
NEW! NEW!
Carnegie Mellon University
Pittsburgh, Pennsylvania
NEW! NEW!
Carnegie Mellon University
Pittsburgh, Pennsylvania
NEW! NEW!
University of Notre Dame
Notre Dame, Indiana
NEW! NEW!
Carnegie Mellon University
Pittsburgh, Pennsylvania
NEW! NEW!
Loading... Please wait.
Research Assistant
We are seeking a motivated and detail-oriented Research Assistant to support the project's first phase: a comprehensive literature review and the design of preliminary countermeasures for text-based phishing attacks. The assistant will work closely with the lead researcher to:1. Review and synthesize current and emerging literature on social engineering, phishing, and the application of AI in cybersecurity. 2. Analyze how advanced technologies (e.g., LLMs, deepfakes) are leveraged in sophisticated phishing schemes. 3. Assist in conceptualizing and prototyping a chatbot tool that can detect and respond to phishing attempts. 4. Contribute to acad
Loading. Please wait.