Cybersecurity Vacancies

PhD Candidates and Researchers

Security, Data and AI: next generation AI enhanced security and access control

Eager to build applications that use AI to identify security threats?
Dedicated to mitigate increasingly sophisticated cybersecurity attacks?

Supervisor: Wouter Joosen
Contact: Davy Preuveneers and Bert Lagaisse - more info

Smart Identity and Access Management

Research and develop smarter Identity and Access Management systems that continuously and automatically adapt to risky situations without jeopardizing user experience.

Supervisor: Wouter Joosen
Contact: Davy Preuveneers and Bert Lagaisse - more info

Formal Foundations for Provable Security and Privacy

Investigate provable assurance of security and privacy compliance for access control policies, using formal foundations like propositional logic, automated reasoning and theorem provers.

Supervisor: Wouter Joosen
Contact: Davy Preuveneers and Bert Lagaisse - more info

Application-level Authorization for Cloud-native Applications

Research and develop capabilities on access control with a focus on authorization for next generation distributed applications and cloud-native applications.

Supervisor: Wouter Joosen
Contact: Bert Lagaisse and Davy Preuveneers - more info

IAM and Access Analytics for Cloud-native Applications

Confront insider threats and attacks, and find new solutions to secure critical resources.

Supervisor: Wouter Joosen
Contact: Bert Lagaisse and Davy Preuveneers - more info

Secure Software Design

Avoid security flaws from the very start of the software development process, even before the first line of code has been written.

Supervisor: Wouter Joosen
Contact: Koen Yskout and Dimitri Van Landuyt - more info

Secure Software Development

Help developers write better software by providing new and innovative tools that help detect or mitigate common programming vulnerabilities.

Supervisor: Wouter Joosen
Contact: Pieter Philippaerts and Dimitri Van Landuyt - more info

Implementation of Privacy Regulation

Deal with privacy regulations and other societal constraints during all phases of system design and implementation of Software-intensive systems.

Supervisor: Wouter Joosen
Contact: Dimitri Van Landuyt and Pieter Philippaerts - more info

Program Verification

Help battle the software security crisis by inventing new, better, practical and theoretically well-founded ways to help developers achieve high assurance of the absence of security vulnerabilities in their products.

Supervisor & contact: Bart Jacobs - more info

back to top

PostDocs and Senior Researchers

Privacy-friendly Distributed Software Systems

Designing and realizing complex privacy-friendly distributed software systems, with a focus on technologies for anonymizing and sharing sensitive data.

Contact: Vincent Naessens - more info & e-application form

Safe and Dependable Autonomous Systems

Do you share our interest in autonomous systems? Are you intrigued by the idea of building a dependable platform that integrates safe decision making with error recovery and resilience against harsh environmental conditions?

Contact: Tom Holvoet , or Jan Tobias Mühlberg - more info & e-application form

Feel free to send us a spontaneous application

Contact: Katrien Janssens

back to to

Research Experts

Research Expert Software Verification

The Program Verification Team led by Prof. Bart Jacobs performs research into technologies for enabling software development teams to deliver software with higher assurance of security, safety, and correctness, more cost-effectively. The Research Expert's mission will be to drive the Team's efforts to increase its impact on industrial practice by further maturing its technology portfolio and engaging with industrial partners to collaborate on formal verification projects such as the verification of – for example – hypervisor technology.

Contact: Bart Jacobs , Lieven Desmet or Wouter Joosen

back to to