CRDF Global is looking to deepen our bench of experts in support of the Emerging Technologies portfolio which addresses U.S. and partner-nation priorities to safeguard dual-use research and advanced technologies from misuse, diversion, and exploitation by adversaries. Experts will be engaged in a consultative manner in activities ranging from one-off strategic consultation calls to crafting technical reports to serving as a technical expert for project implementation or proposal response. This program is focused on addressing and mitigating exploitation and exfiltration of dual-use research, data, and technology in academia, the private sector, and during collaborations by adversarial entities and governments. In alignment with NSPM-3 and U.S. export control regimes (e.g., EAR, ITAR, Wassenaar), CRDF Global programming develops institutional resilience and strengthens technology governance across partner regions. Experts in this portfolio will ideally combine specific technical expertise with applied experience in capacity building, policy development, and security assistance. Current demands include: Space technologies in the Western Hemisphere (WHA) and East Asia & Pacific (EAP), where growing commercial and government investment creates both opportunity and security risk. Quantum research in Europe (EUR), where collaborative research environments intersect with export controls and IP protection challenges. Artificial Intelligence and Machine Learning in the EAP and EUR regions, where R&D activities intersect with U.S. intellectual property (IP) and funding. Core Technical Domains: Experts are sought in the following areas (including but not limited to): Quantum Information Sciences Quantum computing, quantum sensing (quantum radar, metrology), quantum communications (QKD), algorithmic and cryptographic security. Artificial Intelligence & Machine Learning Frontier models (large language models, foundation models), adversarial AI, AI red-teaming, ethics and safety, AI applications in cyber defense and critical infrastructure. Astronautics & Space Technologies Satellite communications, navigation, launch infrastructure, space situational awareness, commercial space applications. Aeronautics & Aerospace Engineering Unmanned aerial systems (UAS), hypersonics, propulsion systems, dual-use aerospace components. Advanced Materials & Manufacturing Nanomaterials, additive manufacturing (3D printing), composites, rare earth elements, advanced coatings. Microelectronics & Semiconductors Chip design (EDA tools), lithography, fabrication, packaging and assembly/test, semiconductor supply chain integrity. Other Priority Dual-Use Sectors Neuroscience, smart city infrastructure risks (risk of surveillance backdoors), energy storage, robotics, photonics. Cross-Cutting Security and Governance Domains: In addition to the above core domains, experts should also demonstrate experience in one or more of the following: Research Security Policy Development – Experience helping governments or universities draft internal SOPs, policies, and compliance frameworks for research integrity and security. Intellectual Property (IP) Protection – Experience implementing policies and procedures to safeguarding patents, trade secrets, and proprietary technology. Due Diligence and Compliance – Experience screening for foreign influence, malign partnerships, and predatory contracts. Governance, Risk, and Compliance (GRC) Systems – Designing institutional systems that track compliance and due diligence processes across projects. Enterprise Risk Management for R&D – Applying structured risk methodologies (ISO 31000, NIST RMF) to research and technology programs. Insider Threat Program Development – Implementing behavioral analytics, reporting mechanisms, and response plans. Conflict-of-Interest (CoI) & Foreign Affiliation Analysis - Identifying participation in adversary talent programs, predatory conferences, covert affiliations Export Control & Technology Transfer Compliance – Helping partners to implement controls in compliance with ITAR, EAR, and Wassenaar in practical research/industry contexts. Secure Contracting & Legal Review – Reviewing agreements for predatory clauses, developing model MoUs, ensuring enforceable protections for technology transfer. Physical and Personnel Security – Identifying gaps in access controls, personnel reliability programs, insider threat mitigation, laboratory/facility hardening and helping partners redress gaps. Data Governance & Sovereignty – Managing sensitive research data (including controlled unclassified information) across borders.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Education Level
No Education Listed