From time to time, we have call for applications for PhD studentships and job posts. See below for more details.
Lecturer in Cyber Security
The School of Computing is seeking to appoint a lecturer, based in the Cyber Security research group at our Canterbury campus. The appointee will help us to build on our success in the recent REF 2021 exercise with 96.3% of our outputs being classified as world-leading or internationally excellent.
We invite applications from candidates with research interests that can complement or enhance the existing research strengths at the School’s Cyber Security research group and the cross-school institute iCSS. We welcome candidates whose research can be categorised as cyber security related, including but not limited to the following research themes and topics: socio-technical security and privacy, authentication and authorisation, communication and network security, security testing and software verification, AI and security (both AI for security and security of AI), digital forensics and online harms, information hiding and quantum-based security systems.
As a Lecturer in Cybersecurity you will:
- Undertake teaching of both undergraduate and postgraduate students, including the development of new modules and providing support for student learning.
- Develop and extend your existing successful research career, writing research papers of the highest quality and securing external funding.
- Collaborate with colleagues in the School on course development, delivery and assessment, taking on appropriate management and administrative responsibilities.
- Exploit opportunities to engage with industrial, commercial, governmental and charitable organisations to gain innovation funding, transfer knowledge and create impact.
- Develop collaborations with colleagues nationally and internationally to enhance research opportunities.
To be successful in this role you will have:
- A PhD in a discipline relevant to computer science or similar professional experience.
- Experience of teaching computing at higher education level.
- A recent track record of publications in leading international journals and conferences in one or more areas related to Cyber Security.
- The ability to make a strong contribution to the research undertaken in the School in one or more areas relevant to the Cyber Security research group and iCSS.
We particularly welcome applications from female candidates as they are under-represented at this level in this area.
For the job description and information on how to apply, visit our website.
How to Apply
To apply for a PhD studentship, follow the steps below. Note that the research proposal is used to test your technical writing and literature review skills, and the topic may still be adjusted in the application process and refined during your PhD study. Please read the application requirements carefully for the scholarship you are applying for, as these may vary.
- Read the general instructions for PhD applications.
- Study research profiles of all eligible supervisors (including all iCSS Core Members) to identify one or several supervisors you want to work with.
- Approach potential supervisors to discuss your research topics to identity the principal supervisor(s) you want to work with and to get advice on how to prepare a research proposal (required as part of your application material, see below).
- Prepare your application material, which should include
- a properly formatted CV
- the certificate(s) and transcript(s) of all university degree programme(s) studied
- a research proposal on a selected topic including a mini literature review, a proposed methodology, a work plan and a bibliography
- proof of your English qualifications (if not obvious from other application material)
- proof of your home student status (if you consider yourself eligible as a home student)
- at least two reference letters (which can be provided after you submit your formal application)
- (if you are an overseas applicant please check the specific eligibility criteria on the relevant scholarship)
- After you have all your application material ready, visit the following web page to submit your application: https://www.kent.ac.uk/courses/postgraduate/apply
- If you are applying for a specific PhD scholarship, please indicate this at the beginning of the “Reasons for Study” field.
How to write a good research proposal
It is common that you will be asked to write a research proposal independently to demonstrate your literature review and writing skills and general understanding of the subjects. The topic of your research proposal can be given by the academic you are applying to, or be proposed by yourself. Many supervisors prefer you propose your own topic and write a research proposal all by yourself as a starting point.
A research proposal should normally include the following components (unless there are specific guidelines for a call explaining how a research proposal should be written):
- Your full name and contact details: Please make sure your full name match the one on your formal application form and your signature in your emails to avoid confusion. It will also be good to include your application number so your application can be uniquely identified. For your email address, please make it a clickable so the supervisor can just click it to write an email to you. If you have a personal website or ResearchGate/LinkedIn/Google Scholar Citation profiles, please consider include them.
- Date: This should be the date of the last update. You may also want to include the date of the first version and a version number if you have sent multiple versions to potential supervisors.
- Abstract: This is optional but can highly recommended so your potential supervisors can quickly get an idea of what your want to do.
- Introduction: This is for you to explain the background/context of the topic and your personal motivation to study it.
- Related Work: This is a section for you to review related work, to demonstrate your understanding of what have been done by other researchers on different aspects of the selected PhD topic.
- Research Methodology: This is a section for you to explain how you currently plan to study the topic technically. You are expected to include some good technical details, in the context of related work in the Related Work section.
- Work Plan: This is a section for you to explain a timeline of your proposed PhD study, fitting into a period of 3-4 years depending on your personal circumstances (e.g., if your funding lasts for 3 years, make a 3-year plan; and if you have funding for 4 years, do a 4-year plan). In no case you should plan to finish in longer than 4 years because there is a expectation that by the end of the 4th year you should have submitted your PhD thesis for examination.
- References: This is a section for you to include all key references you used in your research proposal. Each reference should be cited at least once in the proposal. Pay attention to the format of references and ensure the full, correct and consistent citation information for each reference. When possible, include a URL so each reference can be checked by a single click.
Some useful guidelines on how to write a good research proposals are listed below:
- Guidance from the Department of Computer Science and Technology, University of Cambridge
- Guidance from the University of Edinburgh
The University of Kent offers a comprehensive variety of scholarships to PhD students who achieve outstanding academic merits from entry level and beyond in their undergraduate and postgraduate studies. Search for a scholarship here. The following show selected PhD scholarships that are particular relevant for applicants who are interested in studying a topic related to cyber security with one or more supervisors from the iCSS.
If you have difficulties identifying research topics or supervisors, please contact Professor Shujun Li for advice.
If you have questions on the PhD admissions procedure, please contact CEMSadmissions@kent.ac.uk.