{"componentChunkName":"component---src-templates-tag-template-tag-template-js","path":"/tag/software-security","result":{"data":{"allMarkdownRemark":{"edges":[{"node":{"frontmatter":{"categories":["Positions","Software Security"],"title":"Postdoc Position - Software Security & Security Analytics","author":null,"format":"null","quote_text":"null","quote_author":"null","video_link":"null","date":"November 5, 2020","featured_image":{"childImageSharp":{"fluid":{"base64":"data:image/jpeg;base64,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","aspectRatio":1.838095238095238,"src":"/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg","srcSet":"/static/bbdecc8f12f99be010105337e5fc7456/2c799/blog-03-1170x600.jpg 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/1019c/blog-03-1170x600.jpg 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/f2cde/blog-03-1170x600.jpg 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/4e51d/blog-03-1170x600.jpg 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/02f3d/blog-03-1170x600.jpg 1170w","srcWebp":"/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp","srcSetWebp":"/static/bbdecc8f12f99be010105337e5fc7456/67578/blog-03-1170x600.webp 193w,\n/static/bbdecc8f12f99be010105337e5fc7456/e9921/blog-03-1170x600.webp 385w,\n/static/bbdecc8f12f99be010105337e5fc7456/1db9e/blog-03-1170x600.webp 770w,\n/static/bbdecc8f12f99be010105337e5fc7456/46ad6/blog-03-1170x600.webp 1155w,\n/static/bbdecc8f12f99be010105337e5fc7456/bb6ec/blog-03-1170x600.webp 1170w","sizes":"(max-width: 770px) 100vw, 770px","presentationHeight":420,"presentationWidth":770}}}},"fields":{"slug":"postdoc-position-software-security-security-analytics","authorId":"owen-christ","dateSlug":"2020-11-05"},"excerpt":"Position: Research Associate Location: The Centre for Research on Engineering Software Technologies (CREST), University of Adelaide…"}}]}},"pageContext":{"tag":"Software security","breadcrumb":{"location":"/tag/software-security","crumbs":[{"pathname":"/","crumbLabel":"Home"},{"pathname":"/tag","crumbLabel":"tag"},{"pathname":"/tag/software-security","crumbLabel":"software-security"}]}}}}